Iot”) – Background Information

Total Page:16

File Type:pdf, Size:1020Kb

Iot”) – Background Information 0RIVACYANDTHE)NTERNETOF4HINGS)O4 ,EONIE(UANG %SQ (OLLAND+NIGHT-ODERATOR -ARK-ELODIA %SQ 0ARTNER (OLLAND+NIGHT *ESSICA,EE %SQ 0ARTNER ,OEB,OEB !NTHONY&ORD %SQ 3ENIOR$ATA0RIVACY#OUNSEL -EDIDATA3OLUTIONS )NC -ANAS-OHAPATRA %SQ #HIEF0RIVACY/FFICERAT6IACOM The Internet of Things (“IoT”) – Background Information Compiled by Leonie Huang, Holland & Knight I. What is the IoT? A. Where did the term come from?: Kevin Ashton is often credited with coining the term in 1999, while working as a brand manager at Proctor & Gamble and working on early RFID technology. (Kevin Ashton is a cofounder of the Auto-ID Center at Massachusetts Institute of Technology, a precursor to the Auto-ID Lab at MIT— which is part of an independent network of seven academic research labs conducting research and development of new technologies with a goal of creating new consumer benefits and revolutionizing global commerce.) 1. Sources: a. Internet of things (IoT) History, Postscapes (Aug. 20, 2018), https://www.postscapes.com/internet-of-things-history/ (“1999 - A big year for the IoT and MIT. The Internet of Things term is coined by Kevin Ashton executive director of the Auto-ID Center”). b. Kevin Ashton, “That “Internet of Things” Thing, RFID Journal (June 22, 2009), available at https://www.rfidjournal.com/articles/view?4986 (“I could be wrong, but I'm fairly sure the phrase "Internet of Things" started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999.”) c. Arik Gabbai, Kevin Ashton Describes “the Internet of Things”, Smithsonian Magazine (January 2015), available at https://www.smithsonianmag.com/innovation/kevin-ashton-describes-the- internet-of-things-180953749/#i6DUCkEK2jE8yH6V.99 d. Kevin Maney and Alison Maney, Kevin Ashton, Father of the Internet of Things & Network Trailblazer, Cisco - The Network (Dec. 8, 2014), available at https://newsroom.cisco.com/feature- content?type=webcontent&articleId=1558161 (“It all started with lipstick. A particularly popular color of Oil of Olay lipstick that Kevin Ashton had been pushing as a brand manager at Procter & Gamble was perpetually out of stock. He decided to find out why, and found holes in data about the supply chain that eventually led him to drive the early deployment of RFID chips on inventory. Asked by the Massachusetts Institute of Technology to start a group -- the Auto-ID Center -- that would research RFID technology, he found a way to talk about RFID to a less-than- computer-savvy crowd – by coining the phrase the Internet of Things or IoT.”). i. RFID: “Radio Frequency IDentification is a technology that allows almost any object to be wirelessly identified using data transmitted via radio waves.” Suzanne Smiley, What is RFID, RFID Insider (Feb. 21, 2017), available at https://blog.atlasrfidstore.com/what-is-rfid?utm_source=Quick- Start&utm_medium=Link&utm_campaign=Content&utm_content =What-is-RFID B. How do people define IoT?: There are many definitions and descriptions. Commenters say there is no generally or universally agreed definition. Here are some recent definitions excerpted from the source documents noted at the end of each excerpt: 1. “Internet of Things” (IoT) refers to networks of objects that communicate with other objects and with computers through the Internet. The objects that are not themselves computers but have embedded components that connect to the Internet. a. Things” may include virtually any object for which remote communication, data collection, or control might be useful, such as smart meters, fitness trackers, smart clothing, vehicles, appliances, medical devices, electric grids, transportation infrastructure, manufacturing equipment, or building systems. i. In other words, the IoT potentially includes huge numbers and kinds of interconnected objects. b. Two features makes objects part of the IoT—a unique identifier and Internet connectivity. i. Such “smart” objects each have a unique Internet Protocol (IP) address to identify the object sending and receiving information. ii. Smart objects can form systems that communicate among themselves, usually in concert with computers, allowing automated and remote control of many independent processes and potentially transforming them into integrated systems. c. Source: Eric A. Fischer, The Internet of Things: Frequently Asked Questions, Congressional Research Service Report (October 13, 2015), available at https://crsreports.congress.gov/product/pdf/R/R44227 2. Although there is no single, universal definition for IoT, the term generally refers to a network of ordinary objects that are embedded with Internet- connected electronics, sensors, or software that can capture, exchange, and receive data. 2 a. These “things” include items sold to and used by consumers, as well as broader cloud-enabled machine-to-machine communications that enable businesses and organizations to track energy use, functionality, or efficiency. b. IoT technology enables the creation, transmission, communication, and analysis of data generated by embedded sensors. c. See Table ES-1 at page 2 for an overview of technologies facilitating IoT information exchange. d. Source: Federal Transit Administration, Report to Congress on Internet of Things, FTA Report No. 0099 (Feb. 2017), available at https://www.transit.dot.gov/sites/fta.dot.gov/files/docs/research- innovation/60436/ftareportno0099.pdf II. When did the IoT really take off? A. According to Cisco Internet Business Solutions Group, there came a point in time (sometime between 2008 and 2009) when more things than people were connected to the internet, and the IoT was “born.” Source: Dave Evans, The Internet of Things, How the Next Evolution of the Internet Is Changing Everything, Cisco White Paper 3 (April 2011), available at https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf B. More recently, with 5G wireless capability people are again talking about a takeoff of IoT. Examples: • Hatem Zeine, What The Future Of IoT And 5G May Look Like, Forbes.com (Nov. 1, 2018), available at https://www.forbes.com/sites/forbestechcouncil/2018/11/01/what-the-future-of- iot-and-5g-may-look-like/#48341af0629b • Corrine Reichert, CES 2019: Sprint pairs Curiosity IoT with 5G to power smart cities, autonomous vehicles, ZDNet (Jan. 9, 2019), available at https://www.zdnet.com/article/ces-2019-sprint-pairs-curiosity-iot-with-5g-to- power-smart-cities-autonomous-vehicles/ III. How many things or devices are we talking about now? A. Estimates vary widely, for example, ranging from 8.4 billion to 18 billion connected things in 2017 and projections of around 20 to 50 billion by 2020. 1. Sources: 3 a. Cisco: https://www.cisco.com/c/en/us/solutions/collateral/service- provider/visual-networking-index-vni/white-paper-c11- 741490.html#_Toc529314172 b. Ericsson: https://www.ericsson.com/en/mobility-report/internet- of-things-forecast c. Gartner: https://www.gartner.com/en/newsroom/press- releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in- use-in-2017-up-31-percent-from-2016 IV. IoT in the News – For some recent headlines detailing public concern with privacy and security issues related to the IoT see these examples: • Laura Hautala, Blackberry Wants to Make the Internet of Things Safe for You, CNet (Jan. 6, 2019), available at https://www.cnet.com/news/blackberry-wants- to-make-the-internet-of-things-safe-for-you/ • Jennifer Valentino-Devries, Natasha Singer, Michael H. Keller and Aaron Krolik, Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret, N.Y. Times (Dec. 10, 2018), available at https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy- apps.html • Farhad Manjoo, A Future Where Everything Becomes a Computer Is as Creepy as You Feared, N.Y. Times (Oct. 10, 2018), available at https://www.nytimes.com/2018/10/10/technology/future-internet-of-things.html • Derek Hawkins, The Cybersecurity 202: California’s New Internet of Things Law Only Protects Against a Small Portion of Cyberthreats, Washington Post (Oct. 8, 2018) available at https://www.washingtonpost.com/news/powerpost/paloma/the- cybersecurity-202/2018/10/08/the-cybersecurity-202-california-s-new-internet-of- things-law-only-protects-against-a-small-portion-of- cyberthreats/5bba75781b326b7c8a8d1885/?utm_term=.5c55aec4735e • Lily Hay Newman, The Sensors that Power Smart Cities are Aa Hacker’s Dream, Wired (Aug. 9, 2018), available at https://www.wired.com/story/sensor-hubs- smart-cities-vulnerabilities-hacks/ 4 Senate Bill No. 327 CHAPTER 886 An act to add Title 1.81.26 (commencing with Section 1798.91.04) to Part 4 of Division 3 of the Civil Code, relating to information privacy. [Approved by Governor September 28, 2018. Filed with Secretary of State September 28, 2018.] legislative counsel’s digest SB 327, Jackson. Information privacy: connected devices. Existing law requires a business to take all reasonable steps to dispose of customer records within its custody or control containing personal information when the records are no longer to be retained by the business by shredding, erasing, or otherwise modifying the personal information in those records to make it unreadable or undecipherable. Existing law also requires a business that owns, licenses, or maintains personal information about a California resident to implement and maintain reasonable security procedures and practices appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Existing law authorizes a customer injured by a violation of these provisions to institute a civil action to recover damages. This bill, beginning on January 1, 2020, would require a manufacturer of a connected device, as those terms are defined, to equip the device with a reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, and designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure, as specified.
Recommended publications
  • Warrantless Workplace Searches of Government
    WARRANTLESS WORKPLACE within which the principles outlined in SEARCHES OF GOVERNMENT O’Connor for “workplace” searches by EMPLOYEES government supervisors can be understood and applied. In sum, when a government supervisor is considering the search of a Bryan R. Lemons government employee’s workspace, a two- Branch Chief part analysis can be utilized to simplify the process. First, determine whether the There are a variety of reasons why employee has a reasonable expectation of a government supervisor might wish to privacy in the area to be searched. If a search a government employee’s reasonable expectation of privacy does workplace. For example, a supervisor exist, then consider how that expectation might wish to conduct a search to locate a can be defeated.2 Before turning to those needed file or document; the supervisor issues, however, it is necessary to first might wish to search an employee’s define exactly what is meant by the term workplace to discover whether the “workplace.” employee is misusing government property, such as a government-owned DEFINING THE “WORKPLACE” computer; or, a supervisor might seek to search an employee’s workplace because “Workplace,” as used in this he has information that the employee is article, “includes those areas and items committing a crime, such as using the that are related to work and are generally Internet to download child pornography. within the employer’s control.”3 This would include such areas as offices, desks, In situations where a public filing cabinets, and computers. However, employer
    [Show full text]
  • Report Legal Research Assistance That Can Make a Builds
    EUROPEAN DIGITAL RIGHTS A LEGAL ANALYSIS OF BIOMETRIC MASS SURVEILLANCE PRACTICES IN GERMANY, THE NETHERLANDS, AND POLAND By Luca Montag, Rory Mcleod, Lara De Mets, Meghan Gauld, Fraser Rodger, and Mateusz Pełka EDRi - EUROPEAN DIGITAL RIGHTS 2 INDEX About the Edinburgh 1.4.5 ‘Biometric-Ready’ International Justice Cameras 38 Initiative (EIJI) 5 1.4.5.1 The right to dignity 38 Introductory Note 6 1.4.5.2 Structural List of Abbreviations 9 Discrimination 39 1.4.5.3 Proportionality 40 Key Terms 10 2. Fingerprints on Personal Foreword from European Identity Cards 42 Digital Rights (EDRi) 12 2.1 Analysis 43 Introduction to Germany 2.1.1 Human rights country study from EDRi 15 concerns 43 Germany 17 2.1.2 Consent 44 1 Facial Recognition 19 2.1.3 Access Extension 44 1.1 Local Government 19 3. Online Age and Identity 1.1.1 Case Study – ‘Verification’ 46 Cologne 20 3.1 Analysis 47 1.2 Federal Government 22 4. COVID-19 Responses 49 1.3 Biometric Technology 4.1 Analysis 50 Providers in Germany 23 4.2 The Convenience 1.3.1 Hardware 23 of Control 51 1.3.2 Software 25 5. Conclusion 53 1.4 Legal Analysis 31 Introduction to the Netherlands 1.4.1 German Law 31 country study from EDRi 55 1.4.1.1 Scope 31 The Netherlands 57 1.4.1.2 Necessity 33 1. Deployments by Public 1.4.2 EU Law 34 Entities 60 1.4.3 European 1.1. Dutch police and law Convention on enforcement authorities 61 Human Rights 37 1.1.1 CATCH Facial 1.4.4 International Recognition Human Rights Law 37 Surveillance Technology 61 1.1.1.1 CATCH - Legal Analysis 64 EDRi - EUROPEAN DIGITAL RIGHTS 3 1.1.2.
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • What to Do When You Are Served with a Search Warrant by Manny A
    AN A.S. PRATT PUBLICATION APRIL 2016 PRATT’S PRATT’S VOL. 2 • NO. 3 PRIVACY & CYBERSECURITY LAW CYBERSECURITY & PRIVACY PRATT’S PRIVACY & CYBERSECURITY REPORT LAW REPORT EDITOR’S NOTE: SOMETHING FOR EVERYONE! THE FTC, UNFAIR PRACTICES, AND Steven A. Meyerowitz CYBERSECURITY: TWO STEPS FORWARD, AND TWO STEPS BACK WHAT TO DO WHEN YOU ARE SERVED WITH A David Bender SEARCH WARRANT APRIL Manny A. Abascal and Robert E. Sims DRONES AT HOME: DHS PUBLISHES BEST PRACTICES FOR PROTECTING PRIVACY, CIVIL PRESIDENT OBAMA SIGNS CYBERSECURITY RIGHTS, AND CIVIL LIBERTIES IN DOMESTIC 2016 ACT OF 2015 TO ENCOURAGE CYBERSECURITY UAS PROGRAMS INFORMATION SHARING Charles A. Blanchard, David J. Weiner, Kenneth L. Wainstein, Keith M. Gerver, Tom McSorley, and Elizabeth T.M. Fitzpatrick and Peter T. Carey VOL. VOL. A SKIMPY RISK ANALYSIS IS RISKY BUSINESS 2 FOR HIPAA COVERED ENTITIES AND • BUSINESS ASSOCIATES NO. Kimberly C. Metzger 3 What to Do When You Are Served With a Search Warrant By Manny A. Abascal and Robert E. Sims* Most business executives and officers lack the training and preparation to deal effec- tively with a search warrant. In order to protect privacy and other rights, this article sets forth the basic principles that should govern preparation for, and response to, a search warrant. State and federal law enforcement agencies continue to increase their investigation and prosecution of white collar crime, particularly relating to the securities and health- care industries. The search warrant has become a regular method authorities use to obtain evidence. Law enforcement officers executing a warrant typically arrive at corporate offices with no prior notice, armed with a search warrant entitling them to seize original business records, including computer records.
    [Show full text]
  • A Call from the Panopticon to the Judicial Chamber “Expect Privacy!”
    Journal of International Commercial Law and Technology Vol.1, Issue 2 (2006) A Call From the Panopticon to the Judicial Chamber “Expect Privacy!” Julia Alpert Gladstone Bryant University Smithfield, RI,USA Abstract Privacy is necessary in order for one to develop physically, mentally and affectively. Autonomy and self definition have been recognized by the United States Supreme Court as being values of privacy. In our technologically advanced, and fear driven society, however, our right to privacy has been severely eroded. Due to encroachment by government and business we have a diminished expectation of privacy. This article examines the detriments to self and society which result from a reduced sphere of privacy, as well as offering a modest suggestion for a method to reintroduce an improved conception of privacy into citizens’ lives. Keywords: Privacy, Technology, Judiciary, Autonomy, Statute INTRODUCTION Citizens often pay scant attention to their privacy rights until a consciousness raising event, such as the late 2005 exposure of the unauthorized wiretapping performed by the United States Executive Branch, heightens their interest and concern to protect previously dormant privacy rights. The scholarly literature on privacy is plentiful which broadly explains privacy as a liberty or property right, or a condition of inner awareness, and explanations of invasions of privacy are also relevant. This article seeks to explain why privacy remains under prioritized in most people’s lives, and yet, privacy is held as a critical, if not, fundamental right. Privacy is defined according to social constructs that evolve with time, but it is valued, differently. It is valued as a means to control one’s life.
    [Show full text]
  • Search Warrants: Informants Jeff Welty UNC School of Government October 2018
    Search Warrants: Informants Jeff Welty UNC School of Government October 2018 Objectives • Be able to categorize sources of information accurately as officers, citizens, confidential informants, or anonymous tipsters. • Know the legal tests for when information from each type of source is sufficient to provide probable cause. • Know the legal rules regarding staleness of information. • Be able to apply the above knowledge in the context of actual search warrant applications. Most Search Warrant Cases Involve Informants • “Studies in Atlanta, Boston, San Diego, and Cleveland [found] that 92 percent of the 1,200 federal warrants issued in those cities relied on an informant.” • Alexandra Natapoff, Snitching: The Institutional and Communal Consequences, 73 U. Cin. L. Rev. 645 (2004) • What fraction of your search warrant cases involve informants? 1 It Is OK for Officers to Rely on Information from Others • “The affidavit may be based on hearsay information and need not reflect the direct personal observations of the affiant.” • State v. Campbell, 282 N.C. 185 (1972) Categories of Sources Officers and Citizens Confidential Informants Anonymous Tipsters 2 Information from Other Officers • “[I]t is well‐established that where the named informant is a police officer, his reliability will be presumed.” • State v. Caldwell, 53 N.C. App. 1 (1981) • Does this presumption of reliability make sense? • Are there circumstances where you would not presume the reliability of information from another officer? • Even if it is reliable, it won’t always provide probable cause • Limited information • Conclusory information • Stale information • Poor basis of knowledge Information from Victims and Other Citizens • “The fact that [the citizen informant] was named and identified .
    [Show full text]
  • Vehicle and Object Tracking Based on GPS and GSM
    ISSN 2394-7314 International Journal of Novel Research in Computer Science and Software Engineering Vol. 3, Issue 1, pp: (255-259), Month: January-April 2016, Available at: www.noveltyjournals.com Vehicle and Object Tracking Based on GPS and GSM 1Sonali Kumari, 2Simran Ghai, 3Bharti Kushwaha 1,2,3Department of Computer Science, Dronacharya Group of Institutions, Greater Noida (U.P), India Abstract: Global positioning system is globally used for the navigation purpose. GPS is mainly used in military purpose, farming technologies, civil, transportation for example in vehicles and commercial users around the world. This paper describes a practical model for routing and tracking of vehicles in a large area outdoor environment, based on GSM i.e. Global System for Mobile Communication and GPS i.e. Global Positioning System. The supporting device GPS continuously move with the vehicle and records the position of the vehicle. It can be communicate with the help of GSM modern which is installed in both transmitters and receivers, when it is required by the owner. GSM model is controlled by 32 bit ARM7 LPC2148. The device will records positions to supervised centre by the SMS or GPRS which can be located in the GOOGLE EARTH and therefore the current position of the vehicle can be known. This research paper describes the working of GPS tracking system and its usefulness in actual world environment. Localisation algorithm, Kalman filter algorithm are some algorithms we will discuss in this paper. Keywords: GPS, Vehicle Tracking GSM, Google Earth, GNSS, NMEA & GPGGA General Term: Kalman algorithm, Localisation, Improvement Algorithm. 1. INTRODUCTION GPS: The GPS is formed by 24 Earth orbiting satellite and 3 more solar powered satellite use in case if any satellite doesn’t work.
    [Show full text]
  • COVID Tracker That Allowed, Inter Alia, Medical Officers to Order App
    COVID-19 Technology in the EU: A BITTERSWEET VICTORY FOR HUMAN RIGHTS? May 2021 COVID-19 Technology in the EU: A Bittersweet Victory for Human Rights? Publisher This project has been supported by the Civil Liberties Union for Europe e.V European AI Fund, a collaborative initiative Ringbahnstraße 16-18-20 of the Network of European Foundations 12099 Berlin, Germany (NEF). The sole responsibility for the project www.liberties.eu lies with the organiser(s) and the content may not necessarily reflect the positions of Editor European AI Fund, NEF or European AI Orsolya Reich Fund’s Partner Foundations. Assistant Editor A grant from Digital Freedom Fund allowed Jascha Galaski initial research to be conducted in twelve EU member states for the purposes of deciding Copy Editor over possible future strategic litigation actions. Jonathan Day This work is licensed under the Creative Authors Commons Attribution 4.0 International Nikolett Aszodi (Austria, England & License. To view a copy of this license, visit Wales, France, Greece, Luxembourg, Malta, http://creativecommons.org/licenses/by/4.0/ Portugal) or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. Jascha Galaski (Belgium, Bulgaria, Croatia, Germany, Italy, Ireland, Lithuania, Poland, Slovenia, Spain, Sweden) Oleksandra Konoplia (Czechia, Cyprus, Denmark, Estonia, Finland, Latvia, Netherlands, Slovakia) Orsolya Reich (Introduction, Hungary) 2 COVID-19 Technology in the EU: A Bittersweet Victory for Human Rights? Table of contents Introduction 4 The risks of tracing
    [Show full text]
  • Fourth Amendment Remedies As Rights: the Warrant Requirement
    FOURTH AMENDMENT REMEDIES AS RIGHTS: THE WARRANT REQUIREMENT DAVID GRAY* INTRODUCTION ............................................................................................... 426 I. THE WARRANT REQUIREMENT AND ITS CRITICS ................................ 433 II. MIRANDA AND THE CONCEPT OF CONSTITUTIONAL REMEDIES ........... 436 III. FOURTH AMENDMENT RIGHTS TO CONSTITUTIONAL REMEDIES ........ 443 A. “The right of the people . .” ...................................................... 444 B. “. to be secure . .” ................................................................. 457 C. “. shall not be violated.” ......................................................... 460 IV. THE WARRANT REQUIREMENT AS A CONSTITUTIONAL REMEDY ....... 464 A. Our Adaptable Fourth Amendment ............................................. 464 B. An Emerging Threat: The Advent of Professional Law Enforcement ................................................................................. 469 C. A Constitutional Response to the Emerging Threat..................... 473 V. A REMEDIES-AS-RIGHTS AGENDA FOR THE 21ST CENTURY ............... 481 The constitutional status of the warrant requirement is hotly debated. Critics argue that neither the text nor history of the Fourth Amendment supports a warrant requirement. Critics also question the warrant requirement’s ability to protect Fourth Amendment interests. Perhaps in response to these concerns, the Supreme Court has steadily degraded the warrant requirement through a series of widening exceptions. The result
    [Show full text]
  • Herding Katz: GPS Tracking and Society's Expectations of Privacy In
    Herding Katz: GPS Tracking and Society’s Expectations of Privacy in the 21st Century * by ZACHARY GRAY I. Introduction For nearly forty-four years, the United States Supreme Court has adhered to the same, remarkably resilient “test” for its Fourth Amendment jurisprudence.1 In what may be criminal procedure’s most famous concurring opinion, Justice Harlan articulated the Katz two-prong test to determine whether police action constitutes a search. To amount to a search, the Court must find “first, that a person [has] exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as ‘reasonable.’”2 If police actions do amount to a search, “[s]earches conducted outside the judicial process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment—subject only to a few specifically established and well-delineated exceptions.”3 That is to say, if the police conduct a search and do so without a warrant, it will usually be considered a violation of the Fourth Amendment. To remedy a Fourth Amendment violation, the Supreme Court has adopted the “exclusionary rule” that states, “evidence obtained by searches and seizures in violation of the Constitution is . inadmissible in court.”4 With the admission of critical evidence on the line, it should be no surprise that the threshold issue of whether a police action amounts * J.D. Candidate 2013, University of California, Hastings College of the Law; B.A. 2008, University of California, Irvine in Political Science and International Studies. I would like to thank Professor Kate Bloch, Professor Hadar Aviram, and Eugenée Heeter for their invaluable assistance and support for this undertaking.
    [Show full text]
  • Commonwealth of Massachusetts Supreme Judicial Court No
    COMMONWEALTH OF MASSACHUSETTS SUPREME JUDICIAL COURT NO. SJC-10355 COMMONWEALTH Appellee v. EVERETT H. CONNOLLY Defendant-Appellant ON APPEAL FROM A JUDGMENT OF THE BARNSTABLE SUPERIOR COURT BRIEF OF AMICUS CURIAE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) IN SUPPORT OF APPELLANT Marc Rotenberg (BBO # 550488) Counsel of Record John Verdi Electronic Privacy Information Center (EPIC) 1718 Connecticut Ave. NW Suite 200 Washington, DC 20009 (202) 483-1140 April 20, 2009 TABLE OF CONTENTS TABLE OF CONTENTS .................................... i TABLE OF AUTHORITIES ............................... iii INTEREST OF THE AMICUS CURIAE ........................ 1 SUMMARY OF THE ARGUMENT .............................. 3 ARGUMENT ............................................. 5 I. GPS Tracking Systems Use Invasive Techniques to Collect and Store a Large Amount of Detailed, Personal Information About Individuals' Movements... 5 A. The Global Positioning System is a Satellite- based Service ..................................... 5 B. GPS Receivers Enable Individuals to Access the GPS Satellite System and Determine Their Location, Velocity, and Altitude ............................ 7 C. Law Enforcement Uses GPS Tracking Systems to Conduct Warrantless Surveillance .................. 8 D. GPS Systems Dramatically Expand the Ability of Law Enforcement to Track Vehicles ................ 10 II. Absent a Warrant Requirement, GPS Tracking Systems in the Law Enforcement Context Threaten to Enable Pervasive Mass Surveillance........................ 13 A. Government-mandated GPS Tracking .............. 15 B. Private Sector-mandated GPS Tracking .......... 17 III. Police Must Obtain a Warrant Prior to Monitoring a GPS Tracking Unit on an Individual's Vehicle..... 20 A. GPS Tracking Constitutes a Search under the Fourth Amendment ................................. 20 B. GPS Tracking Constitutes a Search under Article 14 of the Massachusetts Declaration of Rights .... 23 i CONCLUSION .......................................... 28 Mass. R. A. P. 16(k) CERTIFICATION .................
    [Show full text]
  • 183 Poses a Greater Threat to the Exclusionary Rule Than the Past Decisions That Limited Its Application. First, the Court's
    2006] THE SUPREME COURT — LEADING CASES 183 poses a greater threat to the exclusionary rule than the past decisions that limited its application. First, the Court’s two newest Justices joined the majority opinion in full.79 Second, the majority was willing to bar the application of the exclusionary rule without regard to its de- terrent effect.80 Finally, the majority’s emphasis on changed circum- stances — the expansion of § 1983 and internal police discipline — could justify overruling Mapp.81 It remains to be seen how far the Court will go, but Hudson is a strong signal that the exclusionary rule is in trouble. 6. Fourth Amendment — Suspicionless Search of Parolees. — In 1787, Jeremy Bentham argued that the ideal prison would consist of cellblocks encircling an interior opaque column from which wardens and guards could monitor prisoners without themselves being seen.1 Because the prisoners would not know when the wardens were watch- ing them from inside the column, Bentham surmised that the prisoners would attempt to conform their behavior to acceptable standards at all times.2 Although Bentham’s Panopticon has met with considerable criticism,3 his core idea — that supervision, real or imagined, can deter ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– 79 In another case from last Term, the new Chief Justice noted that “the exclusionary rule is not a remedy we apply lightly” in view of its social costs and declined to apply the rule to viola- tions of the right of foreign nationals under the Vienna Convention of Consular Relations to con- sular notification of their arrest or detention. Sanchez-Llamas v.
    [Show full text]