The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Advertisements

Warm Up: 2/25  1. What is your American Dream? (ie: what is your idea of success?)  2. Do you think the American Dream is still possible?  Notes Title:
March, – June 20, 1979 Heard at U.S. Supreme Court A Pro-Prosecution Case.
I Choose Privacy! Intellectual Freedom: Addressing the Privacy Issue in the Academic Library.
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Terry v. Ohio and NY City Stop and Frisk Policy
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
USA PATRIOT ACT USA PATRIOT ACT
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Privacy & Personal Information -- Why do we care or do we?
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
What rights are protected under the Bill of Rights?
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
The Exclusionary Rule The Fourth Amendment History of the Exclusionary Rule Deontological Defenses of the Rule Consequentialist Defenses Objections Alternatives.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Class 11 Internet Privacy Law Government Surveillance.
California vs. Acevedo By: Caroline Correa & Raul Perez.
Analyzing a Court Decision An overview of Student Searches presented by Bart Fennemore.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
Call to Order These three officers were accused of taking two Baltimore teens out to the county, taking their shoes and cellphone batteries, and leaving.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Grady L. Hunt Locklear, Jacobs, Hunt & Brooks (910) The information contained in this presentation is intended for general.
The USA PATRIOT Act An Overstatement of ALA Concerns?
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Rights of the Accused Civil Liberties: Protecting Individual Rights Section 3 &4.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
Due Process Amendments What is due process? Due process, for the people of the United States, refers to how laws are enforced why laws are.
STOP AND FRISK Terry v. Ohio and NY City Stop and Frisk Policy.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
FOURTH AMENDMENT Search and Seizure. Fourth Amendment “ The right of the people to be secure in their persons, houses, papers and effects, against unreasonable.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
Arrest and Detainment How do you know you’ve been arrested?
Chapter 3Slide 1 The Bill of Rights A.Study The Bill of Rights. B.Identify Basic Human Rights Protections Offered By The Bill of Rights & Subsequent Amendments.
1 st Amendment: Freedom of Expression “Congress shall make no law.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
Privacy and the Law.
SEARCH & SEIZURE.
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Introduction to Constitutional Law
Forensics Week 7.
The Fourth Amendment and the Home
Introduction to Constitutional Law
Reviewing AMERICAN GOVERNMENT
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
Mandatory testing Civil Rights – Constitution of the United States, Article IV (of the original Bill of Rights) and Article XIV (State law versus Federal.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
Search & Seizure The act of taking possession of this property.
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized

What’s all this then?

“… later we extended privacy protections to new modes of communications such as the telephone, the computer, and eventually .”

Consumer Privacy Bill of Rights  Intended to protect the people’s basic right to privacy.  Serves as a guide to developing future legislation regarding online privacy.  Also intended to keep the legal jargon of the legislation clear and relatively easy to understand.

Ease of Readability

Sec 217 Interception of PC Tresspasser Communications (1) in section 2510— (A) in paragraph (18), by striking ‘‘and’’ at the end; (B) in paragraph (19), by striking the period and inserting a semicolon; and (C) by inserting after paragraph (19) the following: ‘‘(20) ‘protected computer’ has the meaning set forth in section 1030; and ‘‘(21) ‘computer trespasser’— ‘‘(A) means a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer; and ‘‘(B) does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer.’’; …

The Short Version

The Long Version  (The) U niting (and) S trengthening A merica (by) P roviding A ppropriate T ools R equired (to) I ntercept (and) O bstruct T errorism (Act)

The “For Dummies” Version

National Security Letters

Abuse of Power  “… on over 700 occasions the FBI obtained telephone toll billing records or subscriber information from 3 telephone companies without first issuing NSLs or grand jury subpoenas. Instead the FBI issued so-called ‘exigent letters’ signed by FBI Headquarters Counterterrorism Division personnel who were not authorized to sign NSLs. In many instances there was no pending investigation associated with the request at the time the exigent letters were sent. In addition … many were not issued in exigent circumstances, and the FBI was unable to determine which letters were sent in emergency circumstances due to inadequate recordkeeping.”

What It Can and Can’t Do  “A national security letter cannot be used to authorize eavesdropping or to read the contents of . But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen. The records it yields describe where a person makes and spends money, with whom he lives and lived before, how much he gambles, what he buys online, what he pawns and borrows, where he travels, how he invests, what he searches for and reads on the Web, and who telephones or s him at home and at work.”

Expat  Definition: A person who is voluntarily absent from home or country  In a sentence: Daniel Flynn was an American expat before the USA PATRIOT Act.

Unintended Consequences  “It seems the new anti-terrorist rules are having unintended effects. … I was born in San Francisco in 1939, served my country as an army officer from 1961 to 1963, have been paying U.S. income taxes for 57 years, since 1952, have continually maintained federal voting residence, and hold a valid American passport. … [His U.S. bank of 44 years] said that the new anti-terrorism rules required them to close our account because of our address outside the U.S.”

The 3 rd Commandment of Computer Ethics  Thou Shalt Not Snoop Around In Other People’s Computer Files  So, which sounds more ethical to you?

Presentation Resources  /Blog_National_Security_Letters.gif /Blog_National_Security_Letters.gif  es/the_patriot_act_for_dummies_ jpg es/the_patriot_act_for_dummies_ jpg  dyn/content/article/2005/11/05/AR html dyn/content/article/2005/11/05/AR html  argon.asp argon.asp  content/2012/02/internet-privacy.jpg content/2012/02/internet-privacy.jpg