Your SlideShare is downloading. ×
  • Like
Modern  Methods Of  Electronic  Communications  Interception    Unit 1  I P
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Modern Methods Of Electronic Communications Interception Unit 1 I P

  • 3,258 views
Published

Welcome to the Local Criminal Prosecutor’s Association Meeting. This meeting will include an overview of some modern methods of electronic communications interception used by law enforcement. It will …

Welcome to the Local Criminal Prosecutor’s Association Meeting. This meeting will include an overview of some modern methods of electronic communications interception used by law enforcement. It will also show how a Violation of the U.S. Constitution’s protection of your right to privacy can be an unwarranted use. There Amendments to the Constitution will be mentioned as well as how it would be violated with unwarranted use of these techniques by law enforcement. (AIU Online, 2009)

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
3,258
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
48
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Welcome to the Local Criminal Prosecutor’s Association Meeting. This meeting will include an overview of some modern methods of electronic communications interception used by law enforcement. It will also show how a Violation of the U.S. Constitution’s protection of your right to privacy can be an unwarranted use. There Amendments to the Constitution will be mentioned as well as how it would be violated with unwarranted use of these techniques by law enforcement. (AIU Online, 2009)
  • Of course there are different time era’s for the Internet as we know it such as it’s beginnings in the 1960’s when a (DOD) Department of Defense project proceeded to interconnect multiple national computer networks in order for it to function regardless of any portions among the network that were destroyed. There were other government agencies that were using the same protocols among their networks because of it’s success and reliability. When the 1970’s came around there were Research Centers and Large Universities that were being used by large computer networks and were using identical protocols for internetworking which became the infant internet. When the 1990’s came around there were businesses that were recognizing market potential among this internet system. In 1995, the internet had become opened to commercial opportunities and was fully privatized. The World Wide Web was then developed which would then allow users to share information in a platform independent manner across internet networks. (ECIE.org, 2004) Today we need to keep in mind that the Internet allows computers to communicate with one another by allowing the use of a wide variety of communication media. The wide range of communications and hardware options has spread to almost every part of the planet as well as the universality of the protocols used. The World Wide Web as we know it today has made the Internet Interesting and easy and fun to use. Time and Technology have allowed improvements to be made which have now made surfing the Internet even more rewarding and more Interesting. In order to understand how we connect to the Internet we need to realize that it’s an easy process that merely requires a telephone line as a minimum connection. (ECIE.org, 2004)
  • Once modern technology had developed there was a transmission of information among huge distances that was accomplished with radio and Morse code. Dots and Dashes were used in a series in a coding system also known as shot and long tones. As our technology has improved the thing that replaced the code system was voice messages. Which became radio broadcasts. The transmission equipment was very expensive though so radio could not be developed as a viable two way communication medium. He telephone on the other hand was the one thing that became the communication method in order to communicate over distance among wide masses. In the development of television, pictures were able to be transmitted across distances as well. However; high cost of transmission equipment made television the best thing for the job with a one way communication method. Television is regarded for educating huge masses of people, but also is used for news broadcasts and entertainment as well. (ECIE.org, 2004) One of the most important technological advances within our history is the development of the Transistor which signaled a new integrated chip as well as the miniaturization of electronic circuits which lays the path for the personal computer. Personal Computers were developed in order to provide a means of a low cost alternative of computing resources for people rather than having to use large and expensive main frame computers. Computers today are actually multi-faced that have the ability to write process spreadsheet calculations, documents, and record and display video. Used as a tool for communication the computer would not have become possible without the development of the Internet. With all the ground work laid down by using telephone, television, radio and multi-media capabilities people can now transfer video, music, data, and sound all around the world. (ECIE.org, 2004)
  • A 342 page long bill that created the USA PATRIOT Act was signed by President Bush on October 26th, 2001 which was six weeks after September 11th. President Bush signed this bill in providing appropriate tools required to Intercept and Obstruct Terrorism Act of 2001. Once the September 11th attacks took place the USA PATRIOT Act became a forefront national debate. In Title II this changed the way the relationship of communications providers by increasing the power of law enforcement so they may be able to perform surveillance and be able to obtain information. What this has done is altered the privacy landscape among the United States of America by causing tension between surveillance needs and a preservation of civil liberties. There is a continual blame among critics towards the naivety in rules for intelligence which is a devastating success of the 9/11 operation. Our Civil Liberties have been high during crisis and times of war. People have to exercise their civil liberties during times of crisis and war in order to become willing to “temporarily” sacrifice liberties as part of war effort which fuels debate among the USA PATRIOT Act. This affects privacy procedures because not everyone will come to the same definition of what it means to have “reasonable expectation of privacy”. Three types of information are Oral Communication which does not include electronic communication, Wire Communication which does not include a portion of communication that is transmitted through a cordless telephone up until 1994, and Electronic Communication which transfers images, writings, sounds, data, signals or intelligence of any nature transmitted by using radio, electromagnetic, wire, photo electronic or photo optical systems. (Harrison, 2009)
  • Title II changes among the Fourth Amendment include the following. Broadens secret “sneak-and-peek” searches stating where law enforcement can enter premises without notice. Voice mails can be seized with a warrant, instead of a wiretap order. ISP enlists the assistance of law enforcement in order to track as well as resist hackers or computer “trespassers.” Allows them to be able to track suspects on the Internet. Power of law enforcement increases in order to track those who have “roving wiretaps” that can be put on any phone or communications device. Allows law enforcement and intelligence to share prior protected information. (ISP) can voluntarily disclose content information among its users in situations that are deemed to be an emergency. Lowers evidentiary standards in seeking information which makes surveillance information retrieval easier. Allows law enforcement to secretly install software on individual computers or provide surveillance software by using Trojan horse e-mails. (Harrison, 2009) Also the United States Amendment IV which is the essence of the Fourth Amendment states that government is not allowed to intrude in any event that one has a reasonable expectation of privacy. Keep in mind though that the definition of what is “reasonable” is not static. (Harrison, 2009)
  • This is the Conclusion which explains a broad variety of the entire project which is sectioned among various pages.
  • These are the References Cited for this Assignment.

Transcript

  • 1. Modern Methods of Electronic Communications Interception
    For The Local Criminal Prosecutor’s
    Association Meeting
    Technology Trends
    Carla J. McCoy
    Unit 1 Individual Project – CRJ216
    April 27th, 2009
    American InterContinental University
  • 2. Modern Methods of Electronic Communications Interception used by Law Enforcement
    • Internet Communication/Computers
    • 3. Telephone
  • Modern Methods of Electronic Communications Interception used by Law Enforcement
    • Television/Radio
    • 4. Transistors
  • How Unwarranted Use of Methods of Communications Interception could be a Violation of the U.S. Constitution’s Protection of your right to Privacy
  • 5. Amendments to the Constitution that is Violated with Unwarranted use of these Techniques by Law Enforcement
  • 6. Conclusion
    The very thought that anyone can be tapped in times of crisis or war is seen as a violation of the 4th Amendment as well as a due process clause of the 5th Amendment. Although it does not broaden any power among law enforcement we can view it as though these are isolated cases. Anytime a Judge allows a wire tap to take place of must be in connection with the person being wire tapped. If you are an Internet or Local Area Network user you should not expect privacy in their use. Users must be aware and come to the frank realization that any information that is stored, copied, shared and disseminated repeatedly as well as indiscriminately are all a matter of transmission and delivery. However; the lack of privacy doesn’t mean that users among institution resources can be subject to unreasonable interference which is why policies need to address limitations of access an interference. (Harrison, 2009)
    In compliance with new demands among the USA PATRIOT Act, there are certain policies and procedures that are considered to be appropriate which would include Establishing a protocol for information requests, having a single point of entry among all information and surveillance requests, Establishing or modifying privacy policies, Keeping a confidential log of information and surveillance activities, Establishing routines for surveillance activities and requests, Establishing emergency and computer trespasser procedures, The prevention of disclosures or confidentiality breaches, Knowing what exactly to look for when a request is made, Conducting a capability study, and Involving legal counsel in any requests for information. (Harrison, 2009)
  • 7. References
    AIU Online, (2009) Technology in Criminal Justice Administration Classroom Individual Project Assignment, CRJ216 with Professor
    Makin, D., (2009) retrieved on May 1st, 2009 from https://mycampus.aiu-online.com
    ECIE.org, (2004) Internet Vision The Beginnings, Communication Technologies and The Importance of the Internet in
    Communication. Retrieved on May 1st, 2009 from http://www.ecie.org/Vision/internet.php
    Harrison, D., (2009) Higher Education Issues After The USA Patriot Act Division of Legal Affairs retrieved on May 2nd, 2009 from:
    http://www.nacua.org/documents/PatriotAct_Outline.pdf