Technological Surveillance of Communication in American, German and Chinese Criminal Procedure.
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Alemán |
Published: |
Berlin :
Duncker & Humblot,
2022.
|
Series: | Beiträge zum Internationalen und Europäischen Strafrecht - Studies in International and European Criminal Law and Procedure.
|
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- Intro
- Foreword
- Content Overview
- Contents
- Introduction
- I. The Background of the Study
- II. The Three Jurisdictions
- III. Presentation of Problems
- IV. Structure of the Study
- Part I: Surveillance of Wire and Oral Communications in the U.S.
- I. Constitutional Protection
- 1. Trespass Doctrine
- 2. From Trespass Doctrine to the Reasonable Expectation of Privacy
- 3. "Reasonable Expectation of Privacy" after Katz
- 4. The Reasonable Expectation of Privacy
- a) An "Actual (Subjective) Expectation of Privacy"
- B) An Expectation "that Society is Prepared to Recognize as ˋReasonable'"
- aa) Social Conceptions of the Expectation of Privacy
- bb) An Empirical Study of General Attitudes toward Privacy
- 5. The Minimal Expectation of Privacy
- 6. Other Constitutional Aspects of Electronic Surveillance
- a) 5th Amendment: Privilege against Self-incrimination
- b) The Attorney-Client Privilege
- c) 6th Amendment: The Right to Counsel
- d) Summary
- II. Surveillance of Wire and Oral Communications in Federal Statutes
- 1. Early Regulation
- 2. The Modern Statute
- A) The Definition of "Wire Communication" under 2510(1) of Title III
- b) The Definition of "Oral Communication" under 2510(2) of Title III
- c) The Definition of "Intercept" under 2510(4) of Title III
- III. Exceptions from the General Prohibition of Warrantless Surveillance
- 1. Plain Hearing
- 2. Consent to Surveillance under Title III
- IV. Procedure
- 1. Application Process for a Surveillance Warrant at the Federal Level
- a) Who can Make and Authorize an Application
- b) Exigent Circumstances
- c) Crimes that Can be Investigated by Intercepting Communications
- D) The Contents of an Application
- e) Review Criteria
- aa) Legality and Necessity
- bb) Effectiveness of the Technology
- cc) Cost
- 2. The Warrant
- a) Jurisdiction
- b) Findings and Determinations
- aa) Probable Cause
- bb) Specific Communications to be Intercepted
- cc) Inadequacy of Investigatory Alternatives
- (1) Failure or the Unlikely Success of Other Measures
- (2) Dangers Arising from Other Measures
- (3) The Frustration of the "Last Resort" Requirement
- dd) Where Communications Can be Intercepted
- ee) High Approval Rate of Applications
- C) The Contents of the Warrant (18 U.S. Code 2518(4)-(6))
- aa) The Duration Directive
- bb) The Termination Directive
- cc) The Minimization Directive
- dd) The Progress Report System
- 3. The Role of Police and Prosecutors
- 4. Extension of the Warrant
- 5. Sealing the Evidence
- 6. Giving Notice of Electronic Surveillance
- V. Exclusionary Rule
- 1. Origin and Purpose of the Exclusionary Rule
- 2. Admissibility of Wiretap Evidence under the 4th Amendment
- 3. Admissibility under Section 605
- 4. Admissibility under Title III