7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.

Slides:



Advertisements
Similar presentations
THE FOURTH AMENDMENT Constitutional Law.
Advertisements

Protect Our Students Protect Ourselves
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
The Bill of Rights and the Criminal Trial Process.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Right to Privacy: The Unwritten Right
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Criminal Justice Process: the investigation – Chp 12 Arrest – Suspect taken into custody 4 th Amendment: The right of the people to be secure in their.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Privacy & Personal Information -- Why do we care or do we?
INTERNET and CODE OF CONDUCT
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
Rights of Suspects The Fourth Amendment The Fifth Amendment.
+ Protecting Individual Liberties Section 1 Chapter 14.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
HIPAA PRIVACY AND SECURITY AWARENESS.
Search & Seizure Stephanow th Amendment. CRIMINAL JUSTICE PROCESS in TEXAS =3952&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
Discovery III Expert Witness Disclosure And Discovery Motions & Sanctions.
Computer Forensics Principles and Practices
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Psychology of Homicide Unit II
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Law & Justice Chapter 12 Criminal Investigations.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Police and the Constitution: The Rules of Law Enforcement.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
The Bill of Rights and the Criminal Trial Process.
The Investigation.  Right to remain silent  Right to an attorney  No interrogation should take place before they read  Are a result of the US Supreme.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
FOURTH AMENDMENT Search and Seizure. Fourth Amendment “ The right of the people to be secure in their persons, houses, papers and effects, against unreasonable.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
The Bill of Rights and the Criminal Trial Process.
4TH AMENDMENT  The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
1 st Amendment: Freedom of Expression “Congress shall make no law.
HW due today- Finish researching a second case Agenda NVCs Warm-up Establishment clause and balancing test Crime and amendments Rights of the accused Objectives.
Unit 4 Seminar. Tell me what the Miranda warning is and what it means to you.
The Bill of Rights and Search and Seizure. The students will be able to: 1. Discuss the amendments involved from the Bill of Rights that pertain to obtaining.
4th Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Understanding the Constitution
Courts System Search Warrants.
SEARCH & SEIZURE.
Evidence Collection at the Crime Scene and Constitutional Law
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Forensics Week 7.
The Fourth Amendment and the Home
Fourth Amendment And Probable Cause.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Search & Seizure The act of taking possession of this property.
Presentation transcript:

7. Legal

Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant

Fourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Criminal Law—Searches Without a Warrant 1. Did the government act? 2. Did that action violate a person's reasonable expectation of privacy ? Only if both answers are "YES" does the Fourth Amendment apply A person acting at the request of law enforcement becomes an agent of the government, and Q1=YES

Reasonable Expectation of Privacy No simple answer A computer can be treated as a closed container o If an officer lacks authority to open a desk drawer or box, there isn't authority to examine a computer either If a reasonable expectation of privacy exists, the government must get a search warrant, or meet one of the documented exceptions Are individual files closed containers? o Case law is unclear Data a individual places on shared computers or drives is not protected by the fourth amendment

Private Searches Fourth amendment does not apply if the examiner is not acting at the request of government If a Geek Squad worker finds illegal files on a computer, that evidence is admissible Link Ch 7a

Treated like regular postal mail has fourth amendment protection while it is being transmitted, but the protection stops when it is delivered to its destination. Legal interception is regulated by the Wiretap Act of 1968 o Prohibits unauthorized monitoring o Lists procedures needed to obtain a warrant for wiretapping

The Electronic Communications Privacy Act (ECPA) Bans third parties from intercepting and/or disclosing electronic communications An amendment to the the Wiretap Act, passed in 1968 Changed in 1994 by CALEA (Communications Assistance to Law Enforcement Act) Changed again by the PATRIOT Act o Re-authorized in 2006

CALEA (Communications Assistance to Law Enforcement Act) Requires telecommunications providers to assist law enforcement with wiretaps o In practice, this forces them to use special equipment Expanded in 2006 to cover broadband Internet providers From the FCC (Link Ch 7b)

CALEA and the Internet CALEA doesn't yet apply to instant messages and o From the EFF (Link Ch 7c)

The USA PATRIOT Act Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Here's what the DoJ says about it (Link Ch 8d)

EFF on PATRIOT Act Link Ch 7e

National Security Letters National Security Letters are allowed by the PATRIOT Act, forcing Internet service providers to tap users and not tell them The verdict below may stop them, but it may be appealed (Link Ch 7g)

Exceptions to the Search Warrant Requirement

An authorized person gives voluntary consent for the search o "Voluntary" will be judged on the totality of the circumstances o Consent can be revoked at any time o Search must stop at that time o BUT if you have already made a forensic clone, you only need to return the original and may continue to examine the clone o So make the clone promptly Scope of consent o Consenting to search a house may not apply to closed containers and computers o Party may set forth restrictions on the search

Consent Forms Link Ch 7h

Consent Searches Third parties can sometimes consent o Roommates, spouses, parents… If a device is shared, all parties can consent to search its common areas o None of the users have a reasonable expectation of privacy in the common areas Password-protected areas are not common areas o Unless the suspect shared the password with the third party

Consent Searches Spouses can consent to the search of common areas Parents can consent to a search of a minor child's property (age under 18) Technicians often uncover evidence during their work o It's unclear whether technicians have the right to consent to a search

Exigent Circumstances An immediate seizure and search of a digital device is required under one of three conditions: Evidence is under imminent threat of destruction A threat puts law enforcement or the public in danger Suspect is expected to escape before a search warrant can be acquired o This may justify seizure only, not search

Plain View If officers are legally allowed to be where they are and can see something immediately incriminating o They can use that evidence A forensic examiner investigating one crime may find evidence of another o Stop the search until a separate search warrant is obtained

Border Searches These searches are allowed more latitude o Border searches o Searches by probation or parole officers

Employees Employees in the workplace may not have a reasonable expectation of privacy Officers can search a computer if an employer or co-worker with shared authority gives permission Government employees can only be searched if the search is " work-related, justified at their inception, and permissible in scope"

Searching with a Warrant

Search warrant is granted by a judge, based on probable cause that a crime was committed and evidence will be found at that location Computer may have different roles o A computer containing child porn is contraband o Computer may contain incriminating documents o Computer may be the instrument of a crime such as hacking

Seize Hardware or Information? Hardware must be seized if computer is: o Contraband o Evidence o Fruits o Instrumentality Otherwise, all you need is the data

Particularity You need to state clearly what can be seized and what cannot

Establishing Need for Off-Site Analysis Examination is time-consuming and best performed in a forensics lab This should be explained in the affidavit justifying removing and holding the devices

Stored Communications Act Lays out process law enforcement must use to force disclosure of data from Internet Service Providers (ISPs) o o Subscriber and billing information Enacted in 1986 Two types of service providers o Electronic Communication Service (ECS) Including telephone and services, like AOL o Remote Computing Service (RCS) Provides storage or processing services

E-Discovery

Electronic Discovery (eDiscovery) The process of collecting, preparing, reviewing, and producing electronically stored information (ESI) in the context of the legal process ESI is o Easily modified o Volatile o Easily duplicated or dispersed o Large volume of data

Duty to Preserve Rules of Civil Procedure were changed in 2006 to address digital evidence Opposing attorneys must deal with ESI early in the process Duty to preserve potentially relevant data begins with there is "reasonable expectation of litigation" Failure to preserve is spoilation of evidence o Can lead to severe sanctions Duty to preserve often starts long before a subpoena is served

eDiscovery Data sampling is a way to test large volumes of ESI for the "existence or frequency of relevant information" Costs of eDiscovery can be massive o Typically costs are borne by the producing party o Costs can be shifted to the requesting party if certain conditions are met

Private Searches in the Workplace Employers have a lot of latitude to search an individual's company computer Best practice: computer use policy stating that work computers, , etc. are for work purposes only and may be searched at any time Fourth amendment (if law enforcement is doing the search) o A work computer can be searched with consent of a supervisor or another employee who has common authority over the area to be searched Consult with attorney for guidance

Expert Testimony Expert witnesses can state opinions Expert doesn't need a PhD or other credentials An expert has "special knowledge, skill, training, or experience " which makes him or her qualified to "aid the factfinder in matters that exceed the common knowledge of ordinary people"

Source of Images Several images are from the textbook, I didn't cite sources for them