Archive for the ‘Fourth Amendment’ Category

FBI demands new powers to hack into computers and carry out surveillance

A protest against government surveillance in Washington DC. Civil liberties groups denounced the FBIs move as brazen and potentially dangerous. Photograph: Xinhua /Landov/Barcroft Media

The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement that would grant it significant new powers to hack into and carry out surveillance of computers throughout the US and around the world.

Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violating first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight.

The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.

This is a giant step forward for the FBIs operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move, said Ahmed Ghappour, an expert in computer law at UC Hastings college of the law who will be addressing next weeks hearing.

The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district.

But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been anonymized that is, their location has been hidden using tools such as Tor.

The amendment inserts a clause that would allow a judge to issue warrants to gain remote access to computers located within or outside that district (emphasis added) in cases in which the district where the media or information is located has been concealed through technological means. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.

Were the amendment to be granted by the regulatory committee the FBI would have the green light to unleash its capabilities known as network investigative techniques on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.

This is an extremely invasive technique, said Chris Soghoian, principal technologist of the American Civil Liberties Union, who will also be addressing the hearing. We are talking here about giving the FBI the green light to hack into any computer in the country or around the world.

More here:
FBI demands new powers to hack into computers and carry out surveillance

EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN’S FOURTH AMENDMENT RIGHT – Video


EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN #39;S FOURTH AMENDMENT RIGHT
EL MONTE POLICE OFFICER VIOLATES AMY VETERAN #39;S FOURTH AMENDMENT RIGHT. UNLAWFUL AND ILLEGAL SEARCH.

By: Wheel Dynaimcs

See the article here:
EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN'S FOURTH AMENDMENT RIGHT - Video

US court rules in favor of providing officials access to entire email account

A Judge in Columbia ruled that providing law enforcement with access to an entire email account in an investigation did not violate the Fourth Amendment to the U.S. Constitution that prohibits unreasonable searches and seizures of property.

The order Friday by Chief Judge Richard W. Roberts of the U.S. District Court for the District of Colombia reversed an earlier decision by Magistrate Judge John M. Facciola who refused to allow a two-step procedure whereby law enforcement is provided all emails relating to a target account, and is then allowed to examine the emails at a separate location to identify evidence.

The striking down of Judge Facciola's ruling will likely fuel the privacy debate in the country. A New York judge defended last month his order that gave the government access to all content of the Gmail account of a target in a money laundering investigation.

Magistrate Judge Gabriel W. Gorenstein of the U.S. District Court for the Southern District of New York held that courts have long recognized the practical need for law enforcement to seize documents if only to determine whether they fall within the warrant.

The opinion was at odds with decisions by judges in several courts, Judge Gorenstein noted.

In his review, Judge Roberts appears to have taken a similar view on the issue as Judge Gorenstein in New York.

Judge Roberts wrote that the two-step process is in compliance with the Fourth Amendment and the Federal Rule of Criminal Procedure 41. Asking a service provider to execute a search warrant could pose problems, as non-government employees, untrained in the details of criminal investigation, likely lack the requisite skills and expertise to determine whether a document is relevant to the investigation, he wrote.

Judge Gorenstein had also rejected the option of getting the email host to search the emails, stating that Google employees would not be able to figure the significance of particular emails.

Judge Facciola had earlier ruled that probable cause had not been established for all of the large quantities of emails the government wanted to seize, and recommended that the service provider, in this case Apple, should be asked to search for the relevant mails, rather than handing over all the information to government officials.

"What the government proposes is that this Court issue a general warrant that would allow a 'general, exploratory rummaging in a person's belongings'--in this case an individual's e-mail account," Judge Facciola wrote in March.

Follow this link:
US court rules in favor of providing officials access to entire email account

Third Circuit Allows Evidence from Warrantless GPS Device

Philadelphia, PA (PRWEB) October 22, 2014

The Third Circuit in U.S. v. Katzin, 2014 U.S. Dist. WL 4851779 (3d Cir. Oct. 1, 2014), reversed its prior decision of the split three-judge panel and ruled that "...when the agents acted, they did so upon an objectively reasonable good-faith belief in the legality of their conduct, and that the good-faith exception to the exclusionary rule therefore applies."

In the Katzin case, suspecting the defendants of committing various burglaries, police, without a warrant, installed a GPS onto their van, leading to their apprehension. Almost two years later, the Supreme Court in U.S. v. Jones, 463 U.S. 354 (2012) ruled that this exact conduct needed a warrant. A three judge panel of the Third Circuit then held that the Fourth Amendment requires a warrant to install a GPS device on a suspects car. U.S. v. Katzin,732 F. 3d 187 (3d Cir. 2013). Prior to Jones, the Supreme Court had ruled that installing surveillance devices was not necessarily a Fourth Amendment violation. See U.S. v. Karo, 468 U.S. 705 (1984) and U.S. v. Knotts, 460 U.S. 276 (1983). The question before the en banc panel, therefore, was whether the police in Katzin were reasonably relying on these precedents to justify the legality of attaching the GPS device. The en banc panel in Katzin relied upon the U.S. Supreme Court's decision in Davis v. U.S., 131 S.Ct. 2419 (2011), which held that the good faith exception applies when the police were reasonably relying on binding precedent. Prior to Jones, the Supreme Court had ruled that installing surveillance devices was not necessarily a Fourth Amendment violation.

Ms. Lefeber explains that the Katzin decision effectively eviscerates any Fourth Amendment protection because it creates a good-faith exception to the suppression of ill-gotten evidence.

Judge D. Brooks Smith, similarly, wrote in his dissent:

"The majority's good-faith analysis is flawed because it finds that, where the law is unsettled, law enforcement may engage in constitutionally reckless conduct and still reap the benefits of the good-faith exception. Fourth Amendment jurisprudence dictates a different outcome. When the law is unsettled, law enforcement should not travel the road of speculation, but rather they should demonstrate respect for the constitutional mandateobtain a warrant. Anything less would require suppression." Katzin, Ibid.

About Hope Lefeber:

In practice since 1979, Lefeber is an experienced and aggressive criminal defense attorney in Philadelphia. As a former Enforcement Attorney for the U.S. Securities & Exchange Commission, Lefeber uses the knowledge she gained while working for the government to best defend her clients facing serious state and federal charges related to drug offenses and white collar crime, including business and corporate fraud, mail and wire fraud, money laundering, financial and securities fraud, and tax fraud. A member of the invitation-only National Trial Lawyers Top 100, Lefeber has been recognized by Thomson Reuters as a 2014 Super Lawyer. She has represented high-profile clients, published numerous articles, lectured on federal criminal law issues, taught Continuing Legal Education classes to other Philadelphia criminal defense attorneys and has been quoted by various media outlets, from TV news to print publications.

Learn more at http://www.hopelefeber.com/

View post:
Third Circuit Allows Evidence from Warrantless GPS Device

When Can the Police Search Your Phone and Computer?

Your computer, phone, and other digital devices hold vast amounts of personal information about you and your family. This sensitive data is worth protecting from prying eyes, including those of the government.

The Fourth Amendment to the U.S. Constitution protects you from unreasonable government searches and seizures, and this protection extends to your computer and portable devices. But how does this work in the real world? What should you do if the police or other law enforcement officers show up at your door and want to search your computer?

EFF has designed this guide to help you understand your rights if officers try to search the data stored on your computer or portable electronic device, or seize it for further examination somewhere else. Keep in mind that the Fourth Amendment is the minimum standard, and your specific state may have stronger protections.

Because anything you say can be used against you in a criminal or civil case, before speaking to any law enforcement official, you should consult with an attorney. Remember generally the fact that you assert your rights cannot legally be used against you in court. You can always state: "I do not want to talk to you or answer any questions without my attorney present." If they continue to ask you questions after that point, you can say: "Please don't ask me any further questions until my attorney is present." And if the police violate your rights and conduct an illegal search, often the evidence they obtain as a result of that search can't be used against you.

We've organized this guide into three sections:

If you consent to a search, the police don't need a warrant.

The most frequent ways police are able to search is by asking you for permission. If you say "yes" and consent to the search, then police don't need a warrant. You can limit the scope of that consent and even revoke or take it back after the officers begin searching, but by then it may be too late.1 That's why it's better not consent to a searchpolice may drop the matter. If not, then they will generally need to get a search warrant to search.

Law enforcement may show up at your door. Apart from a few exceptions, police need a warrant to enter your home.

The police can't simply enter your home to search it or any electronic device inside, like a laptop or cell phone, without a warrant.

Go here to read the rest:
When Can the Police Search Your Phone and Computer?