Virtual Searches Christopher Slobogin Stephen C. O’Connell Professor of Law University of Florida Fredric G. Levin College of Law.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
United States of America V. Craig Forest and Herman Garner Argued December 5, 2003 and filed January 27, 2004.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Richard Warner USA Patriot Act: Money Laundering Provisions.
Criminal Procedure for the Criminal Justice Professional 11th Edition
2 Language of Computer Crime Investigation
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
The CSI Stick: The Threat is Real Jennifer Wilson HTM 304.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Technology for Computer Forensics by Alicia Castro.
Face Recognition and implications on society By Zubin Singh ICS 131.
Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Unit 03: Financial Literacy Vocabulary. Available Balance The amount available in an account for a person, business, or organization to spend. How much.
(Edited) WORKPLACE PRIVACY.
Class 11 Internet Privacy Law Government Surveillance.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
BA J. Galván1 PRIVACY and Other Social Issues.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Criminal Investigation Part 4 Records as an Investigative Aid.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
1 CLASS 7 Privacy and Law Enforcement pt. 2; Education Privacy Privacy and Information Security Law Randy Canis.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Chapter 3: Investigative Constitutional Law Property Seizures and Non-Serches.
THE MOSAIC THEORY: A BRIEF HISTORY HAMMOND. WHAT IS THE MOSAIC THEORY AND WHY DOES IT MATTER? THE MOSAIC THEORY IS AN IDEA IN OUR GOVERNMENT THAT PLACING.
Digital Forensics and Hand Held Devices Robert Trimble COSC
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
CLASS NO. 2 4 TH Amendment. Review Incorporation Doctrine Retroactivity –Gen. Rule: Decisions are not retroactive for habeas corpus cases –Exceptions:
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Judicial Training on Data Protection and Privacy Rights
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
How Does Electronic Surveillance Work Legally?
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Laws Governing Police Surveillance
ShotSpotter, Cellular Data, and the Future of Digital Forensics
Presentation transcript:

Virtual Searches Christopher Slobogin Stephen C. O’Connell Professor of Law University of Florida Fredric G. Levin College of Law

Types of Virtual Searches Communications Surveillance –Real-time interception of communications –E.g., wiretapping, bugging, interception of Physical Surveillance –Real-time observation of physical activities –E.g., cameras, thermal imagers Transaction Surveillance –Accessing records –Real-time interception of information about transactions (phone #s) –E.g., use of commercial data brokers (CDBs), pen registers

Types of Physical Surveillance Video surveillance –Of the home –In public (e.g., London, D.C.) Tracking (e.g., beepers, cell phones, GPS) Magnification devices (binoculars, satellites) Illumination devices (flashlights, Startron) Detection devices (xrays, thermal imagers) –Contraband-specific (e.g., dogs) –Weapons-specific (Millitech?)

Hot Issues Surveillance of the Home (Kyllo) –General public use exception –Naked eye exception Public Surveillance (Knotts) –Right to Anonymity? –ABA Standard: “reasonable likelihood that a legitimate law enforcement objective will be achieved” Retention and Use of Results Use of Contraband- & Weapon-Specific Devices

Types of Transaction Surveillance Accessing already-existing records (e.g., medical, financial, educational) –Subpoenas; National Security letters (relevance) –Use of CDBs like Choicepoint (money) Real-time interception of “catalogic” data (e.g., phone #s, addresses) –Pen registers, trap & trace devices (certification order) –Snoopware (Carnivore/DCS-1000, BackOrifice) Target-based surveillance v. event-based surveillance (i.e., “datamining”)

Hot Issues Does Constitution apply? –Hale v. Henkel –United States v. Miller Should regulation (constitutional or otherwise) depend on the type of record? –Medical, financial, tax records; stored (probable cause v. federal statutes requiring mere relevance) –Public records (reasonable suspicion v. Privacy Act) –Catalogic data--logs of phone & ISP companies; credit card purchases, passenger lists, etc. (relevance v. 0) Aggregation concerns