Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

Size: px
Start display at page:

Download "Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal"

Transcription

1 Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

2 Course Notes: Much of the material in the slides comes from the books and their associated support materials, below as well as many of the references at the class web site Baase, Sara and Henry, Timothy, A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (5th Edition) Pearson, March 9, 2017, ISBN-13: Quinn, Michael, Ethics for the Information Age (7th Edition), Pearson, Feb. 21, 2016,ISBN

3 Lesson Goals The Fourth Amendment and privacy The Supreme Court and privacy Wiretapping privacy Tracking and privacy The Privacy Act of 1974 Government data collection and abuses The Real ID Act The National Security Agency and your privacy FISA Courts The Patriot Act 3

4 4

5 The Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized This right is specific to the United States Constitution and has very high levels of support across all political parties, classes, etc. and is protected by the Supreme Court Most countries do not have such protections, even in many Western Democracies The Information and Electronic Age has added new challenges to this Amendment and the right to privacy While this amendment was really directed against the government, many other organizations now exist that can invade our privacy electronically 5

6 Different Types Of Privacy Initially only applied to physical privacy within the home A man s home is his castle!! No seizure without proper warrant Much of our personal information is no longer safe in our homes It resides in huge databases outside our control New technologies allow the government to electronically search our homes without entering them and search our persons from a distance without our knowledge Surveillance Wiretaps Phone records police can look at your phone records to prove that you were texting while driving Data searches Medical records Lost or stolen data can be revealed (WikiLeaks) Businesses search the Internet before hiring watch what you put on Facebook Everything is exposed when we get on an airplane 6

7 The Supreme Court And Privacy (1) Olmstead vs. United States 1928 The court decides that wiretapping is legal, no matter what the reason or motivation, because it is not expressly prohibited in the Constitution Interpreted the Fourth Amendment to apply only to physical intrusion and only to the search or seizure of material things, not conversations. Used to put many gangsters out of business Justice Brandeis' dissent lays the groundwork for future understandings of privacy. Katz v. United States (1967) Reversal of Olmstead In this case, a reasonable expectation of privacy test was created. Federal agents had attached a listening device to the outside of a phone booth Evidence of Katz s end of the conversations obtained by the listening device was admitted in his trial in which he was accused of transmitting wagering information by telephone. The Supreme Court ruled that the electronic "listening to" and recording of Mr. Katz's conversation violated the privacy upon which he justifiably relied and thus constituted a search and seizure under the Fourth Amendment. In summary, the Fourth Amendment protects people, not places. To intrude in a place where reasonable person has a reasonable expectation of privacy requires a court order U.S. vs. Jones (2012) Cars cannot be tracked via GPS without a warrant 7

8 The Supreme Court And Privacy (2) United States v. Miller 1976 If we share information with an institution such as a bank, then we can t have a total expectation of privacy Government can look at bank records In general, if we publicly share information we may not have a true expectation of privacy Electronic Privacy Information Center vs U.S. (2013) The NSA received secret Surveillance Court approval to collect vast amounts of metadata from telecom giant Verizon and leading Internet companies, including Microsoft, Apple, Google, Yahoo and Facebook. The information includes the numbers and location of nearly every phone call to and from the United States in the past five years, but did not actually monitor the conversations themselves - to do so would require a separate, specifically targeted search warrant. Supreme Court refused to over turn Surveillance Court decision, bur gave EPIC option of going through the lower courts Riley vs. California (2014) The police generally may not, without a warrant, search digital information on a cell phone seized from an individual who has been arrested. This overturned previous rulings which stated that phones were like other personal property which could be searched when a person was arrested FBI vs Apple Government wanted Apple to write code to break into phone of San Bernardino terrorists A court told Apple to comply Never reached the Supreme Court as FBI hired another firm which somehow broke the phone, and FBI withdrew the case 8

9 9

10 Overview The Fourth Amendment protects our right to privacy Most searches, including wiretaps, seizure of property, etc. require warrants and probable cause Technology has changed the scope and boundaries of communications, in particular in the past 20 years The Communications Assistance for Law Enforcement Act (CALEA) of 1994 Actually requires that communications systems be designed or modified to allow law enforcement agencies the ability to intercept various forms of communications Note the government creating its own claim right and imposing it through law and regulation Expanded on several occasions to keep up with technology changes Obviously a major clash point in trade-off between privacy and the law Must your phone have a Back door to comply with this law? Kyllo v United States (2001) Supreme Court ruled that police could not use thermal-imaging devices to search a home from the outside without a search warrant Court stated that where government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a search 10

11 Wiretapping and Protection (1) Telephone and telegraph communications have been used by for unlawful or other less than ethical purposes from the outset Organized crime Drug trade Human trafficking Spying Money laundering Eavesdropping (party line phones) Wiretapping followed soon after the advent of the telegraph and telephone Especially used by the FBI and other law enforcement agencies against organized crime Temptations were great and many times public officials and others were wiretapped (without a warrant) for political or economic data collection Congress established the Communications Act in 1934 Only the sender may authorize the release of any sent message warrants weren t mentioned Supreme Court said this applied to wiretapping as well note that these were no longer just physical, but any type of message FBI and other agencies often ignored these rules FBI Director J. Edgar Hoover collected lots of information for leverage (Kennedy, M. L. King, etc.) Robert Kennedy (as Attorney General) used illegal wiretaps against the Mafia on a regular basis, even while Hoover was using illegally collected information as leverage against the Kennedy s 11

12 Wiretapping and Protection (2) In 1967 (Katz v. U.S.) court declared that all wiretapping and other electronic surveillance was illegal without a warrant In 1968 Congress explicitly allowed wiretapping and other electronic surveillance with a court order, affirming the Katz decision in law As and other forms of communications evolved Congress added new protections Electronic Communications Privacy (1986, amended 1994) extended wiretapping prohibition and warrant requirements to and other forms of electronic communications, including wireless communications Warrant requirements even extend to third parties that store your or other electronic communications Patriot Act (to be discussed shortly) loosens some of these restrictions, especially on collection of metadata 12

13 Complying With The Communications Assistance for Law Enforcement Act Government wanted to make sure that law enforcement could keep up with technological advancements and passed CALEA in 1994 Complying with CALEA requires: Designers must cooperate with and seek approval from the government for new technological innovations that improve security Providers must allow the government to obtain access to metadata and data, and sometimes place monitoring tools in their systems Suppliers must provide access to encryption techniques and keys, and allow for reverse engineering Makes an assumption that the government won t misuse the information 13

14 Mobile Devices, GPS Tracking and Privacy Rules The court has in general extended Fourth Amendment protections to new technologies Should a search warrant before the police can search the contents of a cell phone Riley vs. California (2014) The police generally may not, without a warrant, search digital information on a cell phone seized from an individual who has been arrested. The information in a cell phone is so extensive that the different items being searched for each requires a warrant Stingrays allow you to triangulate the location of a phone Is it a violation of privacy to track a publicly broadcast location signal? Due to publicity, most federal and other government agencies obtain a warrant before tracking a person s cell phone Can GPS trackers be secretly installed on a car in order to track a person s movements U.S. v Jones (2012) Court ruled that a vehicle is one of a person s personal effects and therefore a warrant is required to place the tracking device on the car Tracking a car 24 hours/day goes beyond observing a car passing in public 14

15 New Technologies and Court Decisions Kyllo v. United States (2001) said that you could not use thermal imaging devices without a warrant Does Kyllo apply to other types of radar and motion sensors Are drones allowed to track vehicles, even if GPS trackers aren t allowed? Many of these issues have yet to come before the courts 15

16 16

17 Video Surveillance Courts so far have upheld video surveillance in public locations Used to provide security Used to identify criminals after a crime Sometimes used to enforce curfews and other laws Combined with facial recognition to identify criminals Issue arising as data is mined to correlate new types of information Persons visiting a home (think of the Godfather movie opening wedding scene and the FBI) Facial recognition Release of photos to the public to help in identifying suspects Could be combined with location tracking to prove or disprove that you were at a certain location at a certain time 17

18 The Privacy Act of 1974 (1) Faced with a growing amount of collected data the Privacy Act of 1974 was enacted to ensure the the government did not abuse its ever growing collection of information Key provisions and principles: Government can only record what is relevant and necessary to the legal purpose for which the government collected the information There must be no personal data record-keeping system whose very existence is secret. There must be a Federal Registry of all systems and databases that hold personal information, with exceptions for some security databases There must be a way for an individual to find out what information about him is in a record and how it is used. There must be a way for an individual to prevent information about him that was obtained for one purpose from being used or made available for other purposes without his consent. There must be a way for an individual to correct or amend a record of identifiable information about him. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precaution to prevent misuse of the data. 18

19 The Privacy Act of 1974 (2) No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains There are specific exceptions for allowing the use of personal records: For statistical purposes by the Census Bureau and the Bureau of Labor Statistics For routine uses within a U.S. government agency For archival purposes "as a record which has sufficient historical or other value to warrant its continued preservation by the United States Government" For law enforcement purposes For congressional investigations Other administrative purposes 19

20 The Privacy Act of 1974 (3) The Computer Matching and Privacy Protection Act of 1988, P.L , amended the Privacy Act of 1974 by adding certain protections for the subjects of Privacy Act records whose records are used in automated matching programs. These protections have been mandated to ensure: Procedural uniformity in carrying out matching programs Due process for subjects in order to protect their rights Oversight of matching programs through the establishment of Data Integrity Boards at each agency engaging in matching to monitor the agency's matching activity. 20

21 Data Collection By The Government Problems In Practice Have you ever put something away and then forgotten about it? The government has all types of collected information that it hasn t even discovered Computerized systems and electronic recording make it much easier to get at that data for both good and bad purposes 21

22 Agencies That Collect Data About You Social Security and the SSN has become a de facto ID for many purposes The IRS (which uses the SSN) The DMV for a while the SSN was displayed on your license or ID in many states Your license is now part of the Real ID program and is the minimum needed to get onto a plane (in lieu of a passport) The Transportation Safety Administration (TSA) which keeps track of all your airplane travels, and is ready to greet you when you return from abroad The Census Bureau although this is supposed to be anonymous Your school or university many use your SSN as your ID Medical records are often collected and shared with the government Social Welfare agencies Police, the FBI, other law enforcement agencies Even if you are not a criminal, just getting a security clearance requires turning over lots of personal data Public records are readily available and published Property or business ownership Once information is collected it may be subject to release under the Freedom of Information Act 22

23 Government and Private Data Sources Government sometimes pays companies to mine data The Patriot Act allow the government to mine phone company records The government is often monitoring Facebook and other sites in the counterterrorism fight Government contains records on every college student The use is meant to be benign trying to track how students are doing in these universities Who graduates and how long does it take This data could also be used for less benign purposes Can someone back door into your health history? 23

24 Uses and Misuses of Government Data Collection Some purposes are good, useful and generally supported Understanding population demographics and movements Allocating representation (one of the original purposes of the census, along with taxation) Tax collection, college loan collection, etc. Maintaining security this can also be abused Draft registration Tracking criminals and sex offenders in particular Going after a parent owing child support Other purposes can be bad or illegal Release of personally embarrassing information Identity theft Misidentification (people have been put on the no-fly list due to mistaken identity) Denial of credit Identification of political beliefs by donations (overrides the secret ballot concept) Industrial espionage Other political mischief We would like to evaluate each use of the data individually, but sometimes this doesn t happen Therefore we need to evaluate the collection of data types, or aggregated data, against all the pros and cons a risk/reward identification and trade-off 24

25 The Real ID Act of 2005 Congress wanted to have a more uniform and fair way for people to be identified, especially when getting onto airplanes or entering federal facilities Set a federal standard for each driver s license or personal ID You need a new driver s license by 2020 in California in order to board a plane (unless you have a passport) Required each person to provide supporting documentation such as a birth certificate, with the states evaluating the information according to the standard, before the state issued the license or ID 25

26 A National ID Card? (1) The national identification card uses a large database that links all of the 50 states' databases together. This national database, containing every card holder's personal information, can be accessed from anywhere, including schools, airport security checks, police stations, etc. Pros for national identification system: You would need the actual card with biometrics to verify identity. The cards would be more secure than the current Social Security Card You d be able to use one card instead of the many you carry with you now Could help reduce credit card, government benefits, and other types of fraud Used to e-verify before employment Easier to track criminals and terrorists Easier for police to check criminal backgrounds 26

27 A National ID Card? (2) Cons for national identification system: History when a government has so much control over information it tends to use it. Potential for invasion of privacy is tremendous If your identity is hacked it may be even more troublesome Every system so far created has been hackable The national ID card is supposed to be harder to forge than our ID cards of today; However, this challenge may actually increase the risk of identity theft. Many people will have access to the national database with so much information about you. There have already been incidents of identity theft with this system in other countries. Recently in Russia, policemen and civilians were apprehended after having forged ID cards that would have allowed them direct access to President Vladimir Putin's office. National identification cards are facing opposition all across the globe. Countries such as Australia, New Zealand, the Philippines, Thailand, and the United Kingdom have been fighting the installation of a national identification system for the past 11 years. Class Discussion What do you think make your own lists that add to the ideas shown above Develop evaluation criteria and give a score to the National ID Card idea (Positive means yes, negative no) 27

28 28

29 A Brief Summary Of Early Activities (1) Operation Shamrock Continuation of World War II interception of international telegrams by the National Security Agency (1952) Expanded to telephone calls Kennedy (continued even after wiretapping without a warrant made illegal) Organized crime figures Cuba-related individuals and businesses Johnson and Nixon Nixon Vietnam war protesters War on drugs Carnivore Surveillance System Created by FBI in late 1990s Monitored Internet traffic, including exchanges Carnivore = Windows PC + packet-sniffing software Captured packets going to/from a particular IP address Replaced with commercial software 29

30 A Brief Summary Of Early Activities (2) TALON Database Created by US Department of Defense in 2003 Supposed to contain reports of suspicious activities or terrorist threats near military bases Reports submitted by military personnel or civilians Reports assessed as credible or not credible by military experts Reports about anti-war protests added to database Many of these reports later deleted from database In 2007 new Under Secretary of Defense for Intelligence recommended that TALON be terminated PRISM Program NSA had obtained access to servers of most major service providers in order to access messages and monitor communications outside the U.S. This program was exposed by Edward Snowden 30

31 The National Security Administration, Intelligence Gathering and FISA Courts (1) The NSA has a legal role in the collection of data Created in secret by Truman in 1952 Has been limited in the past to collecting information outside the U.S. In 1978 the Foreign Intelligence Surveillance Act was passed to monitor the NSA Set up secret FISA courts with the ability to issues warrants, allowing interception of communications to and from the U.S. in response to government requests to monitor spies and terrorists, in particular if they are U.S. citizens or other operating within the U.S. Law prohibited the NSA from collecting masses of telegrams (this was 1978) and from compiling lists of Americans to watch without a court order 31

32 The National Security Administration, Intelligence Gathering and FISA Courts (2) NSA started monitoring metadata (data about data) Some of this seemed to be outside the scope of warrants, since personal content of the data was not collected unless a pattern was found NSA set up collection facilities at many communications companies to collect data FISA was amended in 2007 to allow the government to wiretap communications to/from foreign countries without oversight by FISA Court FISA Act of 2008 protects companies from law suits when they cooperate with the government In terrorism cases some of the rules of the Fourth Amendment, such as revealing all data collected to the accused, does not apply There will always be trade-offs between security and privacy Ultimately we need to ask who owns the information Once we know who owns information we can discuss the Fourth Amendment Rights 32

33 The Patriot Act (1) Ten basic provisions (I-IV) Title I: Enhancing domestic security against terrorism Section 102 expresses the Sense of Congress condemning discrimination against Arab and Muslim Americans. Title II: Enhanced surveillance procedures Includes enhanced wiretapping under court supervision Allows law enforcement to seize voice mail messages. Allows law enforcement to subpoena additional subscriber records from service providers such as records of sessions and durations and means and source of payment. Allows information to be gathered prior to collection of a warrant in time critical situations Title III: Anti-money-laundering to prevent terrorism Title IV: Border security 33

34 The Patriot Act (2) Ten basic provisions (V X) Title V: Removing obstacles to investigating terrorism Authorizes the Attorney General to make funds available for the payment of rewards for assistance in combating terrorism. Includes payments to an individual who furnishes information leading to the prevention of terrorism or the identity of someone who holds a key leadership position in a terrorist organization in the State Department s rewards program. Authorizes federal officers who conduct electronic surveillance or physical searches to acquire foreign intelligence information, to consult with other Federal law enforcement officers to coordinate efforts to protect against terrorist attacks or clandestine intelligence activities by a foreign power or its agent. Allows law enforcement easier access to telephone toll and transactional records, financial records, and consumer reports. Title VI: Victims and families of victims of terrorism Title VII: Increased information sharing for critical infrastructure protection Greater cooperation between FBI, NSA, CIA, Immigration, State Law Enforcement, etc. Title VIII: Terrorism criminal law Title IX: Improved intelligence Again the emphasis was on coordination amongst agencies Title X: Miscellaneous Modified in 2015 to restrict bulk collection of phone records This could hurt data mining efficiency and ability to track terrorist activities proponents believe it is a necessary control on excessive government power 34

35 The Patriot Act and Data Mining (1) The whole debate on the Patriot Act centered around whether or not the government could continuously collect and store metadata from the ISPs and cell/land-line phone providers A political/privacy argument conflicted with a technical argument Remember the data mining section The Query Driven Approach When a query is issued to a client side, a metadata dictionary translates the query into one or more queries, appropriate for the individual heterogeneous site involved. Now these queries are mapped and sent to the local query processor. The results from heterogeneous sites are integrated into a global answer set. Advantages Government doesn t get to keep a large data base of information on permanent file Don t need to maintain a large IT infrastructure Disadvantages The Query Driven Approach needs complex integration and filtering processes. It is very inefficient and very expensive for frequent queries. This approach is expensive for queries that require aggregations (constant regrouping) of data 35

36 The Patriot Act and Data Mining (2) Remember the data mining section The Update-Driven Approach In the update-driven approach, the information from multiple heterogeneous sources is integrated in advance and stored in a warehouse. This includes data scrubbing the process of validating data for correctness in advance This information is available for direct querying and analysis. Advantages This approach provides high performance. The data can be copied, processed, integrated, annotated, summarized and restructured in the semantic data store in advance. In other words, we store data in the way(s) we want to look at it Query processing does not require an interface with the processing at the local original data sources. Much less intrusive and resource intensive to pull the data once, rather than whenever you want to query Disadvantages Must maintain a large infrastructure to import, store and maintain data Privacy concerns since the government now has access to so much data 36

37 The Patriot Act Evaluated The Patriot Act is constantly being evaluated in terms of its consequences versus its value Does it interfere with Natural Rights as Locke sees them It is a prime example of the evolving Social Contract, as Hobbes might say? Protections are put into the very first article to protect minority and in particular Muslim rights as part of the evaluated calculation. Certain rights to privacy are ceded to the state for a perceived greater good. War can often lead to curtailment of rights therefore it is a time to be especially careful about ceding rights The Patriot Act was modified in 2015 to reflect the concern (of a minority) about government intrusiveness via data mining A greater value was assigned to constraining the government, which modified the immediate post 9/11 valuations 37

Emerging Technology and the Fourth Amendment

Emerging Technology and the Fourth Amendment Saber and Scroll Volume 1 Issue 1 Spring 2012 (Edited and Revised April 2015) Article 10 March 2012 Emerging Technology and the Fourth Amendment Kathleen Mitchell Reitmayer American Public University System

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF HOW COMPANIES ENGAGED IN TRANSPARENCY REPORTING CATEGORIZE & DEFINE U.S. GOVERNMENT LEGAL PROCESSES DEMANDING USER DATA, AND IDENTIFICATION

More information

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining 6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining Lecturer: Danny Weitzner Cars and Planes : Profiling and Data-mining, post 9/11 Discussion - Midterm Logistics

More information

The GPS Tracking Case Fourth Amendment United States Constitution

The GPS Tracking Case Fourth Amendment United States Constitution Fourth Amendment United States Constitution The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no

More information

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security. Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions

More information

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned Page 1 of 5 URL: http://www.aclu.org/safeandfree/safeandfree.cfm?id=13356&c=206 The Five Problems With CAPPS II August 25, 2003 The new version of CAPPS II is all dressed up in the language of privacy

More information

National Security Law Class Notes

National Security Law Class Notes National Security Law Class Notes Legal Regulation of Intelligence Collection I. Collecting Communications Content I Foundations of Constitutional and Statutory Constraint Intelligence cycle flow chart

More information

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS JUNE 8, 2017 Bracewell LLP makes this information available for educational purposes. This information does not offer specific legal advice

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

Lesson 1: Role of the Judicial Branch in the US

Lesson 1: Role of the Judicial Branch in the US Judicial Branch Powerpoint Questions 1. What is the role of federal courts? Lesson 1: Role of the Judicial Branch in the US 2. What is the purpose of the Supreme Court? 3. Define District Courts. 4. What

More information

DRAFT [8-4-15] TUFTS UNIVERSITY EXPERIMENTAL COLLEGE FALL 2015

DRAFT [8-4-15] TUFTS UNIVERSITY EXPERIMENTAL COLLEGE FALL 2015 DRAFT [8-4-15] TUFTS UNIVERSITY EXPERIMENTAL COLLEGE FALL 2015 COURSE: EXP-0070-F The Law of Search and Seizure in the Digital Age: Applying the Fourth Amendment to Current Technology Tuesday 6:00-8:30PM

More information

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014 Class #10: The Extraterritorial Fourth Amendment Professor Emily Berman Thursday, September 25, 2014 Thursday, September 25, 2014 Wrap Up Third Party Doctrine Discussion Smith v. Maryland Section 215 The

More information

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4% Sample Conducted May 21-23, 2013 Margin of Error ±4% 1000 General Population Respondents 1. The following is a summary of the bill of rights in shuffled order. Please select the one which you believe corresponds

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

Privacy and Information Security Law

Privacy and Information Security Law Privacy and Information Security Law Randy Canis CLASS 14 pt. 1 National Security and Foreign Intelligence; Government Records 1 National Security and Foreign Intelligence 2 Application of Laws Ordinarily,

More information

WIRETAPPING, SURVEILLANCE AND

WIRETAPPING, SURVEILLANCE AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY WIRETAPPING, SURVEILLANCE AND THE INTERNET By CHRISTOPHER BRONK, PH.D. FELLOW IN TECHNOLOGY, SOCIETY AND PUBLIC POLICY JAMES A. BAKER

More information

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background Charles Doyle Senior Specialist in American Public Law July 31, 2015 Congressional Research Service 7-5700

More information

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment 1050 17 th Street, N.W. Suite 1150 Washington, DC 20036 Free Markets. Real Solutions. 202.525.5717 www.rstreet.org Statement for the Record Before: Reps. Ted Poe, Pete Olson and Blake Farenthold April

More information

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4% Sample Conducted May 21-23, 2013 Margin of Error ±4% 1000 General Population Respondents 1. The following is a summary of the bill of rights in shuffled order. Please select the one which you believe corresponds

More information

January 14, Dear Chairman Graham and Ranking Member Feinstein:

January 14, Dear Chairman Graham and Ranking Member Feinstein: January 14, 2019 The Honorable Lindsey Graham, Chairman The Honorable Dianne Feinstein, Ranking Member U.S. Senate Committee on the Judiciary Dirksen Senate Office Building 224 Washington, DC 20510 Dear

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

1 June Introduction

1 June Introduction Privacy International's submission in advance of the consideration of the periodic report of the United Kingdom, Human Rights Committee, 114 th Session, 29 June 24 July 2015 1. Introduction 1 June 2015

More information

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013 Report on the Findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection 27 November 2013 Report on the Findings of the EU Co-Chairs of the Ad Hoc EU-US Working Group on Data Protection

More information

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Anti-Cyber Crime Law (8 Rabi / 26 March 2007) Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007) August 1, 2010 Kingdom of Saudi Arabia Bureau of Experts at the Council of Ministers Official Translation Department Translation of Saudi Laws Anti-Cyber

More information

The Identity Project

The Identity Project The Identity Project www.papersplease.org Edward Hasbrouck v. U.S. Customs and Border Protection Privacy Act and FOIA (Freedom of Information Act) lawsuit for records of DHS surveillance of travelers filed

More information

The Supreme Court, Civil Liberties, and Civil Rights

The Supreme Court, Civil Liberties, and Civil Rights MIT OpenCourseWare http://ocw.mit.edu 17.245 The Supreme Court, Civil Liberties, and Civil Rights Fall 2006 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Voting Corruption, or is it? A White Paper by:

Voting Corruption, or is it? A White Paper by: Voting Corruption, or is it? A White Paper by: By: Thomas Bronack Bronackt@gmail.com JASTGAR Systems, Mission and Goal (917) 673-6992 Eliminating Voting Fraud and Corruption Our society is too far along

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21441 Updated July 6, 2005 CRS Report for Congress Received through the CRS Web Summary Libraries and the USA PATRIOT Act Charles Doyle Senior Specialist American Law Division The USA PATRIOT

More information

Safeguarding Equality

Safeguarding Equality Safeguarding Equality For many Americans, the 9/11 attacks brought to mind memories of the U.S. response to Japan s attack on Pearl Harbor 60 years earlier. Following that assault, the government forced

More information

Chapter 33. (CalECPA)

Chapter 33. (CalECPA) Chapter 33 Electronic Communications and Records Searches (CalECPA) Generally The California Electronic Communications Privacy Act (CalECPA): CalECPA sets forth the means by which officers may obtain electronic

More information

Identity and Economics: Terrorism and Privacy. Adam Shostack

Identity and Economics: Terrorism and Privacy. Adam Shostack Identity and Economics: Terrorism and Privacy Adam Shostack Victor Lopez-Florez An illegal immigrant from El Salvador, was paid $100 to help Ahmed Alghamdi get a real Virginia ID card. Alghamdi was one

More information

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

Cell Site Simulator Privacy Model Bill

Cell Site Simulator Privacy Model Bill Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner

More information

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER Alan G. Hevesi COMPTROLLER DEPARTMENT OF MOTOR VEHICLES CONTROLS OVER THE ISSUANCE OF DRIVER S LICENSES AND NON-DRIVER IDENTIFICATIONS 2001-S-12

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 105 SUBJECT: Identity Theft EFFECTIVE DATE: 16 June 2006 PAGE 1 OF 8 REVIEW DATE: 30 November 2017 APPROVED: CHANGE

More information

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2013 16987/13 JAI 1078 USA 61 DATAPROTECT 184 COTER 151 ENFOPOL 394 NOTE from: to: Subject: Presidency and Commission Services COREPER Report on the

More information

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2 Chapter 20: Civil Liberties: Protecting Individual Rights Section 2 Objectives 1. Outline Supreme Court decisions regarding slavery and involuntary servitude. 2. Explain the intent and application of the

More information

The New Canadian Tort of Invasion of Privacy DAVID DEBENHAM

The New Canadian Tort of Invasion of Privacy DAVID DEBENHAM The New Canadian Tort of Invasion of Privacy DAVID DEBENHAM BA, LL.B, LL.M (Ottawa), LLM (York), MBA, D.I.F.A, CMA, C.F.I, C.F.E,C.F.S. Adds to the list of investigator torts Trespass to the person/false

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

CRS Report for Congress

CRS Report for Congress Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act

More information

T-Mobile US, Inc. Transparency Report for 2016

T-Mobile US, Inc. Transparency Report for 2016 T-Mobile US, Inc. Transparency Report for 2016 This Transparency Report provides information about responses prepared during 2016 to legal demands for customer information. This Report includes, and makes

More information

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR HOUSE OF REPRESENTATIVES STAFF ANALYSIS BILL #: CS/HB 1363 Organized Criminal Activity SPONSOR(S): Gonzalez and others TIED BILLS: IDEN./SIM. BILLS: REFERENCE ACTION ANALYST STAFF DIRECTOR 1) Safety &

More information

Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group

Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group White Paper on Anti-Terrorism Legislation: Surveillance &Wiretap Laws Developing Necessary and Constitutional

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

CRS Report for Congress

CRS Report for Congress Order Code RS22384 Updated February 21, 2006 CRS Report for Congress Received through the CRS Web USA PATRIOT Act Additional Reauthorizing Amendments Act of 2006 (S. 2271) Summary Brian T. Yeh Legislative

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters March 2009 DEPARTMENT OF STATE Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process

More information

Telecommunications Information Privacy Code 2003

Telecommunications Information Privacy Code 2003 Telecommunications Information Privacy Code 2003 Incorporating Amendments No 3, No 4, No 5 and No 6 Privacy Commissioner Te Mana Matapono Matatapu NEW ZEALAND This version of the code applies from 2 8

More information

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 Current Laws: It is unlawful for any person to willfully and with

More information

Fear of Online Crime: Americans support FBI interception of criminal suspects and new laws to protect online privacy

Fear of Online Crime: Americans support FBI interception of criminal suspects  and new laws to protect online privacy EMBARGOED FOR RELEASE AT 6:30 PM EASTERN MONDAY, APRIL 2, 2001 Fear of Online Crime: Americans support FBI interception of criminal suspects email and new laws to protect online privacy By Susannah Fox,

More information

National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments Charles Doyle Senior Specialist in American Public Law December 27, 2010 Congressional

More information

TITLE III WIRETAPS. WHO S LISTENING?

TITLE III WIRETAPS. WHO S LISTENING? TITLE III WIRETAPS. WHO S LISTENING? Between the years 2002 and 2012, State and Federal Judges across the United States received 23,925 applications for wiretaps. All but 7 were granted. 1 In 2012, there

More information

Institute for Development of Freedom of Information Statistics on Telephone Surveillance and Secret Investigation in Georgia.

Institute for Development of Freedom of Information Statistics on Telephone Surveillance and Secret Investigation in Georgia. Institute for Development of Freedom of Information 2016 Statistics on Telephone Surveillance and Secret Investigation in Georgia February, 2017 Author: Tamar Iakobidze Contact Information: A. Griboedov

More information

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

PRO/CON: Is Snowden a whistle-blower or just irresponsible? PRO/CON: Is Snowden a whistle-blower or just irresponsible? By McClatchy-Tribune News Service, adapted by Newsela staff on 02.04.14 Word Count 1,340 Demonstrators rally at the U.S. Capitol to protest spying

More information

Testimony of Peter P. Swire

Testimony of Peter P. Swire Testimony of Peter P. Swire Review Group on Intelligence and Communications Technology Before the HOUSE COMMITTEE ON THE JUDICIARY Hearing on: Examining Recommendations to Reform FISA Authorities February

More information

GENERAL POLICE ORDER CLEVELAND DIVISION OF POLICE

GENERAL POLICE ORDER CLEVELAND DIVISION OF POLICE GENERAL POLICE ORDER CLEVELAND DIVISION OF POLICE ORIGINAL EFFECTIVE DATE : ASSOCIATED MANUAL: CHIEF OF POLICE: REVISED DATE: 08/20/2018 RELATED ORDERS: NO. PAGES: 1of 9 NUMBER: Search and Seizure This

More information

In George Orwell s 1984, the entire book is about a time in Oceania when a group has

In George Orwell s 1984, the entire book is about a time in Oceania when a group has Section 1. In, the entire book is about a time in Oceania when a group has taken complete control over the city (society, really). Big Brother and the party are the control. He is who everyone is expected

More information

THE RUTHERFORD INSTITUTE

THE RUTHERFORD INSTITUTE THE RUTHERFORD INSTITUTE Post Office Box 7482 Charlottesville, Virginia 22906-7482 JOHN W. WHITEHEAD Founder and President TELEPHONE 434 / 978-3888 FACSIMILE 434/ 978 1789 www.rutherford.org Via Email,

More information

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Gina Stevens Legislative Attorney Charles Doyle Senior Specialist in American Public Law October 9,

More information

T-Mobile Transparency Report for 2013 and 2014

T-Mobile Transparency Report for 2013 and 2014 T-Mobile Transparency Report for 2013 and 2014 This Transparency Report provides information about requests from law enforcement agencies and others for customer information we 1 received in 2013 and 2014

More information

LEGAL TERMS OF USE. Ownership of Terms of Use

LEGAL TERMS OF USE. Ownership of Terms of Use LEGAL TERMS OF USE Ownership of Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Compas web site located at www.compasstone.com, and all associated sites linked to www.compasstone.com

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO Case 2:13-cv-00257-BLW Document 27 Filed 06/03/14 Page 1 of 8 ANNA J. SMITH IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO Plaintiff, Case No. 2:13-CV-257-BLW v. MEMORANDUM DECISION BARACK

More information

U.S. Department of Justice

U.S. Department of Justice ANNEX VII U.S. Department of Justice Criminal Division Office of Assistant Attorney General Washington, D.C. 20530 Febmary 19, 2016 Mr. Justin S. Antonipillai Counselor U.S. Department of Commerce 1401

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 06-2741 UNITED STATES OF AMERICA, v. Plaintiff-Appellee, BERNARDO GARCIA, Defendant-Appellant. Appeal from the United States District Court

More information

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries?

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries? Statement to the Privacy & Civil Liberties Oversight Board Eric A. Posner University of Chicago Law School March 14, 2014 You have asked me for my views on U.S. data collection efforts under Section 702

More information

Divided Supreme Court Requires Warrants for Cell Phone Location Data

Divided Supreme Court Requires Warrants for Cell Phone Location Data Divided Supreme Court Requires Warrants for Cell Phone Location Data July 2, 2018 On June 22, 2018, the United States Supreme Court decided Carpenter v. United States, in which it held that the government

More information

TOP SECRET!/COMOO'//NO.i'ORN

TOP SECRET!/COMOO'//NO.i'ORN TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney April 8, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary On December 30,

More information

Chapter 1: Computer Forensics and Investigations as a Profession

Chapter 1: Computer Forensics and Investigations as a Profession Chapter 1: Computer Forensics and Investigations as a Profession Download Full Test Bank for guide to computer forensics and investigations 5th edition at https://getbooksolutions.com/download/test-bank-for-guide-to-computer-forensics-andinvestigations-5th-edition

More information

I. REGULATION OF INVESTIGATORY POWERS BILL

I. REGULATION OF INVESTIGATORY POWERS BILL These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION

More information

1. Network Individualism

1. Network Individualism 1. Network Individualism Network individualism as a theory embraces the responsibility of the individual to maintain his or her own personal networks. This sub group of active network is co-dependent on

More information

Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU

Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU Frequently Asked Questions about PNR data and the proposed EU-US agreement on US government access to PNR data from the EU What's a PNR? A PNR ( Passenger Name Record ) is a record in a database of travel

More information

Follow-up Question: How many separate grand juries were used?

Follow-up Question: How many separate grand juries were used? 3. Follow-up Question: Under what authority was grand jury information shared prior to PATRIOT? What is the precise meaning/significance of the last sentence of the answer in 3(a)? Answer: Prior to the

More information

State v. Tate: Role of the Courts, Criminal Trials, and the Fourth Amendment (Grades 8 and 9)

State v. Tate: Role of the Courts, Criminal Trials, and the Fourth Amendment (Grades 8 and 9) State v. Tate: Role of the Courts, Criminal Trials, and the Fourth Amendment (Grades 8 and 9) Overall Learning Target In a world of social media and changing technology, what is the role of the court in

More information

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on Written Testimony of Marc J. Zwillinger Founder ZwillGen PLLC United States Senate Committee on the Judiciary Hearing on Strengthening Privacy Rights and National Security: Oversight of FISA Surveillance

More information

H.R The 2001 Anti-Terrorism Legislation [Pub. L. No (Oct. 26, 2001)]

H.R The 2001 Anti-Terrorism Legislation [Pub. L. No (Oct. 26, 2001)] H.R. 3162 The 2001 Anti-Terrorism Legislation [Pub. L. No. 107-56 (Oct. 26, 2001)] Abridged Provisions Relating to Obtaining Electronic Evidence and Others of Interest to State & Local Law Enforcers With

More information

PEW RESEARCH CENTER July 11-14, 2013 OMNIBUS FINAL TOPLINE N=1002

PEW RESEARCH CENTER July 11-14, 2013 OMNIBUS FINAL TOPLINE N=1002 7 PEW RESEARCH CENTER July 11-14, 2013 OMNIBUS FINAL TOPLINE N=1002 ASK ALL: PEW.1 As I read a list of some stories covered by news organizations this past week, please tell me if you happened to follow

More information

Policy 5.11 ARREST PROCEDURES

Policy 5.11 ARREST PROCEDURES Cobb County Police Department Policy 5.11 ARREST PROCEDURES Effective Date: November 1, 2017 Issued By: Chief M.J. Register Rescinds: Policy 5.11 (February 1, 2015) Page 1 of 9 The words he, his, him,

More information

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips Brief Course Description: Syllabus Law 641-001: Surveillance Law Seminar George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall Professor Jake Phillips This seminar course will expose

More information

Frequently Asked Questions: The Sex Offender Registration and Notification Act (SORNA) Proposed Guidelines

Frequently Asked Questions: The Sex Offender Registration and Notification Act (SORNA) Proposed Guidelines Frequently Asked Questions: The Sex Offender Registration and Notification Act (SORNA) Proposed Guidelines Background 1. What does the term SORNA mean? 2. What is the Federal role in the administration

More information

United States District Court,District of Columbia.

United States District Court,District of Columbia. United States District Court,District of Columbia. In the Matter of the Application of the UNITED STATES OF AMERICA FOR AN ORDER AUTHORIZING THE RELEASE OF PROSPECTIVE CELL SITE INFORMATION No. MISC.NO.05-508

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 14 1003 UNITED STATES OF AMERICA, Plaintiff Appellee, v. FRANK CAIRA, Defendant Appellant. Appeal from the United States District Court

More information

Protecting Your Privacy

Protecting Your Privacy Protecting Your Privacy 2017 Transparency Report Contents 2 Requests for customer information 3 Number of information requests received, disclosed, rejected and contested 4 Types of disclosure requests

More information

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency The Manitoba Identification Card Secure proof of age, identity and Manitoba residency The Manitoba Identification Card A voluntary option for Manitoba residents The Manitoba Identification Card is a voluntary,

More information

[Your Organization] Foreign Travel Briefing

[Your Organization] Foreign Travel Briefing [Your Organization] Foreign Travel Briefing Agenda Vulnerability Awareness Personal Safety Terrorist Threat Information Assistance Contacts Before You Go Vulnerability Awareness When travelling abroad,

More information

Handbook for Strengthening Harmony Between Immigrant Communities and the Edmonton Police Service

Handbook for Strengthening Harmony Between Immigrant Communities and the Edmonton Police Service Handbook for Strengthening Harmony Between Immigrant Communities and the Edmonton Police Service Handbook for Strengthening Harmony This handbook is intended to help you understand the role of policing

More information

CHAPTER 15 PAWN SHOPS

CHAPTER 15 PAWN SHOPS CHAPTER 15 PAWN SHOPS SECTION: 3-15-1 Purpose 3-15-2 Definitions 3-15-3 License Required 3-15-4 Application Required 3-15-5 License Fees 3-15-6 Bond Required 3-15-7 Persons Ineligible for License 3-15-8

More information

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC.

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. 페이지 1 / 34 ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. Article 1 (Purpose) The purpose of this Act is to contribute to the improvement of citizens

More information

Supreme Court Verdict on Aadhaar - I

Supreme Court Verdict on Aadhaar - I Supreme Court Verdict on Aadhaar - I Why in news? The Supreme Court recently upheld the constitutionality of the Aadhaar in its majority verdict (4 out of 5 judges). Click here to know on the grounds for

More information

Petitioner and Cross-Respondent, Respondent and Cross-Petitioner. In the Supreme Court of the United States UNITED STATES, DAVID ELLIS,

Petitioner and Cross-Respondent, Respondent and Cross-Petitioner. In the Supreme Court of the United States UNITED STATES, DAVID ELLIS, In the Supreme Court of the United States UNITED STATES, v. Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner. On Writ of Certiorari to The United States Court of Appeals For

More information

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency The Manitoba Identification Card Secure proof of age, identity and Manitoba residency The Manitoba Identification Card A voluntary option for Manitoba residents The Manitoba Identification Card is a voluntary,

More information

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes INTRODUCTION 11.1 Earlier this year, the report of the first Independent Review of Intelligence and Security was tabled

More information

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms By: Jacob Trombley All Canadian citizens have the right to be secure against unreasonable

More information

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD. Recommendations Assessment Report

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD. Recommendations Assessment Report PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Recommendations Assessment Report JANUARY 29, 2015 Privacy and Civil Liberties Oversight Board David Medine, Chairman Rachel Brand Elisebeth Collins Cook James

More information

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Section 1: Short Title. This Act may be cited as the.

More information