SlideShare une entreprise Scribd logo
1  sur  9
US Legislation Authorizing
Wiretapping
Angela Strudwick
Concordia University
EDCI588
Wiretapping was declared
a felony in the state of
New York from 1892,

when the telephone was
still a novelty. In 1928 the
Supreme Court ruled in
Olmstead v.United States
that wiretapping was not a
violation of the Fourth
Amendment .
Title III of the Omnibus Crime Control and Safe Streets
Act (1968).
“The Wiretap Act”.

•prohibits the unauthorized, nonconsensual
interception of "wire, or oral communications" by
government agencies as well as private parties,*
•establishes procedures for obtaining warrants to
authorize wiretapping by government officials, and
•regulates the disclosure and use of authorized
intercepted communications by investigative and
law enforcement officers. (Dept. of Justice. 2013).
.

Electronic Communications Privacy Act 1986

The ECPA has three Titles:

1. Title I is an extension of the Wiretap Act. It prohibits the interception of
electronic messages or any material that is stored electronically, except by
a law enforcement agency with a warrant, and restricts the use of any
evidence collected this way to the arrest and trial of persons believed to
have committed certain specified types of crimes.
2. Title II, the Stored Communications Act, protects the privacy of
communications stored with service providers (emails) and the personal
details of subscribers stored by the providers.
3. Title III, prohibits the use of pen registers or trap and trace devices without
a court order.
The USA PATRIOT Act
The Patriot Act was enacted by Congress shortly after the terrorist attacks
on the Pentagon and the World Trade Center on September 11, 2001. The
law provided law enforcement agencies with the authority to:
•Use advanced electronic surveillance strategies, including roving
wiretaps for surveillance when following suspects in any part of the world
who were thought to be a threat to the United States
•Share information with all government agencies to prevent money
laundering and facilitate speedy apprehension of certain types of criminals
•Increase the penalties and eliminate the statute of limitations for crimes
of terrorism
•Strengthen border security by making entry to the United States difficult
for terrorists
•Allowing the FBI to demand records that used to be confidential, using
National Security Letters.
THE FIRST AMENDMENT

Americans’ Response to the Patriot Act

The First Amendment

Based on what you have read or heard, do
you think the Patriot Act goes too far, is
about right, or does not go far enough in
restricting people's civil liberties in order to
fight terrorism?
References.
Cuellar, J. (n.d.). The Complication Legality of Voice Recording in
2013. In VersaDial. com. Retrieved February 14, 2014,
from
http://www.versadial.com/the-complicatd-legality-of-voicerecording-in-2013/
Hamm, R. F. (2010). Olmstead vs. United States: the constitutional
challenges of prohibition enforcement. . In Federal
Judicial Council.gov.. Retrieved February 14, 2014, from
http://www.fjc.gov/public/pdf.nsf/lookup/olmstead.pdf/$file/
olmstead.pdf
Saad, L. (2004, March 2). Americans generally comfortable with
Patriot Act: Few believe it goes too far in restricting civil
liberties. In Gallup News Servicer. Retrieved February 14,
2014, from
http://www.gallup.com/poll/10858/americans-generallycomfortable-patriot-act.aspx
Quinn, M. (2013). Ethics for the information age (5th ed., pp. 276287). Upper Saddle River, NJ: Pearson.

Contenu connexe

Tendances

Implications of media freedom
Implications of media freedomImplications of media freedom
Implications of media freedomZarmeen Durrani
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Right to privacy in tort law jeet
Right to privacy in tort law jeetRight to privacy in tort law jeet
Right to privacy in tort law jeetShubham Verma
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 
UNITED STATES V. NIXON
UNITED STATES V. NIXONUNITED STATES V. NIXON
UNITED STATES V. NIXONMegan James
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Informationamypollock1
 
Freedom of Information Act
Freedom of Information ActFreedom of Information Act
Freedom of Information ActDan Kennedy
 
Article iii of the 1987 constitution of the republic of the philippines
Article iii of the 1987 constitution of the republic of the philippinesArticle iii of the 1987 constitution of the republic of the philippines
Article iii of the 1987 constitution of the republic of the philippinesSasah Salinas
 
Billofrights
BillofrightsBillofrights
Billofrightsjtoma84
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationAltheimPrivacy
 
Constitutions and tussles in cyberspace
Constitutions and tussles in cyberspaceConstitutions and tussles in cyberspace
Constitutions and tussles in cyberspaceblogzilla
 
United states v. nixon
United states  v. nixonUnited states  v. nixon
United states v. nixonxsportz28
 
Bill of rights (lecture 3)
Bill of rights (lecture 3)Bill of rights (lecture 3)
Bill of rights (lecture 3)John Torres
 
public_hearing02
public_hearing02public_hearing02
public_hearing02Greg Burton
 

Tendances (20)

Implications of media freedom
Implications of media freedomImplications of media freedom
Implications of media freedom
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Right to privacy in tort law jeet
Right to privacy in tort law jeetRight to privacy in tort law jeet
Right to privacy in tort law jeet
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Censorship
CensorshipCensorship
Censorship
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
UNITED STATES V. NIXON
UNITED STATES V. NIXONUNITED STATES V. NIXON
UNITED STATES V. NIXON
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Information
 
Article 10
Article 10Article 10
Article 10
 
Freedom of Information Act
Freedom of Information ActFreedom of Information Act
Freedom of Information Act
 
Article iii of the 1987 constitution of the republic of the philippines
Article iii of the 1987 constitution of the republic of the philippinesArticle iii of the 1987 constitution of the republic of the philippines
Article iii of the 1987 constitution of the republic of the philippines
 
United States v Nixon
United States v NixonUnited States v Nixon
United States v Nixon
 
Billofrights
BillofrightsBillofrights
Billofrights
 
FOR FINALS PSCN
FOR FINALS PSCN FOR FINALS PSCN
FOR FINALS PSCN
 
Media law
Media lawMedia law
Media law
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentation
 
Constitutions and tussles in cyberspace
Constitutions and tussles in cyberspaceConstitutions and tussles in cyberspace
Constitutions and tussles in cyberspace
 
United states v. nixon
United states  v. nixonUnited states  v. nixon
United states v. nixon
 
Bill of rights (lecture 3)
Bill of rights (lecture 3)Bill of rights (lecture 3)
Bill of rights (lecture 3)
 
public_hearing02
public_hearing02public_hearing02
public_hearing02
 

Similaire à Us legislation authorizing wiretapping

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillancemmicka
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsJack Pringle
 
C16 - Formal Controls : Laws, Rules & Regulations
C16 - Formal Controls : Laws, Rules & RegulationsC16 - Formal Controls : Laws, Rules & Regulations
C16 - Formal Controls : Laws, Rules & RegulationsFatin Nazihah Aziz
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAWChirine Haddad ?
 
Privacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawPrivacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawARDC
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
White7e ppt ch16
White7e ppt ch16White7e ppt ch16
White7e ppt ch16difordham
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgBryan Gaston
 

Similaire à Us legislation authorizing wiretapping (20)

Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back Doors
 
C16 - Formal Controls : Laws, Rules & Regulations
C16 - Formal Controls : Laws, Rules & RegulationsC16 - Formal Controls : Laws, Rules & Regulations
C16 - Formal Controls : Laws, Rules & Regulations
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Privacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawPrivacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian law
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
White7e ppt ch16
White7e ppt ch16White7e ppt ch16
White7e ppt ch16
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 

Us legislation authorizing wiretapping

  • 1. US Legislation Authorizing Wiretapping Angela Strudwick Concordia University EDCI588
  • 2. Wiretapping was declared a felony in the state of New York from 1892, when the telephone was still a novelty. In 1928 the Supreme Court ruled in Olmstead v.United States that wiretapping was not a violation of the Fourth Amendment .
  • 3.
  • 4. Title III of the Omnibus Crime Control and Safe Streets Act (1968). “The Wiretap Act”. •prohibits the unauthorized, nonconsensual interception of "wire, or oral communications" by government agencies as well as private parties,* •establishes procedures for obtaining warrants to authorize wiretapping by government officials, and •regulates the disclosure and use of authorized intercepted communications by investigative and law enforcement officers. (Dept. of Justice. 2013).
  • 5. . Electronic Communications Privacy Act 1986 The ECPA has three Titles: 1. Title I is an extension of the Wiretap Act. It prohibits the interception of electronic messages or any material that is stored electronically, except by a law enforcement agency with a warrant, and restricts the use of any evidence collected this way to the arrest and trial of persons believed to have committed certain specified types of crimes. 2. Title II, the Stored Communications Act, protects the privacy of communications stored with service providers (emails) and the personal details of subscribers stored by the providers. 3. Title III, prohibits the use of pen registers or trap and trace devices without a court order.
  • 6.
  • 7. The USA PATRIOT Act The Patriot Act was enacted by Congress shortly after the terrorist attacks on the Pentagon and the World Trade Center on September 11, 2001. The law provided law enforcement agencies with the authority to: •Use advanced electronic surveillance strategies, including roving wiretaps for surveillance when following suspects in any part of the world who were thought to be a threat to the United States •Share information with all government agencies to prevent money laundering and facilitate speedy apprehension of certain types of criminals •Increase the penalties and eliminate the statute of limitations for crimes of terrorism •Strengthen border security by making entry to the United States difficult for terrorists •Allowing the FBI to demand records that used to be confidential, using National Security Letters.
  • 8. THE FIRST AMENDMENT Americans’ Response to the Patriot Act The First Amendment Based on what you have read or heard, do you think the Patriot Act goes too far, is about right, or does not go far enough in restricting people's civil liberties in order to fight terrorism?
  • 9. References. Cuellar, J. (n.d.). The Complication Legality of Voice Recording in 2013. In VersaDial. com. Retrieved February 14, 2014, from http://www.versadial.com/the-complicatd-legality-of-voicerecording-in-2013/ Hamm, R. F. (2010). Olmstead vs. United States: the constitutional challenges of prohibition enforcement. . In Federal Judicial Council.gov.. Retrieved February 14, 2014, from http://www.fjc.gov/public/pdf.nsf/lookup/olmstead.pdf/$file/ olmstead.pdf Saad, L. (2004, March 2). Americans generally comfortable with Patriot Act: Few believe it goes too far in restricting civil liberties. In Gallup News Servicer. Retrieved February 14, 2014, from http://www.gallup.com/poll/10858/americans-generallycomfortable-patriot-act.aspx Quinn, M. (2013). Ethics for the information age (5th ed., pp. 276287). Upper Saddle River, NJ: Pearson.

Notes de l'éditeur

  1. *This section of the law initially prohibited interception of telephone or face-to-face conversations but was updated by Title I of the Electronic Communications Privacy Act in 1986 to include electronic communication. Law enforcement and other government agencies are not exempt from this ruling, although they are authorized to conduct wiretaps provided that they have obtained warrants for that purpose. Title III also regulates the disclosure and use of the information gained through wiretapping. The ECPA also authorizes the use of a pen register to detect the number being dialed on an outgoing call and a trap and trace device to show the number of a caller on an incoming call. (Quinn. 2013).
  2. Valerie Caproni was general counsel for the FBI in 2011. The present general counsel of the FBI, since January, 2014, is James Baker.
  3. USA Patriot is an acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (US Dept. of Justice).A National Security Letter from the FBI states that certain records are related to an ongoing investigation.
  4. The graph represents the results of a Gallup Poll dated March 2, 2004 based on the question above.