The Supreme Court and Title Iii: Rewriting the Law of Electronic Surveillance

Total Page:16

File Type:pdf, Size:1020Kb

The Supreme Court and Title Iii: Rewriting the Law of Electronic Surveillance Journal of Criminal Law and Criminology Volume 74 Article 1 Issue 1 Spring Spring 1983 The uprS eme Court and Title III: Rewriting the Law of Electronic Surveillance Michael Goldsmith Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Michael Goldsmith, The uS preme Court and Title III: Rewriting the Law of Electronic Surveillance, 74 J. Crim. L. & Criminology 1 (1983) This Criminal Law is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/83/7401-1 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY . Vol. 74, No. I Copyright © 1983 by Northwestern University School of Law P'ntdin USA. THE SUPREME COURT AND TITLE III: REWRITING THE LAW OF ELECTRONIC SURVEILLANCE MICHAEL GOLDSMITH* I. INTRODUCTION .............................................. 3 II. HISTORICAL ORIGINS OF TITLE III ...................... 7 A. THE ORIGINAL CONSTITUTIONAL FRAMEWORK: OLMSTEAD AND ITS EARLY PROGENY ................ 7 B. THE FEDERAL COMMUNICATIONS ACT OF 1934: STATUTORY PRECURSOR TO TITLE III ................ 10 C. THE REVISED CONSTITUTIONAL FRAMEWORK ........ 13 1. PreliminaqModifiations ........................... 13 2. Berger v. New York and Katz v. United States... 21 III. LEGISLATIVE DESIGN ........................................ 32 A. THE CONTEXT OF REFORM ............................ 32 B. THE MECHANICS OF REFORM .......................... 38 C. TITLE III STANDARDS ................................... 39 1. Prohibitionsand Sanctions .......................... 39 2. Prerequisitesto Lawful Surveillance .................. 41 a. Jurisdictional requirements ................... 41 b. Documentary requirements .................. 42 * Assistant Professor of Law, Vanderbilt Law School. J.D., Cornell Law School, 1975; B.S., Cornell University, 1972. Permission of the author is required for reproduction. I would like to express my appreciation to various colleagues, support personnel, and students who contributed to this project. Specifically, acknowledgements must go to Notre Dame Law Professor G. Robert Blakey, Vanderbilt Law Professor Donald Hall, and Ronald Goldstock, Director of the New York State Organized Crime Task Force, for generously con- tributing their time both in discussions with me and in reviewing an early draft of this work. They are not, however, responsible for the flaws of my ways. In addition, I would like to thank Vanderbilt law students Thomas Banks, Barbara Bennett, and Kathy Hunt for provid- ing first rate research support, and Robert Frey, Leo Hylan, Steve McKnight, Ronald Rychlak, Jerry Seidler, and Craig Weinstock for providing loyal support during the final documentation of my footnotes. Nor could the project have been completed without the extraordinary assistance of Vanderbilt law librarian Howard Hood and secretaries Debby Jobe, Faye Johnson, Margaret Manofsky, Celia Miller, and Debbie Skelly. Finally, while it is somewhat unusual to dedicate articles of this kind, this one is for my wife, Constance Healey, who stuck with me through it all. MICHAEL GOLDSMITH [Vol. 74 c. Executional requirements ...................... 43 3. Judicial Super'sion and Stn'zt Enforcement ........... 44 4. The CriticalResponse .............................. 44 IV. THE SUPREME COURT AND THE DEMISE OF STRICT ENFORCEMENT ............................................. 56 A. ALDERMAN V UNITED STATES ......................... 56 B. UNITED STATES V UNITED STATES DISTRICT COURT. 63 C. GELBARD V UNITED STATES ............................ 66 D. UNITED STATES V GIORDANO AND UNITED STATES V. CHAVEZ ................................................. 76 E. UNITED STATES V. KAHN AND UNITED STATES V. DONO VAN .............................................. 85 F. SCOTT V UNITED STATES ............................... 97 G. DALIA V UNITED STATES .............................. 112 V. AFTEREFFECTS: ENFORCEMENT IN THE LOWER COURTS ................. 118 A. STANDING ............................................. 120 B. EXHAUSTION OF INVESTIGATIVE ALTERNATIVES ..... 125 C. PROBABLE CAUSE ...................................... 133 D. PARTICULARITY OF CONVERSATION .................. 138 E. PLAIN VIEW SEIZURES ................................. 141 F. SEALING ................................................ 150 VI. CONGRESSIONAL INACTION ................................ 155 VII. EXECUTIVE ENFORCEMENT: THE IRONY OF ELECTRONIC SURVEILLANCE ............................................. 157 VIII. CONCLUSION ............................................... 170 19831 ELECTRONIC SURVEILLANCE The telescreen receivedand transmittedsimultaneous'. Any soundthat Winston made, above the level ofa very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard There was ofcourse no way ofknowing whetheryou were being watched at any given moment. You hadto live--did live, from habit that became instinct-in the assumption that every soundyou made was overheard and, except in darkness, every movement scrutinized. George Orwell, 1984.** It's hardto argue with. tapes-It's too bad we couldn't have tapes at evey trial WatergateJuror *** I. INTRODUCTION The question of electronic surveillance has long posed a classic con- frontation between privacy interests and the need for effective law en- forcement. Thus, while it has been suggested that Title III of the Omnibus Crime Control and Safe Streets Act of 1968' was enacted "[t]o guard against the realization of Orwellian fears and conform to the con- stitutional standards for electronic surveillance, ' 2 the statute can better be characterized as a conscious compromise forged by Congress between competing privacy and law enforcement concerns. The comprehensive provisions of Title III authorize the use of electronic surveillance-wire- taps and bugs3-as a law enforcement investigative technique, subject, ** G. ORWELL, NINETEEN EIGHTY-FOUR 4 (1949). Congress considered and rejected the proposition that electronic surveillance would necessarily lead to "excessive invasions of pri- vacy and a Big Brother Society." S. REP. No. 1097, 90th Cong., 2d Sess. 66, reprintedin 1968 U.S. CODE CONG. & AD. NEWS 2112, 2238. See infra notes 214-15 and accompanying text. *** Ithaca Journal, Jan. 2, 1975, at 2, col. 2, quoted in NAT'L COMM'N, ELECTRONIC SUR- VEILLANCE, REPORT OF THE NATIONAL COMMISSION FOR THE REVIEW OF FEDERAL AND STATE LAWS RELATING TO WIRETAPPING AND ELECTRONIC SURVEILLANCE 198 (1976) (con- curring opinion of Commissioner Blakey). Consider also the following remarks attributed to a juror in the racketeering trial of Anthony Scotto, a Vice President of the International Longshoreman's Association, that "in the end it was the 'hard evidence'-especially the pros- ecution tape recordings--that persuaded the jury to find the waterfront labor leader guilty. ." N.Y. Times, Nov. 17, 1979, at 27, col. 5. The juror stated, "The tapes were crucial.... They had the hardest evidence and while we didn't make our decision based solely on the tapes, I'd say that, until we heard them again, quite a few people were unde- cided. In that sense, they were a turnaround." Id. col. 6. See infia note 1008. Similarly, Melvin Weinberg, the FBI's operative in the controversial Abscam investigation, has been quoted as saying, "we showed what was really going on. The tapes are the record. Nobody can change that." R. GREENE, THE STINGMAN 287 (1981). 1 18 U.S.C. §§ 2510-2520 (1976). Title III, the federal statute regulating the use of elec- tronic surveillance does not cover so-called "consensual" electronic surveillance in which one party, usually a police officer or cooperating citizen, consents to the eavesdropping. 18 U.S.C. § 2511 (c)-(d) (1976). See NAT'L COMM'N, ELECTRONIC SURVEILLANCE, REPORT OF THE NA- TIONAL COMMISSION FOR THE REVIEW OF FEDERAL AND STATE LAWS RELATING TO WIRE- TAPPING AND ELECTRONIC SURVEILLANCE 10- 11, 115-17 [hereinafter cited as NWC Report]. See infira notes 286-91 and accompanying text. 2 United States v. Marion, 535 F.2d 697, 698 (2d Cir. 1976). 3 "Wiretapping generally refers to the interception (and recording) of a communication MICHAEL GOLDSMITH [Vol. 74 however, to compliance with a series of stringent statutory requirements and prior judicial approval.4 As such, Title III was the culmination of a forty year debate concerning the utility and constitutionality of elec- tronic surveillance. The Supreme Court had resolved the constitutional merits of this debate a year earlier with its decisions in Berger v.New York 5 and Katz v. United States.6 Ironically, although both Berger and Katz suppressed the eavesdropping evidence under consideration, the two cases, taken together, provided for the first time a definitive blueprint for constitutionalizing the law of electronic surveillance. 7 It was this blueprint which served as the foundation for Title III. Nevertheless, because of the conflict between law enforcement and privacy interests, the enactment of federal electronic surveillance legisla- tion was not without controversy. 8 Because of this controversy, and be- cause of virtually unanimous concern with the potential abuses posed by electronic surveillance, the statute
Recommended publications
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT STOA DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION Vol 1/5 Presentation and Analysis 1) Presentation of the four studies 2) Analysis: Data protection and human rights in the European Union and the role of the European Parliament. Document de travail pour le Panel STOA Luxembourg, December 1999 PE 168.184/Vol 1/5/EN Cataloguing data: Title: Vol 1/5: Présentation et analyse 1) Présentation des quatre études 2) Analyse: protection des données et Droit de l'Homme dans l'Union Européenne et rôle du Parlement Européen Workplan Ref.: EP/IV/B/STOA/98/1401 Publisher: European Parliament Directorate General for Research Directorate A The STOA Programme Author: Peggy Becker - visiting researcher Under the supervision of Dick Holdsworth Head of the STOA Team Editor: Mr Dick HOLDSWORTH, Head of STOA Unit Date: Octobre 1999 PE number: PE 168.184 Vol 1/5/EN This document is a working Document for the 'STOA Panel'. It is not an official publication of STOA. This document does not necessarily represent the views of the European Parliament C O N T E N T S Page Introduction ................................................................................................................................... 4 Part One: Presentation of the four studies 1. Study One: The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems and its applicability to COMINT
    [Show full text]
  • Presidential Documents
    Weekly Compilation of Presidential Documents Monday, October 3, 1994 Volume 30ÐNumber 39 Pages 1835±1915 1 VerDate 14-MAY-98 10:32 May 27, 1998 Jkt 010199 PO 00001 Frm 00001 Fmt 1249 Sfmt 1249 C:\TERRI\P39SE4.000 INET03 Contents Addresses and Remarks Appointments and Nominations See also Bill Signings; Meetings With Foreign Environmental Protection Agency, Deputy Leaders AdministratorÐ1869 Chicago, IL, Democratic Senatorial Campaign National Cancer Advisory Board, membersÐ Committee dinnerÐ1836 1911 Congressional Hispanic Caucus receptionÐ U.S. District Court, judgeÐ1836 1877 Bill Signings New York City Bethel A.M.E. ChurchÐ1851 Departments of Veterans Affairs and Housing Democratic Congressional Campaign and Urban Development, and Independent Committee dinnerÐ1855 Agencies Appropriations Act, 1995, United Nations statementÐ1889 General AssemblyÐ1862 Riegle-Neal Interstate Banking and Branching Luncheon for heads of stateÐ1867 Efficiency Act of 1994, remarksÐ1896 Reception for heads of state and U.N. Communications to Congress delegationsÐ1867 Belarus-U.S. investment treaty, message Radio addressÐ1841 transmittingÐ1836 Receptions for Senate candidates Compact of Free Association With the Alan Wheat in Kansas City, MOÐ1847 Republic of Palau, letterÐ1874 Ann Wynia in Minneapolis, MNÐ1842 General Agreement on Tariffs and Trade, Edward M. Kennedy in McLean, VAÐ1902 messageÐ1876 Visit of Russian President Yeltsin Haiti, message transmitting noticeÐ1909 Business leadersÐ1888 Proliferation of chemical and biological ``In the Beginning'' exhibit at the Library of weapons, messageÐ1907 CongressÐ1880 Russian and American veterans of World Communications to Federal Agencies War IIÐ1872 China, memorandumÐ1911 State dinnerÐ1879 Guatemala, memorandumÐ1911 Welcoming ceremonyÐ1869 Haiti, memorandumÐ1910 (Contents Continued on inside of back cover.) WEEKLY COMPILATION OF regulations prescribed by the Administrative Committee of the Federal Register, approved by the President (37 FR 23607; 1 CFR Part 10).
    [Show full text]
  • Official Game Information
    Official Game Information Yankee Stadium • One East 161st Street • Bronx, NY 10451 Phone: (718) 579-4460 • E-mail: [email protected] • Twitter: @yankeespr & @losyankeespr World Series Champions: 1923, ’27-28, ’32, ’36-39, ’41, ’43, ’47, ’49-53, ’56, ’58, ’61-62, ’77-78, ’96, ’98-2000, ’09 YANKEES BY THE NUMBERS NOTE 2014 (2013) New YORK Yankees (41-40) vs. TAMPA BAY RAYS (36-49) Standing in AL East: ..............3rd, -2.5 Current Streak: .....................Lost 3 RHP Hiroki Kuroda (5-5, 4.23) vs. LHP David Price (6-7, 3.63) Home Record: .............18-21 (46-35) Road Record:. 23-19 (44-37) Tuesday, July 1, 2014 • Yankee Stadium • 7:05 P.M. ET Day Record: ................15-10 (32-24) Night Record: ..............26-30 (53-53) Game #82 • Home Game #40 • TV: YES • Radio: WFAN 660AM/101.9FM Pre-All-Star .................41-40 (51-44) Post-All-Star ...................0-0 (34-33) vs. AL East: ................. 17-16 (37-39) AT A GLANCE: Tonight the Yankees play the second game of a GEHRIG REMEMBERED: On Wednesday, the vs. AL Central: ................ 4-6 (22-11) three-game series vs. Tampa Bay… are 1-3 thus far on their six- Yankees will commemorate the 75th anniversary vs. AL West: ................ 10-11 (17-16) vs. National League: ..........10-7 (9-11) game homestand (are 0-1 vs. the Rays and went 1-2 vs. Boston of Lou Gehrig’s “Luckiest Man” speech (the team is vs. RH starters: ............. 27-27 (53-54) over the weekend)… beginning on Thursday, embark on an on the road on Friday at Minnesota on the actual vs.
    [Show full text]
  • Phone-Tapping and the Right to Privacy [Ronald Kakungulu]
    Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada R. Kakungulu-Mayambala * Email: [email protected] Table of Contents List of Acronyms................................................................................................2 Abstract ............................................................................................................2 Key Definitions ..................................................................................................3 I. Introduction...................................................................................................4 II. Historical and Legal Conceptions of the Right to Privacy in Uganda. .................5 2.1 History of Phone tapping and Surveillance in Uganda..................................5 III Elemental aspects of the right to privacy in communication in Uganda 1995 - 2008.................................................................................................................7 3.1 The Rationale for the right to privacy in communication..............................7 3.2 Enjoyment of the right to privacy in Uganda for the period 1995 – 2008....9 IV. The Right to Privacy in Communication in Canada and lessons for Uganda.....17 4.1. The Experiences with and approaches to the Right to Privacy in Communication in Canada ............................................................................17 4.2. The Right to Privacy in Communication in Canada and Lessons for Uganda ...................................................................................................................19
    [Show full text]
  • Criminal Redistribution of Stolen Property: the Need for Law Reform
    Michigan Law Review Volume 74 Issue 8 1976 Criminal Redistribution of Stolen Property: The Need for Law Reform G. Robert Blakey Cornell Law School Michael Goldsmith Vermont State Attorneys' Office Follow this and additional works at: https://repository.law.umich.edu/mlr Part of the Criminal Law Commons Recommended Citation G. R. Blakey & Michael Goldsmith, Criminal Redistribution of Stolen Property: The Need for Law Reform, 74 MICH. L. REV. 1511 (1976). Available at: https://repository.law.umich.edu/mlr/vol74/iss8/2 This Article is brought to you for free and open access by the Michigan Law Review at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. CRIMINAL REDISTRIBUTION OF STOLEN PROPERTY: THE NEED FOR LAW REFORM G. Robert Blakey and Michael Goldsmith TABLE OF CONTENTS I. THE REALITIES OF MODERN FENCING SYSTEMS ___ 1523 A. Marketing Theory and the Fence ______ 1523 B. Patterns of Redistribution _________ 1528 l. The "Neighborhood Connection" _____ 1529 2. The Outlet Fence ______ 1531 3. The Professional Fence ________ 1533 4. The Master Fence __________ 1535 5. The Role of Organz"zed Crime _____ 1538 Il. SoCIAL CONTROL THROUGH LAW ____ 1542 A. Crimz"nal Sanctions _________ 1542 l. The Development of the Law ______ 1542 2. Receiving Stolen Property: A Modern Perspective ______ 1545 a. The "receipt'' of property _____ 1545 b. The goods must be stolen ---------------- 1551 c. The state of mz"nd requz"rement ----------·--------- 1558 (i).
    [Show full text]
  • Michael Goldsmith
    BYU Law Review Volume 2010 Issue 2 Article 2 5-1-2010 Michael Goldsmith Frederick Mark Gedicks Follow this and additional works at: https://digitalcommons.law.byu.edu/lawreview Part of the Legal Biography Commons Recommended Citation Frederick Mark Gedicks, �������������� ������������������, 2010 BYU L. Rᴇᴠ. 339. This Article is brought to you for free and open access by the Brigham Young University Law Review at BYU Law Digital Commons. It has been accepted for inclusion in BYU Law Review by an authorized editor of BYU Law Digital Commons. For more information, please contact [email protected]. DO NOT DELETE 4/12/2010 2:52 PM Michael Goldsmith Frederick Mark Gedicks The most fitting way to begin an essay in memory of Michael Goldsmith would be to tell one of his jokes, because Michael had a terrific sense of humor. The trouble is that, as I thought of all of the jokes that Michael had told me over the many years that we knew each other, I couldn’t actually remember one that I could safely tell in public, let alone in print. He did send a lot of them through his BYU Law School email account, however, so it makes me smile to think that somewhere in the vast reaches of the BYU server, these jokes are sitting there, like time bombs waiting to go off, which is its own kind of joke. The first and by far the most important thing to remember about Michael was his love and care for his family. Two of his sisters spoke at the funeral service in Albany, and it was immediately evident how much they loved their brother, and how good he had been to them and to their mother.
    [Show full text]
  • Tax Representatives and Practitioners Program
    THE CITY OF NEW YORK DEPARTMENT OF FINANCE BILL DE BLASIO, MAYOR JACQUES JIHA, COMMISSIONER TAX REPRESENTATIVES AND PRACTITIONERS PROGRAM OCTOBER 19, 2015 Fair, Efficient, Transparent, Exceptional Customer Service 2 Taxpayer Representatives and Practitioners Program (TAXRAPP) New York Athletic Club 180 Central Park South New York, NY 10019 Monday, October 19, 2015 Event Program 7:30 - 8:30 REGISTRATION AND CONTINENTAL BREAKFAST 8:30 - 9:00 WELCOME AND INTRODUCTIONS Jacques Jiha, Ph.D., Commissioner New York City Department of Finance Jerry Boone, Commissioner New York State Department of Taxation and Finance 9:00 - 9:50 TRANSPARENCY IN THE AUDIT PROCESS The Department of Finance has undergone a significant shift toward a more transparent business model that makes tax-related information and data, Agency budgeting and spending publicly available to New York City residents. For tax practitioners, that means making sure that our rules, policies, and statements of audit procedure and other written policies are clear and easy to understand. Our goal is to become more transparent in all of our business practices. This panel outlines the major steps we’ve implemented, and provides an overview of our ongoing initiatives. Moderator: Richard Genetelli, President The Genetelli Consulting Group Panelists: Harry Leonard, Esq., Deputy Commissioner, Tax Audit & Enforcement New York City Department of Finance Diana Beinart, Esq., Deputy Commissioner and General Counsel New York City Department of Finance 3 Cesar Bencosme, Assistant Commissioner, Tax Audit New York City Department of Finance 9:55 - 10:50 NEW YORK CITY CORPORATE TAX REFORM: AN ESSENTIAL PRIMER FOR TAX PRACTITIONERS New York City’s Corporate Income Tax has been significantly reformed and is in effect for tax years beginning on or after January 1, 2015.
    [Show full text]
  • Chapter 17. Cellular Network Security
    Chapter 17 Cellular Network Security Peng Liu Pennsylvania State University Thomas F. LaPorta Pennsylvania State University Kameswari Kotapati Pennsylvania State University 1. INTRODUCTION To ensure that adversaries do not access cellular net- works and cause breakdowns, a high level of security Cellular networks are high-speed, high-capacity voice and must be maintained in cellular networks. However, data communication networks with enhanced multimedia though great efforts have been made to improve cellular and seamless roaming capabilities for supporting cellular networks in terms of support for new and innovative ser- devices. With the increase in popularity of cellular vices, greater number of subscribers, higher speed, and devices, these networks are used for more than just enter- larger bandwidth, very little has been done to update the tainment and phone calls. They have become the primary security of cellular networks. Accordingly, these networks means of communication for finance-sensitive business have become highly attractive targets to adversaries, not transactions, lifesaving emergencies, and life-/ mission- only because of their lack of security but also due to the critical services such as E-911. Today these networks ease with which these networks can be exploited to affect have become the lifeline of communications. millions of subscribers. A breakdown in a cellular network has many adverse In this chapter we analyze the security of cellular net- effects, ranging from huge economic losses due to financial works. Toward understanding the security issues in cellu- transaction disruptions; loss of life due to loss of phone calls lar networks, the rest of the chapter is organized as made to emergency workers; and communication outages follows.
    [Show full text]
  • Magazine Says NSA Is Tappiiiig Phones Telex from Britaiii
    A 14 Saturday, July 19, 1980 THE WASHINGTON POST Magazine Says NSAiS Tappiiiig Phones Telex From Britaiii •• , By • Leonard Downie Jr. tion by-Campbell of wiretappintand WsOhlriirtors Pool Foreizn Service other surveillance. `in, Britain i :and,:: E:iNDON, July 18—The British • bases its claims on unnamed sources magazine New Satesman has accused in the British and .American intelli- gence communitiesand on circum-. ' By Richard:Furno—The Washincton Post the U.S. National Security Agency of . using a secret telecOmmuniCations ' stantial evidence about the Menwith Hill station. , , ■• • rants for telephone:.tapping last year. cehier iii northern England to tap tel- : e0116ne and Telex communications • The story noted in detail the tight '. But each wirratrE; 'the contents of throughout EUrope with the help of security and • great secrecy' surround- which are kept secret, apparently cav- era the Subject of what could be a thi'llisitish government.. • communicationing the base, its spike-age' aerials, receiving satellite large ..number of . individual taps. Ve monitoring is carried out on a laige scale with the aid of computers dishes and protective domes, its. so-.Campbell has alleged that many other at,aarASI: 800-employe Menwith H111 phisticated computer and cominfinica•. wiretaps by security agencies. , are not stataion in the Yorkshire moors, ac- tionsequipment , in masslve ..concrete, covered by warrants. blockhouses and its close prnicirnity to In response to political and media cor,ding to the New Statesman, which - following. a series of New attar!: the station the largest civilian and apparent interconnection with a pressure tall relay tower in Britain's micro- • Statesman articiles by Campbell, the surveillance post maintained outside .' .
    [Show full text]
  • Case Law of the European Court of Human Rights Concerning the Protection of Personal Data
    Strasbourg, 15 November 2017 T-PD(2017)23 CASE LAW OF THE EUROPEAN COURT OF HUMAN RIGHTS CONCERNING THE PROTECTION OF PERSONAL DATA The Court’s judgments are accessible on its Internet site (http://www.echr.coe.int) CASE LAW OF THE EUROPEAN CONVENTION ON HUMAN RIGHTS CONCERNING THE PROTECTION OF PERSONAL DATA Contents JUDGMENTS OF THE EUROPEAN COURT OF HUMAN RIGHTS (PRESS RELEASES AND LEGAL SUMMARIES) 1. Eur. Court of HR, Klass and others v. Germany, judgment of 6 September 1978, application no. 5029/71. Law authorising secret services to carry out secret monitoring of communications (postal and telephone).. .................................................................................. 18 2. Eur. Court of HR, Malone v. The United Kingdom, judgment of 2 August 1984, application no. 8691/79. Interception of postal and telephone communications and release of information obtained from “metering” of telephones, both effected by or on behalf of the police within the general context of criminal investigation. .............................................. 21 3. Eur. Court of HR, Leander v. Sweden, judgment of 26 March 1987, application no. 9248/81. Use of information kept in a secret police-register when assessing a person’s suitability for employment on a post of importance for national security. ............................ 24 4. Eur. Court of HR, Gaskin v. The United Kingdom, judgment of 7 July 1989, application no. 10454/83. Refusal to grant former child in care unrestricted access to case records kept by social services……. ......................................................................................................... 27 5. Eur. Court of HR, Kruslin v. France, judgment of 24 April 1990, application no. 11801/85, and Eur. Court of HR, Huvig v. France, judgment of 24 April 1990, application no.
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    6&,(17,),&∃1∋7(&+12/2∗,&∃/237,216∃66(660(17 672∃ ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 3ΥΗςΗΘΛΡΘΘΓ∃ΘΟ∴ςΛς 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς ∃ΘΟ∴ςΛς∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ ΥΡΟΗΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΡΦΞΠΗΘΓΗΥΨΛΟΣΡΞΥΟΗ3ΘΗΟ672∃ /Ξ[ΗΠΕΡΞΥϑ∋ΗΦΗΠΕΗΥ 3(9ΡΟ(1 QA-ST-OA-132-EN-N &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 9ΡΟ3ΥπςΗΘΛΡΘΗΘΟ∴ςΗ 3ΥπςΗΘΛΡΘΓΗςΤΞ∆ΥΗπΞΓΗς ∃ΘΟ∴ςΗΣΥΡΗΦΩΛΡΘΓΗςΓΡΘΘπΗςΗΩ∋ΥΡΛΓΗΟ+ΡΠΠΗΓΘς Ο 8ΘΛΡΘ(ΞΥΡΣπΗΘΘΗΗΥ{ΟΗΓΞ3∆ΥΟΗΠΗΘ(ΞΥΡΣπΗΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ 3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ 3Ηϑϑ∴%ΗΦΝΗΥΨΛςΛΛΘϑΥΗςΗ∆ΥΦΚΗΥ 8ΘΓΗΥΚΗςΞΣΗΥΨΛςΛΡΘΡΙ∋ΛΦΝ+ΡΟΓςΖΡΥΚ +ΗΓ ΡΙΩΚΗ672∃7ΗΠ (ΓΛΡΥ0Υ ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΥΗ 3(ΘΞΠΕΗΥ 3(9ΡΟ(1 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΩΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ 672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ &217(176 3ϑΗ ,ΘΥΡΓΞΦΛΡΘ 3∆Υ2ΘΗ 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς 6ΞΓ∴2ΘΗ 7ΚΗςΩΗΡΙΚΗ∆ΥΛΘ&ΡΠΠΞΘΛΦ∆ΛΡΘς,ΘΗΟΟΛϑΗΘΦΗ &20,17ΡΙ ∆ΞΡΠΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓ ΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗ∆ςΗΓΡΥΦΡΠΠΡΘΦ∆ΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘΛΘΦΟΞΓΛΘϑςΣΗΗΦΚ ΥΗΦΡϑΘΛΛΡΘ 6ΞΓ∴7ΖΡ (ΘΦΥ∴ΣΛΡΘΘΓΦΥ∴ΣΡς∴ςΗΠςΛΘΗΟΗΦΩΥΡΘΛΦςΞΥΨΗΛΟΟΘΦΗ∆ςΞΥΨΗ∴ΡΙ ΚΗΗΦΚΘΡΟΡϑ∴ςςΗςςΠΗΘΛςςΞΗς 6ΞΓ∴7ΚΥΗΗ 7ΚΗΟΗϑ∆ΟΛ∴ΡΙΚΗΛΘΗΥΦΗΣΛΡΘΡΙΗΟΗΦΩΥΡΘΛΦΦΡΠΠΞΘΛΦ∆ΛΡΘς ΦΡΘΦΛςΗςΞΥΨΗ∴ΡΙΚΗΣΥΛΘΦΛΣΟΟΗϑ∆ΟΛςςΞΗςΘΓΛΘςΥΞΠΗΘςΞΘΓΗΥ ΛΘΗΥΘΛΡΘΟ(ΞΥΡΣΗΘΘΓΘΛΡΘΟΟΖ 6ΞΓ∴)ΡΞΥ 7ΚΗΣΗΥΦΗΣΛΡΘΡΙΗΦΡΘΡΠΛΦΥΛςΝςΥΛςΛΘϑΙΥΡΠΚΗΣΡΗΘΛΟ ΨΞΟΘΗΥΕΛΟΛ∴ΡΙΗΟΗΦΥΡΘΛΦΦΡΠΠΗΥΦΛ∆ΟΠΗΓΛΡΛΘΗΥΦΗΣΛΡΘ 3∆Υ7ΖΡ ∃ΘΟ∴ςΛς±∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ
    [Show full text]
  • Analysis the Use and Misuse of Telephone Taps and Communications Data by Bulgarian Intelligence
    Analysis The use and misuse of telephone taps and communications data by Bulgarian intelligence Alexander Kashumov (Access to Information Program, AIP) Tzvetan Tzvetanov, Minister of Interior in the Citizens for European Development of Bulgaria (GERB) government from 2009-2013, was criticised for widespread unauthorised wiretapping after information was published in the media in 2013. Concerns surfaced following an anonymous complaint registered with the Public Prosecutor’s Office and a former minister’s outspoken allegation, in a television interview, that all GERB cabinet ministers were subject to permenant phone-tapping throughout their time in office. On 15 April 2013, the Prosecutor General told a press conference that his investigation had revealed a lack of oversight within the Internal Ministry Directorate responsible for the technical performance of phone tapping. The investigation’s report was only partly classified as secret, but neither the open nor the secret part of the report was made available to the public. The scandal widely influenced public opinion before the May 2013 parliamentary elections. The context During Bulgaria’s communist past, the secret surveillance of people by the former state security services was common practice. This included the opening of correspondence and the interception of other communications. The purpose and result of this surveillance remains “unclear.” The 1991 Constitution prohibited tracking, taking pictures and the filming or recording of individuals without their knowledge or consent, except in cases prescribed by law (Article 32, para. 2). In addition, Article 34, para. 2 of the Constitution allows interference with correspondence and other communications only when it is necessary for the detection or prevention of serious crime (punishable by imprisonment of more than five years) and when prior permission has been granted by judicial authority.
    [Show full text]