HDSE Summit #9. Keith G. Logan, Kutztown Univ. of PA

Similar documents
Thursday, April 30 th 7B Social Studies

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

DRAFT [8-4-15] TUFTS UNIVERSITY EXPERIMENTAL COLLEGE FALL 2015

When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO

Overview of Constitutional Challenges to NSA Collection Activities

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has

Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

United States Court of Appeals

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining

The Hackers Guide to Search and Arrest. by Steve Dunker J.D. It is legal for an Officer at any time to Ask a person to stop and talk.

Lesson 1: Role of the Judicial Branch in the US

DELMAR POLICE DEPARTMENT

u.s. Department of Justice

.3 Before being presented to a judge, all applications for search warrants are to be reviewed by the State's Attorney s Office for approval.

traditional exceptions to warrant requirement

Global Ci)zens and the U.S. Security Surveillance Dragnet. Center for Democracy & Technology Webinar 18 July 2013

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant.

S11G0644. HAWKINS v. THE STATE. This Court granted certiorari to the Court of Appeals to consider whether

United States Court of Appeals

Petitioner and Cross-Respondent, Respondent and Cross-Petitioner. In the Supreme Court of the United States UNITED STATES, DAVID ELLIS,

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN DECISION AND ORDER DENYING DEFENDANT S MOTION TO SUPPRESS EVIDENCE (DKT. NO.

NOTES. The Law Catching Up with the Evolution of Cell Phones: Warrantless Searches of a Cell Phone are Unconstitutional Under the Fourth Amendment

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

CITY OF ONALASKA POLICE DEPARTMENT

United States District Court

a) The entry is limited in purpose and scope to discovery of a number as to which there is no reasonable expectation of privacy;

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

CASE NO. 1D Pamela Jo Bondi, Attorney General, and Thomas H. Duffy, Assistant Attorney General, Tallahassee, for Appellant.

Supreme Court Rules On GPS Trackers: Is It 1984 Yet? Legal Question of the Week Vol. 5, Number 2 January 27, 2012

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

United States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment

National Security Law Class Notes

5. Pursuit... 2:25 6. High Speed Chases... 2:26 III. IDENTIFICATIONS... 3:1 A. In-Person Identifications... 3:1 1. Right to Have Counsel Present...

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District

The Fourth Amendment in the Digital World: Do You Have an Expectation of Privacy on the Internet?

The GPS Tracking Case Fourth Amendment United States Constitution

Privacy and Information Security Law

Divided Supreme Court Requires Warrants for Cell Phone Location Data

Briefing from Carpenter v. United States

Emerging Technology and the Fourth Amendment

Chapter 33. (CalECPA)

OFFICE OF THE SHERIFF ST. MARY'S COUNTY, MD

Location Privacy: The Legal Landscape. David L. Sobel Senior Counsel, EFF Stanford PNT Symposium October 29, 2014

Case 8:13-cr PWG Document 203 Filed 07/28/14 Page 1 of 8. IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND Southern Division

Warrantless Access to Cell Site Location Information Takes a Hit in the Fourth Circuit:

POLICE TRAFFIC STOPS & HOW SHOULD YOU ACT? WHAT ARE YOUR RIGHTS. Special Report Handling A Police Traffic Stop

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT

Maryland-National Capital Park Police Prince George s County Division DIVISION DIRECTIVE DISTRIBUTION EFFECTIVE DATE

A EUROPEAN APPROACH TO THE UNITED STATES CONSTITUTIONAL PRIVACY

From the Attorneys at the Legacy Counsel James Publishing

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

Search and Seizure: A Constitutional Update. Pending Supreme Court Cases 1/28/2018. Carpenter v. United States

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Warrantless Searches of Cellular Phones: The Exigent Circumstances Exception is the Right Fit

Is Your Smartphone Conversation Private? The StingRay Device s Impact on Privacy in States

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL.

The Mirage of Use Restrictions

The Relevance of Relevance: Section 215 of the USA PATRIOT Act and the NSA Metadata Collection Program

US Supreme Court. Texas Supreme Court and Court of Criminal Appeals. 5th Circuit Court of Appeals. 14 State Appellate Courts

Search & Seizure Warrants

Presidents Bush, Obama and the Surveillance of Americans

Body Snatchers. Heidi Reamer Anderson*

By Jane Lynch and Jared Wagner

Case: Document: 44 Filed: 05/26/2015 Page: 1 COA #: Plaintiff/Appellee, Defendant/Appellant

CRS Report for Congress

In the Supreme Court of the United States

No Supreme Court of the United States. UNITED STATES, Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner.

In the Supreme Court of the United States

TOP SECRET!/COMOO'//NO.i'ORN

State of New York Supreme Court, Appellate Division Third Judicial Department

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Searches Without a Warrant

OFFICER 1 pulls a gun out of a drawer, opens the bullet cartridge, and then holds it up.

The Fourth Amendment places certain restrictions on when and how searches and seizures

Confrontation or Collaboration?

Public Copy CASPER POLICE DEPARTMENT POLICIES AND PROCEDURES. Investigative Procedure: Search & Seizure. 4 - Operations 03C -

ORDER TYPE: NEED TO KNOW. PURPOSE The purpose of this policy is to define legal implications and procedures involved when a search is performed.

Testimony of Peter P. Swire

Victoria Police Manual

THE NATIONAL CENTER FOR JUSTICE AND

STATE V. GUTIERREZ, 2004-NMCA-081, 136 N.M. 18, 94 P.3d 18 STATE OF NEW MEXICO, Plaintiff-Appellee, v. DEMETRIO DANIEL GUTIERREZ, Defendant-Appellant.

Video Course Evaluation Form. Atty ID number for Pennsylvania: Name of Course You Just Watched

Search & Seizure: Historical Analysis of the Fourth Amendment

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

CARPENTER V. UNITED STATES: HOW MANY CELL PHONE LOCATION POINTS CONSTITUTE A SEARCH UNDER THE FOURTH AMENDMENT?

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms

Reauthorization of the FISA Amendments Act

THE FOURTH AMENDMENT AND NEW TECHNOLOGIES: THE MISAPPLICATION OF ANALOGICAL REASONING

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

In the Supreme Court of the United States

Counsel for Plaintiff-Appellant Anna J. Smith

Quasi-Constitutional Protections and Government Surveillance

RECENT DEVELOPMENTS IN SEARCH AND SEIZURE LAW. By Hon. Barry Kamins. Kings County Criminal Bar Association March 31, 2010

THE RUTHERFORD INSTITUTE

State v. Tate: Role of the Courts, Criminal Trials, and the Fourth Amendment (Grades 8 and 9)

Excerpt from Vol. 3, Issue 2 (Spring/Summer 2015)

In the Supreme Court of the United States

Transcription:

HDSE Summit #9 Keith G. Logan, Kutztown Univ. of PA

Homeland security is not just about terrorism and counterterrorism. It is an amalgam of several distinct yet interrelated areas that include the gathering of intelligence for both law enforcement and national security. Of cri'cal concern is the ability of the government to collect data that may, at the 'me of collec'on, not necessarily reflect an immediate indica'on of criminal or terrorist ac'vity. But the courts are restric'ng the gathering of certain intelligence informa'on without a search warrant

A significant factor in maintaining an effec've homeland security program is ensuring the development of intelligence data base. A large part of an intelligence program is collec'ng the dots or bits of informa'on, so that, when the 'me is right, you can connect the dots Pen Registers Surveillance Search Incident to Arrest telephony meta data

Recent Supreme Court decisions exhibit a new level of restric'on on law enforcement inves'ga'on and intelligence that may quickly creep into na'onal security to an even greater degree. (Smith v. Maryland, 442 U.S. 735 (1979)). Both the Intelligence Reform and Terrorist Preven:on Act of 2004 and the 9/11 Commission Report emphasize the sharing of informa'on, but the government must first have it before it can be shared

Domes'c Intelligence MINARET SHAMROCK COINTELPRO Colonial History General Warrants Cons'tu'on Bill of Rights Right to Privacy Trend Away from Federal Police

Joe McCarthy- pocket list of communists J. Edgar Hoover- from the War Emergency Division to FBI Director- secret files, communist hunter, deporter of aliens, COINTELPRO Church Comm., Pike Comm., Rockefeller Commission Resigna'on of a President

Law Enforcement Na'onal Security Cons'tu'on- originalist- construc'onist Privacy: 1,3,4,5,9,14 Home to a telephone booth Smith v. Maryland (1979)- pen register Kyllo v. US (2001)- thermal imaging Maryland v. King (2013)- DNA

Pen Register- no privacy with numbers No expecta'on Smith v. Maryland snowdened NSA FISA warrants FISC orders under which the telephony metadata program has operated have generally permided searching the database for a par'cular number only if it can be demonstrated that there are facts giving rise to a reasonable ar'culable suspicion (RAS) that the telephone number in ques'on, referred to as the seed, is associated with one of the foreign intelligence targets referenced in the court order

Conflict with Circuit opinions: 1 st and 9 th Wurie: cell phone data resulted in the issuance of a search warrant and the subsequent seizure of a cache of drugs, a gun and cash Riley: Police arrested Riley aeer a lawful stop, subsequent discovery of a firearm under the car s hood, appeals affirmed the warrantless search of his cell phone incident to a lawful arrest; search yielded evidence of gang 'es and a shoo'ng, which resulted in his convic'on for adempted murder

1. Digital content- no officer safety issue; 2. Digital data loss could be prevented without having to search the device; 3. There is a reduced expecta'on of privacy incident to an arrest, but that the immense storage capacity of a cell phone is likely to reveal detained informa'on about all aspects of a person s life 4. Following the AZ v. Gant (2009) standard- not realis'c because of the quan'ta've and qualita've; and 5. The court should not accept a rule used in the predigital era regarding a search incident to a person s arrest

The Government s adachment of the GPS device to the vehicle, and its use of that device to monitor the vehicle s movements, cons'- tutes a search under the Fourth Amendment. Found a simple trespass of a car by the government because it failed to get a search warrant to affix the GPS tracking device. The car was not in the defendant s name, when the government affixed a GPS device to the car to track Jones movements. Harlan s analysis- concurrence in Katz no'ng that the 4 th A protects a person s reasonable expecta'on of privacy

Court avoided a defini've focus on the government s conten'on that Jones had no reason- able expecta'on of privacy, because Jones s Fourth Amendment rights do not rest with Katz. Does appear that aeer Jones, Katz may now include a common law trespass test Device did no more than actual police surveillance, following the vehicle Government argued that Jones could not have a privacy expecta'on on public roads

J. Sotomayor: device did no more than actual police surveillance, following the vehicle, the government argued that Jones could not have a privacy expecta'on on public roads She wrote that the Government usurped Jones' property for the purpose of conduc'ng surveillance on him, thereby invading privacy interests long afforded, and undoubtedly en'tled to, Fourth Amendment protec'on Jus'ce Sotomayor relied on language found in Kyllo v. U.S, relying on a subjec've expecta'on of privacy

J. Alito: "Disclosed in [GPS] data... will be trips the indisputably private nature of which takes lidle imagina'on to conjure: trips to the psychiatrist, the plas'c surgeon, the abor'on clinic, the AIDS treatment center, the strip club, the criminal defense adorney, the by- the- hour motel, the union mee'ng, the mosque, synagogue or church, the gay bar and on and on." Alito: Government can store such records and efficiently mine them for informa'on years into the future The lengthy monitoring that occurred in this case cons'tuted a search under the Fourth Amendment.

Informa'on is being retained on servers, in business records, on unprotected cell phones that can be hacked or stolen, and used for profit in many industries in many markets. Some of the informa'on that the court is ademp'ng to protect is already public based on where the event has taken place or the fact that it has already been shared with others. None of this even addresses all of the day- to- day hacking that takes place by individuals, companies, and foreign governments. So where does that leave law enforcement?

Incident to an arrest and without the issuance of an addi'onal search warrant, courts have permided a search of: 1. A defendant, as well as his/her clothing, regardless if it is on their body at the 'me; 2. The wing or lunge area around a defendant; 3. The passenger compartment of a car and the containers located in the car; 4. Any part of a car if they believe they have probable cause; 5. People who arrested and are recent occupants of a car- then the car is searched (if the arrest has a nexus to the car); 6. Bags or luggage in a person s possession at the 'me of their arrest;

1. Bags or luggage in a person s possession at the 'me of their arrest; 2. Any item the suspect gives permission for them to search (consent) or may be in plain view; 3. Open fields; 4. Abandoned property, bags, cigaredes, cups, cans, or cars; 5. Property, such as automobiles that are seized and searched (inventory); 6. Visual searches with binoculars or cameras during a fly- over; 7. Contents of books, wallets and cigarede packs in the defendant s possession; and 8. The usual border and jail searches that can be very in'mate.

special needs, beyond the normal need for law enforcement, make the warrant requirement and probable- cause requirement imprac'cable. suspicionless drug tes'ng of high school students and railroad personnel, automobile checkpoints for illegal immigrants (extension of border searches), drunk drivers, and the search of airplane, subway, and train passengers carry- on bag

Klayman v. Obama, Judge Leon accepted that the plain'ffs had significant privacy interests in the aggrega'on of their telephone data and that the government s interest in iden'fying unknown terrorists was of the highest order - reversed on appeal United States v. Moalin, (S.D. Cal. Nov. 18, 2013), Judge Jeffrey Miller reached the opposite conclusion, following Smith v. Maryland, supra, and holding that the NSA s collec'on of a defendant s telephone metadata does not cons'tute a search because he had no legi'mate expecta'on of privacy in the telephone numbers dialed

With all the material that can be legally secured by the government and in the possession of private industry and hackers, there needs to be a fresh look at the Fourth Amendment, bringing it back to its true meaning.