Technological Surveillance of Communication in American, German and Chinese Criminal Procedure.
Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constituti...
Saved in:
| Main Author: | |
|---|---|
| Format: | Electronic eBook |
| Language: | German |
| Published: |
Berlin :
Duncker & Humblot,
2022.
|
| Series: | Beiträge zum Internationalen und Europäischen Strafrecht - Studies in International and European Criminal Law and Procedure.
|
| Subjects: | |
| Online Access: | EBSCOhost |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Intro
- Foreword
- Content Overview
- Contents
- Introduction
- I. The Background of the Study
- II. The Three Jurisdictions
- III. Presentation of Problems
- IV. Structure of the Study
- Part I: Surveillance of Wire and Oral Communications in the U.S.
- I. Constitutional Protection
- 1. Trespass Doctrine
- 2. From Trespass Doctrine to the Reasonable Expectation of Privacy
- 3. "Reasonable Expectation of Privacy" after Katz
- 4. The Reasonable Expectation of Privacy
- a) An "Actual (Subjective) Expectation of Privacy"
- B) An Expectation "that Society is Prepared to Recognize as ˋReasonable'"
- aa) Social Conceptions of the Expectation of Privacy
- bb) An Empirical Study of General Attitudes toward Privacy
- 5. The Minimal Expectation of Privacy
- 6. Other Constitutional Aspects of Electronic Surveillance
- a) 5th Amendment: Privilege against Self-incrimination
- b) The Attorney-Client Privilege
- c) 6th Amendment: The Right to Counsel
- d) Summary
- II. Surveillance of Wire and Oral Communications in Federal Statutes
- 1. Early Regulation
- 2. The Modern Statute
- A) The Definition of "Wire Communication" under 2510(1) of Title III
- b) The Definition of "Oral Communication" under 2510(2) of Title III
- c) The Definition of "Intercept" under 2510(4) of Title III
- III. Exceptions from the General Prohibition of Warrantless Surveillance
- 1. Plain Hearing
- 2. Consent to Surveillance under Title III
- IV. Procedure
- 1. Application Process for a Surveillance Warrant at the Federal Level
- a) Who can Make and Authorize an Application
- b) Exigent Circumstances
- c) Crimes that Can be Investigated by Intercepting Communications
- D) The Contents of an Application
- e) Review Criteria
- aa) Legality and Necessity
- bb) Effectiveness of the Technology
- cc) Cost
- 2. The Warrant
- a) Jurisdiction
- b) Findings and Determinations
- aa) Probable Cause
- bb) Specific Communications to be Intercepted
- cc) Inadequacy of Investigatory Alternatives
- (1) Failure or the Unlikely Success of Other Measures
- (2) Dangers Arising from Other Measures
- (3) The Frustration of the "Last Resort" Requirement
- dd) Where Communications Can be Intercepted
- ee) High Approval Rate of Applications
- C) The Contents of the Warrant (18 U.S. Code 2518(4)-(6))
- aa) The Duration Directive
- bb) The Termination Directive
- cc) The Minimization Directive
- dd) The Progress Report System
- 3. The Role of Police and Prosecutors
- 4. Extension of the Warrant
- 5. Sealing the Evidence
- 6. Giving Notice of Electronic Surveillance
- V. Exclusionary Rule
- 1. Origin and Purpose of the Exclusionary Rule
- 2. Admissibility of Wiretap Evidence under the 4th Amendment
- 3. Admissibility under Section 605
- 4. Admissibility under Title III