Technological Surveillance of Communication in American, German and Chinese Criminal Procedure.
Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constituti...
Saved in:
| Main Author: | |
|---|---|
| Format: | Electronic eBook |
| Language: | German |
| Published: |
Berlin :
Duncker & Humblot,
2022.
|
| Series: | Beiträge zum Internationalen und Europäischen Strafrecht - Studies in International and European Criminal Law and Procedure.
|
| Subjects: | |
| Online Access: | EBSCOhost |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000cam a2200000Mu 4500 | ||
|---|---|---|---|
| 001 | on1351203421 | ||
| 003 | OCoLC | ||
| 005 | 20250602105539.0 | ||
| 006 | m d | ||
| 007 | cr ||||||||||| | ||
| 008 | 221119s2022 gw o ||| 0 ger d | ||
| 040 | |a EBLCP |b eng |c EBLCP |d YDX |d OCLCQ |d JSTOR |d OCLCF |d OCLCO |d OCLCL |d N$T |d SFB | ||
| 019 | |a 1320807831 |a 1321072713 |a 1443088073 | ||
| 020 | |a 9783428585663 |q (electronic bk.) | ||
| 020 | |a 3428585666 |q (electronic bk.) | ||
| 020 | |z 3428185668 | ||
| 020 | |z 9783428185665 | ||
| 035 | |a 3291141 |b (N$T) | ||
| 035 | |a (OCoLC)1351203421 |z (OCoLC)1320807831 |z (OCoLC)1321072713 |z (OCoLC)1443088073 | ||
| 037 | |a 22573/cats409557 |b JSTOR | ||
| 043 | |a n-us--- |a e-gx--- |a a-cc--- | ||
| 050 | 4 | |a K5480 | |
| 082 | 0 | 4 | |a 345/.052 |2 23/eng/20230303 |
| 049 | |a MAIN | ||
| 100 | 1 | |a Shi, Jiahui. | |
| 245 | 1 | 0 | |a Technological Surveillance of Communication in American, German and Chinese Criminal Procedure. |h [electronic resource]. |
| 260 | |a Berlin : |b Duncker & Humblot, |c 2022. | ||
| 300 | |a 1 online resource (375 p.). | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a Beiträge zum Internationalen und Europäischen Strafrecht - Studies in International and European Criminal Law and Procedure | |
| 500 | |a Description based upon print version of record. | ||
| 505 | 0 | |a Intro -- Foreword -- Content Overview -- Contents -- Introduction -- I. The Background of the Study -- II. The Three Jurisdictions -- III. Presentation of Problems -- IV. Structure of the Study -- Part I: Surveillance of Wire and Oral Communications in the U.S. -- I. Constitutional Protection -- 1. Trespass Doctrine -- 2. From Trespass Doctrine to the Reasonable Expectation of Privacy -- 3. "Reasonable Expectation of Privacy" after Katz -- 4. The Reasonable Expectation of Privacy -- a) An "Actual (Subjective) Expectation of Privacy" | |
| 505 | 8 | |a B) An Expectation "that Society is Prepared to Recognize as ˋReasonable'" -- aa) Social Conceptions of the Expectation of Privacy -- bb) An Empirical Study of General Attitudes toward Privacy -- 5. The Minimal Expectation of Privacy -- 6. Other Constitutional Aspects of Electronic Surveillance -- a) 5th Amendment: Privilege against Self-incrimination -- b) The Attorney-Client Privilege -- c) 6th Amendment: The Right to Counsel -- d) Summary -- II. Surveillance of Wire and Oral Communications in Federal Statutes -- 1. Early Regulation -- 2. The Modern Statute | |
| 505 | 8 | |a A) The Definition of "Wire Communication" under 2510(1) of Title III -- b) The Definition of "Oral Communication" under 2510(2) of Title III -- c) The Definition of "Intercept" under 2510(4) of Title III -- III. Exceptions from the General Prohibition of Warrantless Surveillance -- 1. Plain Hearing -- 2. Consent to Surveillance under Title III -- IV. Procedure -- 1. Application Process for a Surveillance Warrant at the Federal Level -- a) Who can Make and Authorize an Application -- b) Exigent Circumstances -- c) Crimes that Can be Investigated by Intercepting Communications | |
| 505 | 8 | |a D) The Contents of an Application -- e) Review Criteria -- aa) Legality and Necessity -- bb) Effectiveness of the Technology -- cc) Cost -- 2. The Warrant -- a) Jurisdiction -- b) Findings and Determinations -- aa) Probable Cause -- bb) Specific Communications to be Intercepted -- cc) Inadequacy of Investigatory Alternatives -- (1) Failure or the Unlikely Success of Other Measures -- (2) Dangers Arising from Other Measures -- (3) The Frustration of the "Last Resort" Requirement -- dd) Where Communications Can be Intercepted -- ee) High Approval Rate of Applications | |
| 505 | 8 | |a C) The Contents of the Warrant (18 U.S. Code 2518(4)-(6)) -- aa) The Duration Directive -- bb) The Termination Directive -- cc) The Minimization Directive -- dd) The Progress Report System -- 3. The Role of Police and Prosecutors -- 4. Extension of the Warrant -- 5. Sealing the Evidence -- 6. Giving Notice of Electronic Surveillance -- V. Exclusionary Rule -- 1. Origin and Purpose of the Exclusionary Rule -- 2. Admissibility of Wiretap Evidence under the 4th Amendment -- 3. Admissibility under Section 605 -- 4. Admissibility under Title III | |
| 500 | |a a) The Scope of the Exclusionary Rule under Title III | ||
| 506 | 0 | |a Open Access |5 EbpS | |
| 504 | |a Includes bibliographical references (pages 357-373) and index. | ||
| 520 | |a Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime. | ||
| 590 | |a Added to collection customer.56279.3 | ||
| 650 | 0 | |a Electronic surveillance |x Law and legislation |z United States. | |
| 650 | 0 | |a Electronic surveillance |x Law and legislation |z Germany. | |
| 650 | 0 | |a Electronic surveillance |x Law and legislation |z China. | |
| 650 | 7 | |a Electronic surveillance |x Law and legislation |2 fast | |
| 651 | 7 | |a China |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJcrd4RjtCBk4wfMhTwwG3 | |
| 651 | 7 | |a Germany |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtCD3rcKcPDx6FHmjvrbd | |
| 651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
| 776 | 0 | 8 | |i Print version: |a Shi, Jiahui |t Technological Surveillance of Communication in American, German and Chinese Criminal Procedure. |d Berlin : Duncker & Humblot,c2022 |z 9783428185665 |
| 830 | 0 | |a Beiträge zum Internationalen und Europäischen Strafrecht - Studies in International and European Criminal Law and Procedure. | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3291141 |
| 938 | |a ProQuest Ebook Central |b EBLB |n EBL7138402 | ||
| 938 | |a YBP Library Services |b YANK |n 302898396 | ||
| 938 | |a EBSCOhost |b EBSC |n 3291141 | ||
| 952 | |0 0 |1 0 |2 ddc |4 0 |7 0 |9 4431 |a DL |b DL |d 2025-06-02 |l 0 |r 2025-06-02 10:34:01 |w 2025-06-02 |y PDF | ||
| 994 | |a 92 |b N$T | ||
| 942 | |2 ddc |c PDF |n 0 | ||
| 999 | |c 4011 |d 4011 | ||