Abstract
This chapter deals with the impact which information and communications technology has had on criminal procedure in the USA. It will not only lay out the framework of laws regulating criminal and national security wiretapping as well as access to stored electronic data in the form of e-mails and voicemail, etc. but also the jurisprudence regulating intercepting communications by I-phones, smart phones as well as the search of stored information in computers and I-phones and even in the “cloud.” Electronic communications have called into question the traditional Fourth Amendment jurisprudence which had denied privacy protection to information given to a third party, such as a telecommunications provider, or to movements in public. But the mass surveillance by the National Security Agency (NSA) and the scope of modern data collection and mining are gradually leading to a more critical approach to privacy issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adler, M. (1996). Cyberspace, general searches, and digital contraband: The fourth amendment and the net-wide search. Yale Law Journal, 105, 1093.
Apuzzo, M. (2014, March 19). Judge Rebukes Justice Dept. for Requesting Overly Broad E-Mail Searches. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2014/03/20/us/judge-rebukes-officials-over-requests-for-broad-email-searches.html?ref=us.
Automatic Number Plate Recognition. (2015). Wikipedia. Retrieved March 22, 2015, from http://en.wikipedia.org/wiki/Automatic_number_plate_recognition#United_States.
Bales, C. (2012). Unbreakable: The fifth amendment and computer passwords. Arizona State Law Journal, 44, 1293.
Brenner, S. (2012). Encryption, smart phones, and the fifth amendment. Whittier Law Review, 33, 525; 533–534.
Casey, T. (2008). Electronic surveillance and the right to be secure. University of California Davis Law Review, 41, 977.
Engel, J. (2012). Rethinking the application of the fifth amendment to passwords and encryption in the age of cloud computing. Whittier Law Review, 33, 543.
Fox, C. (2012). Checking in: Historic cell site location information and the stored communications act. Seton Hall Law Review, 42, 769.
Ghoshray, S. (2012). Looking through the prism of privacy and trespass: Smartphones and the fourth amendment. University of the District of Columbia David A. Clarke School of Law Review, 16, 73.
Glanz, J., Larson, J., & Lehren, A. W. (2014, January 27). Spy agencies tap data streaming from phone apps. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?ref=world&_r=0.
Goldstein, J. (2013, January 15). Police to use fake pill bottles to track drugstore thieves. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/01/16/nyregion/ny-police-to-track-drugstore-robbers-via-decoy-bottles.html.
Kerr, O. (2010). Applying the fourth amendment to the Internet: A general approach. Stanford Law Review, 62, 1005.
Kerr, O. (2012). The mosaic theory of the fourth amendment. Michigan Law Review, 111, 311.
Kimel, C. (2013). DNA profiles, computer searches, and the fourth amendment. Duke Law Journal, 62, 933.
Lichtblau, E., & Schmidt M. S. (2013, August 3). Other agencies clamor for data N.S.A. compiles. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/08/04/us/other-agencies-clamor-for-data-nsa-compiles.html?ref=us.
Lichtblau, E. (2005, April 5). Justice Dept. Defends Patriot Act Before Senate Hearings. New York Times (p. A21).
Mazzetti, M., & Elliot, J. (2013, December 9). Spies infiltrate a fantasy realm of online games. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html?ref=world.
McAllister, M. (2012). The fourth amendment and new technologies: The misapplication of analogical reasoning. Southern Illinois University Law Journal, 36, 475.
Miller, G., Tate, J., & Gellman, B. (2013, October 16). Documents reveal N.S.A.’s extensive involvement in targeted killing program. Washington Post. Retrieved July 9, 2015, from http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html.
Nixon, R. (2013, July 3). U.S. postal service logging all mail for law enforcement. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?ref=us.
Nixon, R. (2014, October 27). Report reveals wider tracking of mail in U.S. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2014/10/28/us/us-secretly-monitoring-mail-of-thousands.html?ref=us.
Perlroth, N., Larson, J., & Shane, S. (2013, September 5). N.S.A. able to foil basic safeguards of privacy on web. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?ref=world.
Risen, J., & Lichtblau, E. (2013, June 8). How the U.S. uses technology to mine more data more quickly. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?ref=world&_r=0.
Risen, J., & Poitras, L. (2014, May 31). N.S.A. collecting millions of faces from web images. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html?ref=us.
Savage, C., & Baker, P. (2013, May 22). Obama, in a shift, to limit targets of drone strikes. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/05/23/us/us-acknowledges-killing-4-americans-in-drone-strikes.html?ref=us.
Savage, C., & Mazzetti, M. (2013, November 14). C.I.A. collects global data on transfers of money. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/11/15/us/cia-collecting-data-on-international-money-transfers-officials-say.html.
Savage, C. (2013, July 25). Roberts’s picks reshaping secret surveillance court. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/07/26/us/politics/robertss-picks-reshaping-secret-surveillance-court.html?ref=us.
Savage, C. (2014, June 17). Lawyer not entitled to see classified surveillance material court rules. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2014/06/18/us/lawyer-not-entitled-to-see-classified-surveillance-material-court-rules.html?ref=us.
Schwartz, P. (2008). Reviving telecommunications surveillance law. University of Chicago Law Review, 75, 287.
Sengupta, S. (2013a, February 15). Rise of drones in U.S. drives efforts to limit police use. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/02/16/technology/rise-of-drones-in-us-spurs-efforts-to-limit-uses.html?ref=us&_r=0.
Sengupta, S. (2013b, October 13). Privacy fears grow as cities increase surveillance. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/10/14/technology/privacy-fears-as-surveillance-grows-in-cities.html?ref=us.
Shane, S. (2013a, April 7). Targeted killing comes to define war on terror. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/04/08/world/targeted-killing-comes-to-define-war-on-terror.html?ref=world&_r=0.
Shane, S. (2013b, February 8). Debating a court to vet drone strikes. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/02/09/world/a-court-to-vet-kill-lists.html?ref=us&_r=0.
Shane, S. (2013c, July 19). Surveillance court renews order for phone call data. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/07/20/us/surveillance-court-renews-order-for-phone-call-data.html?ref=us.
Shane, S. (2013d, July 25). Spy agencies under heaviest scrutiny since abuse scandal of the 70’s. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/07/26/us/politics/challenges-to-us-intelligence-agencies-recall-senate-inquiry-of-70s.html?ref=us.
Slobogin, C. (2005). Transaction surveillance by the government. Mississippi Law Journal, 75, 139.
Slobogin, C. (2008). Government data mining and the fourth amendment. University of Chicago Law Review, 75, 317.
Sullivan, B. (2001, November 20). FBI software cracks encryption wall. MSNBC. Retrieved July 9, 2015, from http://www.nbcnews.com/id/3341694/#.UZCVKcrLsoE.
Thaman, S. C. (2001). Landesbericht U.S.A. In W. Gropp & B. Huber (Eds.), Rechtliche Initiativen gegen organisierte Kriminalität. Freiburg im Breisgau: Max-Planck-Institute for Foreign and International Comparative Law.
Weisman, J. (2013, July 24). House defeats effort to rein in N.S.A. data gathering. New York Times. Retrieved July 9, 2015, from http://www.nytimes.com/2013/07/25/us/politics/house-defeats-effort-to-rein-in-nsa-data-gathering.html?ref=us.
Worth, R. F., Mazzetti, M., & Shane, S. (2013, February 6). Hazards of drone strikes face rare public scrutiny. New York Times (p. A1, A10).
United States Court Cases
ACLU v. NSA, 493 F 3d 644, 655-57 (6th Cir 2007).
Al-Haramain Islamic Foundation Inc v Bush, 507 F 3d 1190, 1193 (9th Cir 2007).
Almada v State, 994 P 2d 299, 307-08 (Wyo 1999).
Andresen v Maryland, 427 US 463, 473 (1976).
Baird v State, 398 S W 3d 220, 230 (Tex Crim App 2013).
California Banker’s Ass’n, 416 US 21, 53-54 (1974).
Clapper v. Amnesty Intern USA,133 S Ct 1138, 1148-49 (2013).
Commonwealth v Augustine, 4 N E 3d 846, 867 (Mass 2014).
Commonwealth v Bender, 811 A 2d 1016 (Pa Super 2002).
Commonwealth v Brion, 652 A 2d 287, 289 (Pa 1995).
Commonwealth v Efaw, 774 A 2d 735 (Pa 2001).
Commonwealth v Gelfgatt, 11 N E 3d 605, 615-16 (Mass 2014).
Commonwealth v Rousseau, 990 N E 2d 543, 551–53 (Mass 2013).
Cowles v State, 23 P 3d 1168, 1172 (Alaska 2001).
Devega v State, 689 S E 2d 293, 299–300 (Ga 2010).
Doe v United States, 487 US 201, 214–19 (1988).
Douglas v Dobbs, 419 F 3d 1097, 1102 (10th Cir 2005).
Fisher v United States, 425 US 391, 408 (1976).
Florida v Jardines, 133 S Ct 1409, 1416 (2013).
Frasier v State, 794 N E 2d 449, 465 (Ind App 2003).
Georgia v Randolph, 547 US 103, 109–23 (2006).
Guest v Leis, 255 F 3d 325, 335, 342 (6th Cir 2001).
Hedgepath v Commonwealth, 441 S W 3d 119, 130–31 (Ky 2014).
Hepting v AT&T, 439 F Supp 2d 974 (N D Cal 2006).
In re Application of the U.S. for an Order Authorizing the Use of Two Pen Register and Trap and Trace Devices, 632 F Supp 2d 202, 211 (E D N Y 2008).
In re Application of the United States for an Order Authorizing the Use of a Pen Register & a Trap & Trace Device & (2) Authorizing Release of Subscriber Info. & Cell Site Info., 384 F Supp 2d 562, 564 (E D N Y 2005).
In re Application of the United States, 736 F Supp 2d 578, 579 (E D N Y 2010).
In re Application of the United States, 747 F Supp 2d 827, 846 (S D Tex 2010).
In re Application of the United States, 809 F Supp 2d 113, 116, 127 (E D N Y 2011).
In re Application of United States for Historical Cell Site Data, 724 F 3d 600, 610–12 (5th Cir 2013).
In re Application of United States of America for Order Directing Provider of Electronic Communication Service to Disclose Records to Government, 620 F 3d 304, 312–13 (3d Cir 2010).
In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F 3d 1335, 1346, 1352–53 (11th Cir 2012).
In re Maxfield, 945 P 2d 196, 200–01 (Wash 1997).
In re Pers Restraint of Nichols, 256 P 3d 1131, 1135 (Wash 2001).
In re: Sealed Case No’s 02-001, 02-002, 310 F 3d 717, 721 (USFIS App 2002).
Kyllo v United States, 533 US 27, 37 (2001).
Massachusetts v Sheppard, 468 US 981, 987–88 (1984).
People v Beavers, 227 N W 2d 511, 514 (Mich 1975).
People v Devone, 931 N E 2d 70, 74 (N Y 2010).
People v Gall, 30 P 3d 145, 153 (Colo 2011).
People v Harris, 886 N E 2d 947 (Ill 2008).
People v Mason, 989 P 2d 757, 760 (Colo 1999).
People v Nesbitt, 938 N E 2d 600, 605–06 (Ill App 2010).
People v Prinzing, 907 N.E.2d 87, 99–100 (Ill App 2009).
People v Stanley, 86 Cal Rptr 2d 89, 93 (Cal App 1999).
People v Weaver, 909 N E 2d 1195, 1199–1202 (N Y 2009).
Riley v. California, 134 S.Ct. 2473 (2014).
State v Augafa, 992 P 2d 723, 734 (Haw App 1999).
State v Boyd, 992 A 2d 1071, 1082–83 (Conn 2010).
State v Brereton, 826 N W 2d 369, 379 (Wis 2013).
State v Bridges, 925 P 2d 357 (Haw 1997).
State v Clark, 916 P 2d 384, 390 (Wash 1996).
State v Davis, 732 N W 2d 173, 182 (Minn 2007).
State v Domicz, 907 A 2d 395, 402–04 (N J 2006).
State v Earls, 70 A 3d 630, 645 (N J 2013).
State v Geraw, 795 A 2d 1219, 1225–26 (Vt 2002).
State v Glass, 583 P 2d 872, 875 (Alaska 1978).
State v Henderson, 854 N W 2d 616, 632–33 (Neb 2014).
State v Holden, 964 P 2d 318, 322 (Utah App 1998).
State v Jackson, 76 P 3d 217, 224 (Wash 2003).
State v Jordan, 156 P 3d 893, 898 (Wash 2007).
State v McAllister, 840 A 2d 967, 969 (N J App 2004).
State v Mubita, 188 P 3d 867, 875 (Idaho 2008).
State v Mullens, 650 S E 2d 169, 190 (W Va 2007).
State v Ortiz, 600 N W 2d 805, 817 (Neb 1999).
State v Page, 911 P 2d 513 (Alaska 1996).
State v Ruck, 155 Idaho 475, 484 (2013).
State v Rupnick, 125 P 3d 541, 547–48 (Kan 2005).
State v Russo, 790 A 2d 1132, 1140–41 (Conn 2002).
State v Skinner, 10 So 3d 1212, 1217–18 (La 2009).
State v Sloane, 939 A 2d 796, 803–04 (N J 2008).
State v Sobczak, 833 N W 2d 59, 71–73 (Wis 2013).
State v Subdiaz-Osorio, 849 N W 2d 748 (Wis 2014).
State v Tackitt, 67 P 3d 295, 302–03 (Mont 2003).
State v Wiegand, 645 N W 2d 125, 137 (Minn 2005).
State v Williams, 590 S E 2d 151, 154–55 (Ga App 2003).
State v Worthy, 661 A 2d 1244 (N J 1995).
State v Young, 867 P 2d 593 (Wash 1994).
State v Zahn, 812 N W 2d 490, 498 (S D 2012).
Stevenson v State, 667 So 2d 410, 411–12 (Fla App 1996).
Tracey v State, 152 So 3d 504, 524–26 (Fla 2014).
United States v Adjani, 452 F 3d 1140, 1150 (9th Cir 2006).
United States v Al-Marri, 230 F Supp 2d 535, 539–40 (S D N Y 2002).
United States v Andrus, 483 F 3d 711, 719–22 (10th Cir 2007).
United States v Biasucci, 786 F 2d 504, 510–11 (2d Cir 1986).
United States v Boyce, 351 F 3d 1102, 1107, 1111 (11th Cir 2003).
United States v Bradley, 644 F 3d 1213, 1259–61 (11th Cir 2011).
United States v Bridges, 344 F 3d 1010, 1016 (9th Cir 2003).
United States v Carey, 172 F 3d 1268, 1273 (10th Cir 1999).
United States v Christie, 717 F 3d 1156, 1164–66 (10th Cir 2013).
United States v Comprehensive Drug Testing, Inc, 621 F 3d 1162, 1171–72 (9th Cir 2010).
United States v Coreas, 419 F 3d 151, 157–59 (2d Cir 2005).
United States v Cuevas-Sanchez, 821 F 2d 248, 252 (5th Cir l987).
United States v Davis, 326 F 3d 361, 365–66 (2d Cir 2003).
United States v Davis, 754 F 3d 1205, 1217 (2014).
United States v Doe, 465 US 605, 612–14 (1984).
United States v Duggan, 743 F 2d 59, 78 (2d Cir 1984).
United States v Falls, 34 F 3d 674, 680 (8th Cir l994).
United States v Fernandez, 600 F3d 56 (1st Cir 2010).
United States v Forest, 355 F 3d 942, 950–51 (6th Cir 2004).
United States v Forrester, 512 F 3d 500, 509–11 (9th Cir 2008).
United States v Frechette, 583 F 3d 374, 379 (6th Cir 2009).
United States v Fricosu, 841 F Supp 2d 1232, 1237 (D Colo 2012).
United States v Garcia, 474 F 3d 994 (7th Cir 2007).
United States v Gonzalez, 328 F 3d 543, 548 (9th Cir 2003).
United States v Gourde, 440 F 3d 1065, 1071 (9th Cir 2006).
United States v Hambrick, 55 F Supp 2d 504, 508 (W D Va 1999).
United States v Heatley, 41 F Supp 2d 284 (S D N Y 1999).
United States v Hill, 459 F 3d 966, 975–77 (9th Cir 2006).
United States v Hill, 459 F 3d 966, 978 (9th Cir 2006).
United States v Hubbell, 530 US 27, 43 (2000).
United States v Jones, 132 S Ct 945, 946 (2012).
United States v Jones, 132 S Ct 945, 957 (2012).
United States v Karo, 468 US 705, 714–18 (1984).
United States v Kattaria, 503 F 3d 703, 707 (8th Cir 2007).
United States v Kennedy, 81 F Supp 2d 1103, 1110 (D Kan 2000).
United States v King, 604 F 3d 125, 134–37 (3d Cir 2010).
United States v Kirschner, 823 F Supp 2d 665, 668–69 (E D Mich 2010).
United States v Knotts, 460 US 276, 282 (1983).
United States v Kouzmine, 921 F Supp 1131, 1135 (S D N Y 1996).
United States v Koyomejian, 970 F 2d 536, 542 (9th Cir 1992).
United States v Lee, 359 F 3d 194, 199–203 (3d Cir 2004).
United States v Longoria, 177 F 3d 1179, 1183–84 (10th Cir 1999).
United States v Lucas, 640 F 3d 168, 177–78 (6th Cir 2011).
United States v Mann, 592 F 3d 779, 785 (7th Cir 2010).
United States v Martin, 426 F 3d 68, 74–75 (2d Cir 2005).
United States v Maynard, 615 F 3d 544, 560–63 (D C Cir 2010).
United States v McArthur, 573 F 3d 608, 613 (8th Cir 2009).
United States v Meriwether, 917 F 2d 955, 959 (6th Cir 1990).
United States v Mesa-Rincon, 911 F 2d 1433, 1437 (l0th Cir l990).
United States v Miller, 425 US 435, 442 (1976).
United States v Myers, 692 F 2d 823, 859 (2d Cir 1982).
United States v Nicholson, 955 F Supp 588, 590–93 (E D Va 1997).
United States v Ning Wen, 471 F 3d 777 (7th Cir 2006).
United States v Padilla, 520 F 2d 526, 528 (1st Cir 1975).
United States v Paxton, 573 F 3d 859, 861–62 (9th Cir 2009).
United States v Pelton, 835 F 2d 1067, 1075–76 (4th Cir 1987).
United States v Purcell, 236 F 3d 1274, 1279 (11th Cir 2001).
United States v Reyes, 922 F Supp 818, 833–34 (S D N Y 1996).
United States v Richards, 659 F 3d 527, 539–40 (6th Cir 2011).
United States v Sarkissian, 841 F 2d 959, 965 (9th Cir 1988).
United States v Scarfo, 180 F Supp 2d 572, 578 (D N J 2001).
United States v Shields, 458 F 3d 269, 278 (3d Cir 2006).
United States v Thomas, 757 F2d 1359, 1367 (2d Cir 1985).
United States v Torres, 751 F 2d 875, 880–82 (7th Cir 1984).
United States v Truong Dinh Hung, 629 F 2d 908 (4th Cir 1980).
United States v Turner, 169 F 3d 84, 88–89 (1st Cir 1999).
United States v Upham, 168 F 3d 532, 535 (1st Cir 1999).
United States v Vankesteren, 553 F 3d 286, 290–91 (4th Cir 2009).
United States v Villegas, 899 F 2d 1324, 1335–36 (2d Cir 1990).
United States v Wagers, 452 F 3d 534, 542–43 (6th Cir 2006).
United States v Wahchumwah, 704 F 3d 606 (9th Cir 2012).
United States v White, 401 US 745, 749–51, 762–63, Douglas dissent at 756, Harlan dissent at 786 (1971).
United States v Williams, 124 F 3d 411, 417 (3d Cir 1997).
United States v Williams, 592 F 3d 511, 521–24 (4th Cir 2010).
United States v Yonn, 702 F 2d 1341, 1347 (11th Cir 1983).
United States v Ziegler, 474 F 3d 1184, 1191–92 (9th Cir 2007).
US v Giberson, 527 F 3d 882, 889–90 (9th Cir 2008).
Whitaker v Garcetti, 291 F Supp 2d 1132, 1138 (C D Cal 2003).
United States Statutes
§ 213 US PATRIOT Act
12 USC § 3410–22.
18 USC § 2705(a)(2).
18 USC § 3103(a).
18 USC §§ 2701–12.
50 USC § 1825(b).
50 USC §§ 1822–24.
Pub L 91-508, 84 Stat 1114 (1970).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Thaman, S.C. (2017). The Use of Information and Communications Technology in Criminal Procedure in the USA. In: Viano, E. (eds) Cybercrime, Organized Crime, and Societal Responses. Springer, Cham. https://doi.org/10.1007/978-3-319-44501-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-44501-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44499-4
Online ISBN: 978-3-319-44501-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)