Legal Frameworks and Natural Rights Within the Digital Age

Module 8 explores the intersection of privacy, surveillance, and legal protections in the digital age. It begins by analyzing privacy rights online, focusing on how individuals’ information is protected and the potential risks in a connected world. Students will study key federal statutes that govern electronic surveillance in communications networks, such as the Wiretap Act and the Electronic Communications Privacy Act (ECPA).

Significant U.S. Supreme Court cases related to cybercrime and digital evidence will be discussed, highlighting landmark decisions that have shaped the legal landscape. These cases help illustrate how the judiciary balances privacy concerns with the needs of law enforcement in the digital realm.

The module also covers national, regional, and international privacy laws, providing a broad understanding of how privacy is protected across different jurisdictions. Concepts related to search and seizure, particularly in relation to digital evidence, are explored in-depth, examining the constitutional foundations and evolving legal interpretations in the context of cybercrime.

Finally, students will gain an understanding of the federal statutes that regulate the admission of digital evidence at trial, reinforcing the importance of lawful surveillance and evidence collection in maintaining both justice and individual privacy.


Learning Objectives

After completing this module, you should be able to:

  • analyze the protection of privacy rights online.
  • describe federal statutes that govern electronic surveillance in communications networks.
  • identify and discuss the significant U.S. Supreme Court cases focusing on cybercrime and evidence.
  • appraise national, regional, and international privacy laws
  • discuss fundamental concepts of privacy as it relates to concepts of search and seizure of digital evidence.
  • examine the fundamental concepts of search and seizure laws as it relates to cybercrime.
  • recognize federal statutes that govern electronic surveillance in communications networks and the admission of digital evidence at trial.

Summary

In the digital age, the legal landscape concerning cybercrime has become increasingly complex and nuanced. This complexity stems from the global nature of the internet, which allows cybercriminals to operate across borders with relative ease. As such, there’s a pressing need for harmonized legislation that not only facilitates international cooperation but also ensures that efforts to combat cybercrime do not infringe upon fundamental human rights.

The harmonization of cybercrime legislation is crucial for effective law enforcement and prosecution of cybercriminals. Currently, the disparity in national laws creates safe havens for cybercriminals, complicating the process of investigation and prosecution. The Council of Europe’s Convention on Cybercrime, also known as the Budapest Convention, represents a significant effort toward harmonization, setting a standard for the criminalization of internet and computer-related crimes. However, global adoption and implementation of these standards remain uneven, underscoring the need for broader international cooperation.

The principles of search and seizure law, fundamental to protecting individuals’ privacy and freedom, face unique challenges in the context of cybercrime. Traditional search and seizure laws were not designed with digital evidence in mind, leading to legal and ethical dilemmas in cases involving electronic surveillance and data collection. The Fourth Amendment of the U.S. Constitution, which guards against unreasonable searches and seizures, plays a critical role in shaping the legal framework for digital evidence collection. Yet, adapting these protections to the digital realm requires ongoing legal refinement and technological understanding.

Several federal statutes govern electronic surveillance and the admissibility of digital evidence in court. The Electronic Communications Privacy Act (ECPA) of 1986 and the Computer Fraud and Abuse Act (CFAA) are foundational laws in the U.S. that address unauthorized access to electronic communications and computer systems. The USA PATRIOT Act, enacted in response to the September 11 attacks, expanded law enforcement’s surveillance capabilities, raising concerns about privacy and civil liberties.

The challenge lies in balancing the need for security and effective law enforcement with the protection of individual privacy rights. The admissibility of digital evidence at trial further complicates this balance, as courts grapple with issues related to the authenticity, integrity, and reliability of electronically stored information.

Key U.S. Supreme Court cases, such as Riley v. California (2014) and Carpenter v. United States (2018), have significantly impacted the legal standards for accessing and using digital evidence. Riley v. California established that law enforcement must obtain a warrant before searching digital information on a cell phone seized during an arrest, recognizing the vast amount of private data stored on mobile devices. Carpenter v. United States further refined the legal landscape by ruling that accessing historical cell phone location records requires a warrant, emphasizing the need to protect individuals’ location privacy.

As the legal framework for combating cybercrime evolves, it is imperative that laws comply with international human rights standards. The right to privacy, freedom of expression, and due process must be safeguarded, even in the context of cybercrime prevention and investigation. Limitations on human rights, when necessary, must be proportional, necessary, and in accordance with established legal principles.

The legal landscape relating to cybercrime will undoubtedly continue to evolve along with technological advancement. The need for harmonized legislation that respects fundamental search and seizure principles and complies with human rights standards remains a critical challenge. Ensuring that cybercrime laws strike the right balance between effective law enforcement and the protection of individual rights will be essential for maintaining justice in the digital age.

Key Takeaways

The complexity of cybercrime legislation is inherent in both the global nature of computing and those complex systems from which it operates. Therefore, cybercrime laws, making international cooperation crucial.

There is a need for unified legislation; that is harmonization of laws, to facilitate law enforcement across borders while protecting human rights.

Council of Europe’s Budapest Convention sets standards for cybercrime legislation, but global adoption is inconsistent.

Search and seizure law challenges to traditional search and seizure laws face difficulties when applied to digital evidence, requiring legal refinement.

Key U.S. legal frameworks, e.g., the Fourth Amendment, ECPA, CFAA, and USA PATRIOT Act govern electronic surveillance and raise privacy concerns.

Balancing security and privacy describe the challenge between law enforcement needs with protecting individual privacy rights, especially regarding digital evidence.

Supreme court rulings like Riley v. California and Carpenter v. United States have set important precedents for digital evidence and privacy protections.

Human rights considerations are inextricably linked to cybercrime laws. Therefore, such laws must respect international human rights standards, including privacy, freedom of expression, and due process.

Evolving legal landscape describes the condition in which as technology advances, cybercrime legislation must continuously adapt while maintaining a balance between effective enforcement and human rights protection.

Key Terms/Concepts

Budapest Convention
Carpenter v. United States (2018)
Computer Fraud and Abuse Act (CFAA)
Electronic Communications Privacy Act (ECPA)
Electronic surveillance
Human rights
Online privacy
Riley v. California (2014)
Search and seizure
Stored Communications Act (SCA)

Modern Application

How Insurance Companies Track Your data

In a recent investigation, the New York Post revealed that several popular smartphone apps, including Life360, GasBuddy, and MyRadar, are quietly collecting detailed vehicle motion data from users without their explicit knowledge. This data, which includes information such as miles driven, acceleration, hard braking, and collisions, is transmitted to a data collection company called Arity. Unbeknownst to most users, Arity is owned by Allstate Insurance and shares the collected driving data with Allstate and other auto insurers. This information is then used to assess a driver’s behavior, potentially impacting insurance rates. Many users unknowingly opt into this data sharing by agreeing to vague Terms and Conditions without realizing their driving habits are being monitored. The practice of using driving data to determine insurability raises concerns about privacy and the potential for increased insurance premiums based on app usage. This investigation highlights the growing issue of data collection through everyday apps and the significant, often hidden, impact it can have on consumers.

The practice of collecting personal data to develop a “profile” is not limited to auto insurance companies. Health insurance companies too have long been involved in the collection of personal data. Jessica Davis (2020) states that, “Reports show health insurers routinely scour public and private sources for consumer generated health data. But 90 percent of patients are unaware of the practice, a MITRE-Harris survey finds” (TechTarget, September).

Here are other useful sources that explore the topic of data collection by insurance companies, particularly through connected vehicles and apps:

  1. Marketplace reports on how automakers, like GM, collect data on drivers’ habits and sell it to data brokers like LexisNexis. This data can then be shared with insurance companies, potentially affecting drivers’ premiums without their knowledge ​(Marketplace).
  2. Abraham Watkins provides insight into how car manufacturers, including Ford and GM, collect and share driving behavior data with insurance companies. This data often includes details like speed, hard braking, and mileage, which insurers use to determine premiums ​(AWNA Law).
  3. Insurify highlights how driver data is collected through connected cars and apps, often without explicit consent. Automakers and third-party brokers sell this data to insurance companies, who then adjust premiums based on driving behavior​ (Insurify).

These sources provide an overview of how vehicle and app data is used in the insurance industry, raising important concerns about privacy and the impact on insurance rates and even more important human rights.

Read, Review, Watch and Listen

  1. Read Brian X. Chen’s The Battle for Digital Privacy Is Reshaping the Internet (New York Times, Sep. 16, 2021)
  2. Read Clubhouse in China: Is the data safe? (Jack Cable, Matt DeButts, Renee DiResta, Riana Pfefferkorn, Alex Stamos, David Thiel, Stanford Internet Observatory, Feb. 2021)
  3. Read Liam Day’s Teacher Spying Is Instilling Surveillance Culture Into Students (Reason, Feb. 15, 2022)
  4. Read J.D. Tuccillie’s Facebook is a Snitch (January, 2022)
  5. Read Jennifer Lynch’s In 2021, the Police Took a Page Out of the NSA’s Playbook: 2021 in Review (Electronic Frontier Foundation, December 2021)
  6. Read Emily Birnbaum and Daniel Lippman’s How one of America’s largest employers leans on federal law enforcement (Politico, December 2021)
  7. Review, Supreme Court to scrutinize U.S. protections for social media (Andrew Chung, Oct. 2022).
  8. Review, Queenie Wong’s, California lawmakers pass bill to make it easier to delete online personal data (Los Angeles Times as reported by Yahoo! News, September 2023).
  9. Watch Privacy: Here is how you find iOS apps that monitor accelerometer events, such as Facebook (myskapps, Oct., 2021) – also embedded below
  10. Listen to Why You Shouldn’t Use Google Chrome After New Privacy Disclosure (Forbes, March 2021)

Activity

STOP!!!

Students should review the course syllabus to determine the assignment of this activity.

This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

Purpose

The purpose of this activity is to strengthen the student’s understanding of searches by private citizens, activities by government officials, and related laws.

Instructions

  1. Watch Five Exceptions to the Exclusionary Rule [No. 86]
  2. Read Weeks v. United States: The Silver Platter Doctrine
  3. Review the Tampa Bay Times article Records show deep ties between FBI and Best Buy computer technicians looking for child porn, read Chapter 10 Digital Laws and Legislation
  4. Read about Weeks v. U.S. and the established exception to the exclusionary rule

Watch Video

Five Exceptions to the Exclusionary Rule [No. 86]
Duration: 3:12

Answer the following questions:

  • As it relates to criminal investigations, what is the purpose of the ‘Silver Platter’ doctrine? Be as specific as possible.
  • Explain how the silver platter doctrine might not apply in the case involving a California doctor, Mark Rettenmaier, and the supervisory personnel at the Bust Buy Geek Squad City facility in Brooks, KY.
  • Do you believe that the Geek Squad supervisor, Justin Meade, was acting as an agent of the FBI? Explain.

Key Terms/Concepts

The Burden of proof can define the duty placed upon a party to prove or disprove a disputed fact, or it can define which party bears this burden. In criminal cases, the burden of proof is placed on the prosecution, who must demonstrate that the defendant is guilty before a jury may convict him or her.

The exclusionary rule prevents the government from using most evidence gathered in violation of the United States Constitution.  The decision in Mapp v. Ohio established that the exclusionary rule applies to evidence gained from an unreasonable search or seizure in violation of the Fourth Amendment.

The Silver platter doctrine is the doctrine under which evidence turned over to federal officials by state officials would not be suppressed even though it was obtained by means of an illegal search. However, this doctrine has been repudiated by the Supreme Court. Articles obtained as a result of an unreasonable search and seizure by state officers may not be introduced into evidence against a defendant over his/her timely objection in a federal criminal trial, even though the search was conducted without the involvement of federal officers.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading.

Discussion Questions

  • How does the global nature of the internet and the operation of cybercriminals across borders complicate the legal landscape of cybercrime, and what does this imply for international legal cooperation and harmonization?
  • Discuss the significance of the Budapest Convention in the harmonization of cybercrime legislation. What challenges does uneven global adoption and implementation of these standards present to international efforts in combating cybercrime?
  • Considering the adaptation of traditional search and seizure laws to the digital realm, what are the main legal and ethical dilemmas that arise from electronic surveillance and data collection? How do federal statutes like the ECPA and CFAA address these challenges?
  • Analyze the impact of key U.S. Supreme Court cases such as Riley v. California (2014) and Carpenter v. United States (2018) on the legal standards for accessing and using digital evidence. How do these decisions balance the need for security with the protection of individual privacy rights?
  • Reflect on the imperative for cybercrime laws to comply with international human rights standards. Discuss how limitations on human rights, in the context of cybercrime prevention and investigation, can be made proportional, necessary, and in accordance with established legal principles.

Supplemental Readings

  1. F.T.C. Study Finds ‘Vast Surveillance’ of Social Media Users (DNYUZ, September 19, 2024) [last accessed, October 6 2024]
  2. Omnipresent AI cameras will ensure good behavior, says Larry Ellison “We’re going to have supervision,” says billionaire Oracle co-founder Ellison (Benj Edwards, Sep. 16 2024) [last accessed, October 6 2024]
  3. Kevin Bessle reports, Google settles lawsuit alleging violation of Illinois’ biometric laws (The Center Square Oct 4, 2022).

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book