1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.

Slides:



Advertisements
Similar presentations
THE FOURTH AMENDMENT Constitutional Law.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Teaching American History: Moot Courts and Constitutional Concepts.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Exclusionary Rule ACG 6935/4939.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Criminal Justice Process: the investigation – Chp 12 Arrest – Suspect taken into custody 4 th Amendment: The right of the people to be secure in their.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
4th Amendment.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
The Exclusionary Rule The Fourth Amendment History of the Exclusionary Rule Deontological Defenses of the Rule Consequentialist Defenses Objections Alternatives.
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Search Warrants & Seizure of Electronic Evidence.
Class 11 Internet Privacy Law Government Surveillance.
Our Court System Terms, procedures, and ideas you need to know.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Psychology of Homicide Unit II
The Bill of Rights.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
Amendments in Action Search and Seizure. The 4 th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against.
4. Legal Limitations on Police behavior: a)Police are authorized to use coercive and intrusive measures in enforcing the law  Legal use of force = defining.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
The Investigation.  Right to remain silent  Right to an attorney  No interrogation should take place before they read  Are a result of the US Supreme.
Strip search th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches.
AP U.S. GOVERNMENT & POLITICS – Civil Liberties Civil Liberties part 3.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Fourth Amendment Search and Seizure Civil Liberties.
CJ305 UNIT 7 Instructor: K. Austin Zimmer, J.D. Make sure you adjust your speakers and audio settings on your computer so you can hear the music.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
Arrest and Detainment How do you know you’ve been arrested?
HW due today- Finish researching a second case Agenda NVCs Warm-up Establishment clause and balancing test Crime and amendments Rights of the accused Objectives.
The Paralegal Professional Chapter Eight Criminal Procedure and Administrative Law.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
4th Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Courts System Search Warrants.
Limiting the Right of Search
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
The University of Adelaide, School of Computer Science
Amendments in Action Search and Seizure.
Criminal Investigation and the Law
Forensics Week 7.
Protection of News Sources
The Fourth Amendment and the Home
Amendments in Action Search and Seizure.
Search and Seizure Concepts
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Criminal Procedure: Theory and Practice, 2d.
Pre-Trial Procedures Search and Seizure.
4th amendment By: KEila Aguilar.
Chapter 17 Videotapes Photographs Documents Writings.
The University of Adelaide, School of Computer Science
IA455 Chris Danieli and Zachary gibson
Search & Seizure The act of taking possession of this property.
Search & Seizure in Schools:
Arrest.
Presentation transcript:

1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure CJ341 – Cyberlaw & Cybercrime Lecture #25 M. E. Kabay, PhD, CISSP-ISSMP D. J. Blythe, JD School of Business & Management

2 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Topics  Intro  Fourth Amendment  Federal Statutes

3 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Intro  Technology + Computer Crime = Significant legal issues around privacy  Concerns pertaining to:  Personal privacy  Intrusion into private lives  Surveillance

4 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Fourth Amendment Review  Protection from unreasonable government search & seizure: “ The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  Requires warrant for search by LEO or other government agent(s) [not owners] where individual has reasonable expectation of privacy  Warrant must be based on probable cause  Exceptions to warrant requirement may apply E.g., plain view, consent, exigent circumstances

5 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Searching & Seizing Computers  Fourth Amendment right is personal  Only claim expectation of privacy when one owns, possesses, or controls  E.g., 1992: US v. Taylor. Defendant lacked standing to challenge search of co-defendant’s computer because no evidence of ownership or possessory interest presented  Particularity requirement  Search warrant must describe with particularity place and items to be searched  Goal of 4 th Amendment is to prevent widespread searches Computer searches = balancing act Broad search may be useful for evidence collection, but too broad may result in evidence suppression (overbreadth)

6 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Searching & Seizing Cont.  Suppression: Defendant can move to suppress evidence if improperly obtained or where warrant requirements disregarded (“Motion to Suppress”)  2001: In re Grand Jury Subpoena Duces Tecum.  Court found subpoena for all computer disks overbroad because …  …no need to subpoena all of defendant’s computer disks  Intermingled Document Rule:  When irrelevant and relevant documents so intermingled, broader search warrant may be required (US v. Tamura)  Rule has been extended to computer searches

7 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Warrant Exceptions: Plain View  Warrantless seizure of evidence of a crime lawfully obtained if in plain view  1999: US v. Carey: no plain view exception where police opened computer files not clearly specified in the warrant  Police warrant specified search for files related to drug sales/distribution  Police couldn’t find drug related files, but observed files titled with sexually suggestive names, and opened those files, which contained child pornography  Defendant convicted of possessing child pornography, appealed  Prosecution used “file cabinet” analogy  Court found no plain view exception because contents were seized, not just the files  Images not in plain view

8 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Warrant Exceptions: Consent  Can challenge consent  Was it given?  Scope of consent Reasonable person standard  US v. Turner: defendant consented to search of apartment for evidence of sexual assault.  Police viewed nude woman photo on computer and searched hard-drive without warrant and found child pornography  Applying the reasonable person standard, court concluded that search was beyond scope of consent

9 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Consent (cont’d)  Consent to seize computer does not necessarily = consent to search  But see US v. Al-Marri (2002)  FBI seized laptop pursuant to consent of defendant, a computer science graduate student, and indicated that they wanted to bring it back to FBI offices to “take a look”  Defendant later asked for computer back at FBI offices, told “no” but didn’t protest  Court found defendant consented to search

10 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Warrant Exceptions: Authority to Grant Consent  Defendant can challenge consent on grounds of no authority for consent  Third party (e.g., parent or roommate gives consent to search of computer)  Analysis turns on access and control Does third party have joint access to or control over computer?  Limits to authority  E.g., co-user can’t consent to search of password-protected files belonging to another user, but can give consent to search of the shared computer

11 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved.  Search of business computers sometimes leads to seizure of privileged attorney-client material  “Taint procedures” used to minimize risk  Warrant to seize materials  Materials sorted based on potential existence of privilege  Potential privileged documents then sent to independent attorney or judge  US v. Lin Lyn Trading: Yellow notepad containing privileged notes between lawyer and defendant seized (contained incriminating statements by defendant).  Found unlawful seizure and irreparable injury from government possession of notepad Searches & Attorney-Client Materials

12 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Electronic Communications Privacy Act (ECPA)  Interception of Electronic Communications  Government can intercept electronic communications with judicial approval  Showing of probable cause  Consent  ECPA allows suppression of unlawfully intercepted wire or oral communications  Does not automatically provide same for electronic communications  Defendant must move for suppression

13 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Accessing Stored Electronic Communications  Stored Wire and Electronic Communications Act  Prohibits unauthorized access to stored electronic communications  Gov’t must follow specific procedures before accessing stored communications E.g., obtaining warrant for unopened e- mail

14 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Obtaining Basic Subscriber Information  U.S.A.P.A.T.R.I.O.T. Act expands gov’t access  E.g., service provider can voluntarily provide info to gov’t without recourse if reasonably believes emergency of death or serious injury  Gov’t can compel turn-over of subscriber info or electronic communication transaction records in connection with terrorism or intelligence activities  Defendant can argue against disclosure  Unduly burdensome  Excessively voluminous  More about U.S.A.P.A.T.R.I.O.T. in Lecture 28

15 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Privacy Protection Act  PPA Restricts gov’t from engaging in intrusive searches or seizures of materials of:  Media  Public Communications  First Amendment activities  Gov’t must use subpoenas (distinguish from warrants)  No surprise searches permitted  No search of standalone computers  Remedies  No suppression of evidence collected in violation of PPA  Civil damages only

16 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Now go and study