Obtaining Evidence from Computers, or by Use of Search Warrants, Wiretapping, or Dogs Trained to Indicate an Alert Chapter 15.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Privacy of Communications: Snail Mail to Telephones.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
Criminal Procedure for the Criminal Justice Professional 11th Edition
Copyright © Allyn & Bacon 2007 Chapter 5 Arrests and Searches Without Warrants.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
The 4th & 5th Amendments Search & Seizure Search & Seizure Rights Against Self Incrimination Rights Against Self Incrimination.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
Search & Seizure Stephanow th Amendment. CRIMINAL JUSTICE PROCESS in TEXAS =3952&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
The Fourth Amendment What are Your Rights? Search and Seizure:
Computer Forensics Principles and Practices
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter Four Other Search & Seizure Issues All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
Search & Seizure Question : Privacy vs. Need for Law and Order.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
Rights of the Accused Search & Seizure Search & Seizure Right Against Self Incrimination Right Against Self Incrimination Right to Counsel Right to Counsel.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
1 Chapter 14 Obtaining Physical and other Evidence Obtaining Physical and other Evidence.
Chapter 18 - The Fourth Amendment and National Security.
Kaplan University Constitutional Law Josephine Kerr January 6, 2011.
Police and the Constitution: The Rules of Law Enforcement.
Understanding the Criminal Justice System Chapter 6: Police and the Constitution.
CJ © 2011 Cengage Learning Chapter 7 Police and the Constitution: The Rules of Law Enforcement.
FREEDOM & SECURITY OF THE PERSON Pgs th Amendment  Ended slavery in  States & National Govt. could no longer allow slavery.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Thinking Critically Questions Chapter Four. Self-Incrimination Should a person be allowed to take the “fifth?” Does a defendant have the right not to.
TECHNOLOGIES SECTION VI UNIT 2. INFORMATION TECHNOLOGY IN THE NURSING HOME Use of Technology in Resident Care computer charting medication delivery systems.
Chapter 5 (cont’d) 5.4 – Legal Rights and Search Laws.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
Presented By: Chris M. Wright, CPP IIA Spring Conference 2016 IRVINE, CA March 17, 2016.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Arrests, questioning, and imprisonment Objective: Don’t be in the wrong place at the wrong time!!
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Questioning, Searches, And Arrests
Chapter 6 Police and the Constitution: The Rules of Law Enforcement
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Public Recording of Police
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
Confidentiality October 14, 2005.
Warm Up “We find that testing students who participate in extracurricular activities is a reasonably effective means of addressing the School District's.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Police Conduct Certificate
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
October 16, 2018 Modern Issues in the U.S. Agenda:
Police Powers And individual rights.
Laws Governing Police Surveillance
Bell Work (Think of your response and be prepared to share)
The University of Adelaide, School of Computer Science
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
IA455 Chris Danieli and Zachary gibson
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Search laws CLU3ME: Unit #3 - Day Five.
Critical Thinking Question
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Police Department  City Council Report February 2019 
Presentation transcript:

Obtaining Evidence from Computers, or by Use of Search Warrants, Wiretapping, or Dogs Trained to Indicate an Alert Chapter 15

I.Obtaining Evidence from Computers A.Search warrants B.Consent C.Computers in the workplace D.Plain view

II. Search Warrants A.Requirements B.Detaining containers pending warrant

III.Types of Search Warrants A.Nighttime B.No-knock C.Anticipatory D.Sneak-and-peek entry

IV. Wiretapping and Electronic Surveillance A.Katz v. U.S. B.Legislation C.Thermal imaging devices D.Techniques of electronic surveillance E.U.S.A. PATRIOT Act 1.Wiretapping 2.Cell phones 3. 4.Other surveillance 5.PATRIOT Act changes to other laws FTactics used by suspects to avoid electronic surveillance

V.Situations Where Court Orders are Not Required A.Plain hearing B.Undercover officer testimony C.Tape recording D.Right to privacy of conversations in police vehicles, jails, etc. E.When one party to the conversation consents F.Using confrontational phone calls G.Body wire or radio transmitters H.Wiretapping or recording by family members not an exception

Reliability of Informants’ Tips

Trained Dogs A.Drug and bomb detection dogs B.Drug dogs and traffic stops