“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

THE FOURTH AMENDMENT Constitutional Law.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Privacy of Communications: Snail Mail to Telephones.
Teaching American History: Moot Courts and Constitutional Concepts.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Privacy & Personal Information -- Why do we care or do we?
POLICE LAW & SOCIETY What are the distinct characteristics of police in U.S. society? Police play multiple roles Law prescribes parameters of police practice.
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
Chapter 18 - The Fourth Amendment and National Security.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
Introduction to Constitutional Law Unit 4. CJ140-02A – Introduction to Constitutional Law Unit 4: The Fourth Amendment CJ140-02A– Class 4 Part 1.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Grady L. Hunt Locklear, Jacobs, Hunt & Brooks (910) The information contained in this presentation is intended for general.
CRIMINAL PROCEDURE Unit 2 - Week 2 Ann Marie Lampariello-Perez professor.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Bill of Rights The First Fundamental Changes of the Constitution.
Amendments in Action Search and Seizure. The 4 th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against.
4. Legal Limitations on Police behavior: a)Police are authorized to use coercive and intrusive measures in enforcing the law  Legal use of force = defining.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Kaplan University Constitutional Law Josephine Kerr January 6, 2011.
Police and the Constitution: The Rules of Law Enforcement.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
The Fourth Amendment and the Home By Laura Zajac.
Understanding the Criminal Justice System Chapter 6: Police and the Constitution.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
Strip search th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches.
Investigative Constitutional Law Charles L. Feer, JD, MPA, Bakersfield College Department of Criminal Justice Investigative Constitutional Law.
4 th Amendment Timothy Bian, Myris Kramsch, Mazen Elhosseiny, Daniel Alday, John Scott, Kartik Raju.
FOURTH AMENDMENT Search and Seizure. Fourth Amendment “ The right of the people to be secure in their persons, houses, papers and effects, against unreasonable.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
Arrest and Detainment How do you know you’ve been arrested?
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
4th Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Understanding the Constitution
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Courts System Search Warrants.
Limiting the Right of Search
Amendments in Action Search and Seizure.
Chapter 8 Police and Constitutional Law
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
The Fourth Amendment and the Home
Amendments in Action Search and Seizure.
Fourth Amendment And Probable Cause.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Laws Governing Police Surveillance
Criminal Procedure: Theory and Practice, 2d.
Bell Work (Think of your response and be prepared to share)
The University of Adelaide, School of Computer Science
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Search & Seizure The act of taking possession of this property.
The Right to Privacy vs. National Security
Presentation transcript:

“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney

King George And The Colonies “writs of assistance” In the colonies, smuggling rather than seditious libel afforded the leading examples of the necessity for protection against unreasonable searches and seizures. In order to enforce the revenue laws, English authorities made use of writs of assistance, which were general warrants authorizing the bearer to enter any house or other place to search for and seize ''prohibited and uncustomed'' goods, and commanding all subjects to assist in these endeavors.

U.S. Constitution Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Electronic Surveillance The US Supreme Court in US v. Katz, 389 US 347 (1967) extended the Fourth Amendment protection from unreasonable searches and seizures to protect individuals in a telephone booth from wiretaps by authorities without a warrant (device attached to outside wall) So long as an individual can justifiably expect that his conversation would remain private, his/her conversation is protected from "unreasonable search and seizure" by the Fourth Amendment. The Fourth Amendment protects people, not just places. Therefore, the rights of an individual may not be violated, regardless of whether or not there is physical intrusion into any given area. A warrant is required before the government can execute a wiretap, and the warrant must be sufficiently limited in scope and duration.

Statutes Title III and ECPA. Title III and the Electronic Commnunications Privacy Act make up the statutes that govern criminal wiretaps in the United States. FISA. The Foreign Intelligence Surveillance Act is the law that governs eavesdropping on agents of "foreign powers" within the United States, including suspected foreign terrorists.

Searches Without Warrants Probable Cause Exigent Circumstances Special Needs – US v. Heckenkamp Terry v. Ohio Detention: Stop-and-Frisk Incident to Arrest “Plain View” Consent Searches

“Special Needs” Warrentless Search Jerome Heckenkamp (AKA the “eBay Hacker”), a University of Wisconsin student was convicted of federal computer crime charges for defacing eBay by hacking into Qualcomm, Cygnus Solutions and other companies. Heckenkamp was caught after a University system administrator hacked into his Linux box to gather evidence that Heckenkamp had been attacking the college mail server. The 9th Circuit ruled that such counter-hacks are allowable under the 'special needs' exception to the Fourth Amendment, and upheld the warrantless search.

UNITED STATES OF AMERICA, Plaintiff-Appellee, v. JEROME T. HECKENKAMP, Defendant-Appellant. No , No UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT 2007 U.S. App. LEXIS 7806 August 17, 2006, Argued and Submitted, San Francisco, California April 5, 2007, Filed “Although we conclude that Heckenkamp had a reasonable expectation of privacy in his personal computer, we conclude that the search of the computer was justified under the "special needs" exception to the warrant requirement. Under the special needs exception, a warrant is not required when "'special needs, beyond the normal need for law enforcement, make the warrant and probable-cause requirement impracticable.'"

PATRIOT Act Warrantless Search The National Security Letter (NSL) provision of the PATRIOT Act allows the FBI to secretly demand access to records held by organizations like universities and Internet service providers without probable cause or judicial oversight

PATRIOT Act National Security Letter (NSL) Provision 18 U.S.C. §2709 Such letters are not new. Before the Patriot Act was enacted a few weeks after the September 11, 2001, terrorist attacks, NSLs could be used in investigations of suspected terrorists and spies. NSLs to telecommunications firms originated with a 1986 law called the Electronic Communications Privacy Act, which permitted them only in relation to an investigation of "an agent of a foreign power." That once-strict requirement was broadened in 1993 and again by the Patriot Act eight years later. After the Patriot Act change to the law, the FBI needed only to say that a letter may be "relevant" to a terrorist-related investigation. NSLs do not require any prior review or court approval. NSLs impose a "gag" restriction forbidding a recipient from disclosing that they have received the letter.

Here We Come... CALEA... Or Not! When the FBI has a court order but an Internet service provider can't isolate the particular person or IP address because of “technical constraints”, it takes and records all the ISP information “Full-pipe” surveillance can record all Internet traffic or, optionally, only certain subsets, flowing through the network. Interception typically takes place inside an Internet provider's network at the junction point of a router or network switch. It then searches through the data, while at the same time gathering lots of other information on people who just happen to be the same customer as the target. “You intercept first and you use whatever filtering, data mining to get at the information about the person you're trying to monitor”.

Illustration By Dustin Ingalls