Loading…

Technological Surveillance of Communication in American, German and Chinese Criminal Procedure.

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Shi, Jiahui
Format: Electronic eBook
Language:Alemán
Published: Berlin : Duncker & Humblot, 2022.
Series:Beiträge zum Internationalen und Europäischen Strafrecht - Studies in International and European Criminal Law and Procedure.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Intro
  • Foreword
  • Content Overview
  • Contents
  • Introduction
  • I. The Background of the Study
  • II. The Three Jurisdictions
  • III. Presentation of Problems
  • IV. Structure of the Study
  • Part I: Surveillance of Wire and Oral Communications in the U.S.
  • I. Constitutional Protection
  • 1. Trespass Doctrine
  • 2. From Trespass Doctrine to the Reasonable Expectation of Privacy
  • 3. "Reasonable Expectation of Privacy" after Katz
  • 4. The Reasonable Expectation of Privacy
  • a) An "Actual (Subjective) Expectation of Privacy"
  • B) An Expectation "that Society is Prepared to Recognize as ˋReasonable'"
  • aa) Social Conceptions of the Expectation of Privacy
  • bb) An Empirical Study of General Attitudes toward Privacy
  • 5. The Minimal Expectation of Privacy
  • 6. Other Constitutional Aspects of Electronic Surveillance
  • a) 5th Amendment: Privilege against Self-incrimination
  • b) The Attorney-Client Privilege
  • c) 6th Amendment: The Right to Counsel
  • d) Summary
  • II. Surveillance of Wire and Oral Communications in Federal Statutes
  • 1. Early Regulation
  • 2. The Modern Statute
  • A) The Definition of "Wire Communication" under 2510‍(1) of Title III
  • b) The Definition of "Oral Communication" under 2510‍(2) of Title III
  • c) The Definition of "Intercept" under 2510‍(4) of Title III
  • III. Exceptions from the General Prohibition of Warrantless Surveillance
  • 1. Plain Hearing
  • 2. Consent to Surveillance under Title III
  • IV. Procedure
  • 1. Application Process for a Surveillance Warrant at the Federal Level
  • a) Who can Make and Authorize an Application
  • b) Exigent Circumstances
  • c) Crimes that Can be Investigated by Intercepting Communications
  • D) The Contents of an Application
  • e) Review Criteria
  • aa) Legality and Necessity
  • bb) Effectiveness of the Technology
  • cc) Cost
  • 2. The Warrant
  • a) Jurisdiction
  • b) Findings and Determinations
  • aa) Probable Cause
  • bb) Specific Communications to be Intercepted
  • cc) Inadequacy of Investigatory Alternatives
  • (1) Failure or the Unlikely Success of Other Measures
  • (2) Dangers Arising from Other Measures
  • (3) The Frustration of the "Last Resort" Requirement
  • dd) Where Communications Can be Intercepted
  • ee) High Approval Rate of Applications
  • C) The Contents of the Warrant (18 U.S. Code 2518‍(4)-(6))
  • aa) The Duration Directive
  • bb) The Termination Directive
  • cc) The Minimization Directive
  • dd) The Progress Report System
  • 3. The Role of Police and Prosecutors
  • 4. Extension of the Warrant
  • 5. Sealing the Evidence
  • 6. Giving Notice of Electronic Surveillance
  • V. Exclusionary Rule
  • 1. Origin and Purpose of the Exclusionary Rule
  • 2. Admissibility of Wiretap Evidence under the 4th Amendment
  • 3. Admissibility under Section 605
  • 4. Admissibility under Title III