Вы находитесь на странице: 1из 29

Chapter 9

Tyrannical nature of English system Checks and balances in American system


3 branches of government State sovereignty Constitution Bill of Rights

Balancing Act

Computer Forensics and Cyber Crime, 2nd ed.


Britz

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Olmstead v. U.S. (1928)


1st case to evaluate the level of protection afforded to individuals in electronic communications Ruled that the sanctity afforded to a private home did not include telephone communications made within that home 4th Amendment protects places not people Reversed in Katz
Computer Forensics and Cyber Crime, 2nd ed.
Britz

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Katz v. United States (1967)


4th Amendment protects people not places Expectation of privacy may be heightened in situations where measures are taken to increase policy All federal & state domestic wiretaps require a court order predicated on probable cause.

Computer Forensics and Cyber Crime, 2nd ed.


Britz

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Weeks v. United States


Judicial creation of the exclusionary rule Fruits of the poisonous tree Designed to prevent unlawful actions against citizens by the police

Computer Forensics and Cyber Crime, 2nd ed.


Britz

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Expectation of Privacy not articulated in the Constitution judicial creation Right to privacy moderated by the expectation of such privacy Based on case characteristics Generally information transmitted electronically is not as private due to global accessibility

Computer Forensics and Cyber Crime, 2nd ed.


Britz

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Four general areas

Physical Communications Information Territorial

Physical

Most private Justified by 4th Amendment Linked to 1st Amendments freedom of speech & association

Communication

Information

14th Amendments due process


Most difficult to define & to establish boundaries
2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Territorial

Computer Forensics and Cyber Crime, 2nd ed.


Britz

Public

Employers more limited than their private counterparts Factors to consider: Whether the items or areas to be searched have been set aside for the employees exclusive or personal use Whether the employee has been given permission to store personal information/items Whether the employee has been advised that the system may be accessed by others Whether there has been a history of searches or inspections of the area Whether there is a clearly articulated policy which identifies common area vs. private areas

Computer Forensics and Cyber Crime, 2nd ed.


Britz

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Three prongs of OConnor v. Ortega


Whether employees expectation of privacy was consistent with operational realities

Balance of 4th Amendment protection & government interest in intrusion


Whether search was reasonable at inception as was the subsequent scope
Computer Forensics and Cyber Crime, 2nd ed.
Britz 2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Application of Ortega to E-mail


U.S. v. Simons oEmployee indicted after a system administrator discovered over 1,000 child porn images oRuling: Systems administrators may scan networks to indentify non-work related activity U.S. v. Monroe oSystem administrator discovered child porn after opening undelivered mails of excessive size oRuling: employee did not have an expectation of privacy on a government computer which was bannered with warnings
Computer Forensics and Cyber Crime, 2nd ed.
Britz 2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

10

System administrators of government equipment have a right to monitor their systems within the scope of their duties This includes: routine systems protection monitoring, system management, prevention of unauthorized access, and verification of security procedures, survivability and operational security Monitoring by law enforcement requires consent of one party OR authorized by court order, warrant, or special probable cause circumstances System administrators MAY NOT work under the direction of law enforcement
11
2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Computer Forensics and Cyber Crime, 2nd ed.


Britz

Electronic Communications Privacy Act Extended provisions found in Title III of Omnibus Includes wireless and non-aural electronic communications Provides penalties for violators (both LE and private) Three Titles
Computer Forensics and Cyber Crime, 2nd ed.
Britz

12

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Title I
Statutory procedures for intercepting wire, oral, and electronic communications Ambiguous Does not prohibit law enforcement from indentifying transmissions just the contents

Computer Forensics and Cyber Crime, 2nd ed.


Britz

13

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Title II
AKA Stored Communications Act Prohibits providers from disclosing the contents of communication held in storage Also prohibits disclosure of any contextual information Exceptions

Computer Forensics and Cyber Crime, 2nd ed.


Britz

14

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Title III
Regulates pen registers and trap and trace devices

Computer Forensics and Cyber Crime, 2nd ed.


Britz

15

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Made it unlawful for local, state, or federal LE authorities to search or seize those materials which may be publishable Expanding 1968 wiretap act to include electronic BBs especially work product and documentary materials Like ECPA criticized for vagueness, ambiguity, and overbreadth. Victims may include publishers, authors, editors, newspapers, or information dissemination Steve Jackson Games, Inc.

Computer Forensics and Cyber Crime, 2nd ed.


Britz

16

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

interception be definition, must happen before arrival Difficulty in conceptualization electronic messages are instantaneous

Computer Forensics and Cyber Crime, 2nd ed.


Britz

17

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Required manufacturers of telecommunications equipment and service providers develop systems which provide capability for surveillance of telephone & cellular communications, advanced paging, satellite-based systems, and specialized mobile radio. Also required the delivery of packet mode communications by these providers to LE without a warrant Supposed to heighten privacy protections provided by ECPA Congress declared that surveillance requirements be narrowly interpreted
18
2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Computer Forensics and Cyber Crime, 2nd ed.


Britz


Britz

Title I Enhancing Domestic Security Against Terrorism Title II Enhanced Surveillance Procedures Title III Money Laundering Title IV Border Protection Title V Removing obstacles to investigating terrorism Title VI Victim Provisions Title VII Information Sharing Title VIII Strengthening Terrorist Laws Title IX Improved Intelligence Title X - Miscellaneous
19
2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Computer Forensics and Cyber Crime, 2nd ed.

Amended the International Emergency Economic Powers Act Expanded the discretionary power of the President President can seize and liquidate U.S. property of any foreign body who is suspected of facilitating an attack

Computer Forensics and Cyber Crime, 2nd ed.


Britz

20

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Conceptualized in in 1986 1986

Conceptualized

Expanded by Expanded by Patriot Act Patriot Act


Expanded types of Expanded types information of information attainable attainable (inc. (inc. SSNs, SSNs, DLs, etc. DLs, etc.

Expanded list of Expanded list of financial financial institutions institutions required required to file to file Suspicious Suspicious Activity Reports. Activity Reprots

Computer Forensics and Cyber Crime, 2nd ed.


Britz

21

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Particularity
Inconsistent interpretation Some circuits provide broad searches Others require specificity Scope limited to probably cause in warrant & parameters established therein
Computer Forensics and Cyber Crime, 2nd ed.
Britz

22

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Seizure of Evidence
Based on reasonableness LE does not have to give deference to descriptive labels LE should ALWAYS obtain secondary warrants when necessary

Computer Forensics and Cyber Crime, 2nd ed.


Britz

23

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Third Party Origination


Any party acting under the direction of LE must adhere to the same Constitutional restrictions

Computer Forensics and Cyber Crime, 2nd ed.


Britz

24

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Staleness

U.s. v. Hay Defendant convicted of child pornography seized on a

warrant based on information that was months old. Court upheld conviction based on information from an expert that indicated that pornographers kept their images

Insufficiency of Probable Cause

Computer Forensics and Cyber Crime, 2nd ed.


Britz

25

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Consent Scope must be reasonable & within parameters of consent U.S. v. Turner

Exigent Circumstances & Emergency Situations


Important factors: Degree of urgency; amount of time necessary to obtain a warrant; volatility of evidence; danger at site; suspects knowledge of impending police action. Often requires a secondary warrant after seizure Incident to Arrest Not been extended to personal computers, laptops, etc.
Computer Forensics and Cyber Crime, 2nd ed.
Britz 2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

26

Plain View U.S. v. Carey Extension to Computers for LE: Focus on original search warrant obtain secondary warrant when necessary Automated procedures to follow in every case Border Searches Probable cause not required Other Warrantless Searches (not extended to computers) Automobiles, field interrogations, & inventory searches
Computer Forensics and Cyber Crime, 2nd ed.
Britz 2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

27

Vicinage Undercover Techniques Sentencing Guidelines

Computer Forensics and Cyber Crime, 2nd ed.


Britz

28

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Computer Forensics and Cyber Crime, 2nd ed.


Britz

29

2009 Pearson Education, Upper Saddle River, NJ 07458. All Rights Reserved.

Вам также может понравиться