Chapter 19 - Congressional Authority for National Security Surveillance Part I.

Slides:



Advertisements
Similar presentations
United States of America V. Craig Forest and Herman Garner Argued December 5, 2003 and filed January 27, 2004.
Advertisements

March, – June 20, 1979 Heard at U.S. Supreme Court A Pro-Prosecution Case.
Privacy of Communications: Snail Mail to Telephones.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts.
Amendment Process. Formal Amendments  Formal Amendment – Change or addition that becomes part of the written language of the Constitution itself through.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
Right to Privacy Crime and Law -- Nilsen. Privacy is: The right to be let alone.
Fourth Amendment What are your rights in school?.
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
Legal Case Studies November 8,  1 st Amendment to US Constitution  4 th Amendment to US Constitution  Tinker vs. Des Moines.
Chapter 8 Part III. Reports and Subpoenas 2 3 Government as Database A primary function of the federal government is collecting information. Information.
1 Chapter 15 Search Warrants Search Warrants. 2 Search Warrants Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 2 Business and the Constitution.
United States v. Jones Presented by: Rebecca Son.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Civil Liberties Challenges
The Right to Privacy. No where in the Constitution are the words “right to privacy”
Rights of the Accused Search & Seizure Search & Seizure Right Against Self Incrimination Right Against Self Incrimination Right to Counsel Right to Counsel.
Chapter 18 - The Fourth Amendment and National Security.
Police and the Constitution: The Rules of Law Enforcement.
Katz v United States (1967) By Timothy Vo. Constitutional Issue Violation of fourth amendment Litigants Katz, United states Fourth amendment protect people.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Obtaining Evidence from Computers, or by Use of Search Warrants, Wiretapping, or Dogs Trained to Indicate an Alert Chapter 15.
THE MOSAIC THEORY: A BRIEF HISTORY HAMMOND. WHAT IS THE MOSAIC THEORY AND WHY DOES IT MATTER? THE MOSAIC THEORY IS AN IDEA IN OUR GOVERNMENT THAT PLACING.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
CLASS NO. 2 4 TH Amendment. Review Incorporation Doctrine Retroactivity –Gen. Rule: Decisions are not retroactive for habeas corpus cases –Exceptions:
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
Courts System Search Warrants.
TeamSpot Activities.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Chapter 23 - Surveillance Abroad
Protecting Yourself and Your Information
Amending the Constitution
The 4th Amendment Notes 5-3.
The fourth amendment Third-Year Law – Class 7.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
4th Amendment (Pre-Internet)
Daily Goals Content: Literacy: Social:
Intercepting Communications
Carpenter v. U.S. Begs for Action Jody Blanke Mercer University
Chapter 20 - Third-Party Records and Data Mining
The 4th Amendment Notes 5-3.
Why is this an essential component of the Constitution?
Amendment Process.
October 16, 2018 Modern Issues in the U.S. Agenda:
Laws Governing Police Surveillance
Criminal Procedure: Theory and Practice, 2d.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
IA455 Chris Danieli and Zachary gibson
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
ShotSpotter, Cellular Data, and the Future of Digital Forensics
The Right to Privacy vs. National Security
Presentation transcript:

Chapter 19 - Congressional Authority for National Security Surveillance Part I

Smith v. Maryland United States Supreme Court, 442 U.S. 735 (1979) What is a pen-register and why did the police use them? Are the customers of the phone company aware that this information was being collected by the phone company? How is a pen register different from a Katz wiretap? Why isn't the installation of the pen-register a search? What is the search?

United States v. Miller, 425 U.S. 435 (1976) Access to Bank Records ‘‘The depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government. . . . This Court has held repeatedly that the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.’’

Expectation of Privacy Why did the defendant not have an expectation of privacy? Why is the dissent concerned about basing the 4th amendment on reasonable expectations of privacy? Has the court adopted the dissent's view over time?

Subsequent Legislation What sort of warrant requirement did Congress enact? Is this like an administrative search? What does this standard about information provided to third parties tell us about social networking? Information other than conversations that come from Internet and cell phone use?