Law in the Internet Society

View   r3  >  r2  >  r1
BerrakComertSecondPaper 3 - 21 Dec 2011 - Main.BerrakComert
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"
Deleted:
<
<
 It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Line: 4 to 3
 It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Changed:
<
<

Hard Drives, File Cabinets?

>
>

Computer Hardware, A Filing Cabinet?

 -- By BerrakComert - 20 Dec 2011
Deleted:
<
<
As the Internet, computers and new technologies root further into our daily lives, we face questions of how to address the issues relating to these new elements of our lives. The easiest way to categorize and solve these new problems is to resort to analogies and use our knowledge and experience that have already been there for centuries. In light of this seemingly simple approach, we can think of everything that is happening in this new segment of our lives the same as what we know except in a different environment. Accordingly, cybercrimes would simply be crimes committed in a different environment. Our online privacy would be our privacy in a different environment, a note we write online would be like a public speech we gave. However; this oversimplification cannot be inclusive enough to cover what the fast developing digital world keeps offering. Second, the most exciting thing about the internet era was the freedom it promised and did bring. This oversimplifying analogy of adapting our old concepts to the digital world does not only violate the freedom of the digital era but makes us much less free, even less free than what we began with. And finally, especially in criminal law, analogies can result to very restrictive means that threaten our freedoms and privacy even more aggressively than before.

One of the analogies of the digital world utilized by courts and legal scholars suggest that computer hard drives are just like filing cabinets that we put our files. But our computers contain the broadest data about us in the richest variety. Further, it also contains a lot of information about us, our past or present, which we do not even intentionally keep there.

 
Deleted:
<
<
When discussing computers as source of evidence, especially in the context of cybercrimes, the most commonly discussed examples are child pornography cases. Due to dreadfulness of the crime alleged, the exorbitance of violating the privacy of the suspect computer owner appears more tolerable. The necessity of such invasive measure becomes more questionable in cases of tax fraud, In the Matter of the Search of: 3817 W. West End, or illegal steroid use by professional athletes, United States v. Comprehensive Drug Testing.
 
Changed:
<
<
Examples from other places in the world can be much more dramatic and clearer to display the level of the privacy rape. A Turkish journalist, Ahmet Şık, was detained on 3 March 2011 along with other journalists. He has been under arrest since 6 March 2011, the main evidence against him being the copy of the unpublished book he wrote, which was found during a warrant in his home and allegedly in the computers of a news website, which was also alleged to have connections with an alleged ultra-nationalist organization in Turkey with possible ties to members of the country's military and security forces, a military coup plot, or merely a conspiracy for some.
>
>

The Analogy and the Overreach

 
Changed:
<
<
As the severeness of the offence changes or even the definition of the offense blurs, it is more difficult to justify the necessity of such invasive measure. Even if governments want to treat our computers as filing cabinets, do we use them as filing cabinets, or do we treat them as a private area where we imagine and expect to be more free and untouchable by others.
>
>
As the Internet, computers and new technologies root further into our daily lives, we face questions of how to address the issues relating to these new elements of our lives. The easiest way to categorize and solve these new problems is to resort to analogies and use our knowledge and experience that have already been there for centuries. In light of this seemingly simple approach, we can think of everything that is happening in this new segment of our lives the same as what we know except in a different environment. However, this oversimplification cannot be accurate to cover what the fast developing digital world keeps offering. Second, the most exciting thing about the Internet era was the freedom it promised. This oversimplifying analogy of adapting our old concepts to the digital world does not only violate the freedom of the digital era but makes us even less free than what we began with.
 
Changed:
<
<
In order to protect the 4th Amendment rights of the citizens, the Courts have adopted various restrictive measures limiting the computer hard drive searches. Such restrictions include (i) on-site seizure of computers, (ii) timing of the subsequent off-site search, (iii) method of the off-site search, and (iv) return of the seized computers when searches are complete. While the constitutionality and utility of such restrictions are still argued, it is important to note that these restrictions are nowhere near answering the privacy concern of individuals.
>
>
One of the analogies of the digital world utilized by courts and legal scholars suggest that computer hard drives are like filing cabinets that we put our files. But our computers contain the broadest data about us in the richest variety. Further, it also contains a lot of information about us, our past or present, which we do not even intentionally keep there.
 
Changed:
<
<
Border searches
>
>
When discussing computers as source of evidence, especially in the context of cybercrimes, the most commonly discussed examples are child pornography cases. Due to dreadfulness of the crime alleged, the exorbitance of violating the privacy of the suspect computer owner appears more tolerable. The necessity of such invasive measure becomes more questionable in cases of tax fraud, In the Matter of the Search of: 3817 W. West End, or illegal steroid use by professional athletes, United States v. Comprehensive Drug Testing.
 
Changed:
<
<

Section I

>
>
Examples from other places in the world can be much more dramatic and clearer to display the level of the privacy rape. A Turkish journalist, Ahmet Şık, has been detained since March 2011 along with other journalists, the main evidence against him being the copy of the unpublished book he wrote, which was found during a warrant in his home and allegedly in the computers of a news website, which was alleged to have connections with an alleged ultra-nationalist organization in Turkey with possible ties to members of the country's military and security forces, a military coup plot, or merely a conspiracy for some. As it can be seen, there could be a lot vague allegations, blurred line of crimes, and everything you produced in your life lies at the hands of some police officers.
 
Changed:
<
<

Subsection A

>
>
As the severeness of the offence changes or even the definition of the offense blurs, it is more difficult to justify the necessity of such invasive measure. Even if governments want to treat our computers as filing cabinets, do we use them as filing cabinets, or do we treat them as a private area where we imagine and expect to be more free and untouchable by others?
 
Deleted:
<
<

Subsub 1

 
Changed:
<
<

Subsection B

>
>

Some limitations on computer searches and seizures applied by U.S. Courts

 
Added:
>
>
In order to protect the 4th Amendment rights of the citizens, the U.S. Courts have adopted various restrictive measures limiting the computer hard drive searches.
 
Changed:
<
<

Subsub 1

>
>
Firstly, it is very important to separate the search warrant from the seizure warrant. As a seizure of hardware for further search gives immense amount of information, such broad authority for an excessive privacy violation must be explicitly granted.
 
Added:
>
>
The second set of limitations on the searches are time limitations. Some of the Courts have chosen to impose some requirements relating to the timeframe of electronic searches as in United States v. Brunette. However, the judges can extend the timeframe upon request from the government and accordingly timeframe could be still long even with these limitations. Further, the difference of what can be found by the police in 60 days or more, does not help much with the privacy concerns.
 
Changed:
<
<

Subsub 2

>
>
Another limitation on the searches concerns access to the information that was not within the scope of the warrant. Judges may require ex ante search protocols for a search that the government wants to conduct and further limit the use of further evidence that was found in plain view. As expressed in United States v. Comprehensive Drug Testing, these limitations are crucial as they try to block overreach attempts by the government and decrease the “government’s incentive to execute computer warrants on a broad way that would bring evidence to plain view”.
 
Added:
>
>
Further limitations concern the return of the seized hardware and destruction of the seized material after the consummation of the search period.
 
Added:
>
>
Whether these limitations are applied or not, a hardware search and seizure are still too invasive for most alleged crimes. Warranting such extraordinarily invasive privacy violation must further be narrowed to a category of few crimes with strong evidence supporting and requiring necessity of such measure.
 
Deleted:
<
<

Section II

 
Changed:
<
<

Subsection A

>
>

Conclusion

 
Changed:
<
<

Subsection B

>
>
The amount and sort of information that our computers contain are extraordinarily superior compared to our physical filing cabinets. We document our lives like we never did before through our online devices. Furthermore, our computers do it for us when we do not intend to document anything by noting every website we visited, every article, picture we looked at. Also, due to the devices we use such as unencrypted e-mails, the privacy of many other individuals are at stake with the privacy of our computers. As easy a solution can computer searches for government be, it is the most invasive attack to our privacy. The limitations set by judges or by the law can only be of any meaning where we can have no doubts over the intentions of the government or its security officials. In the absence of that, the best solution yet seems to be training ourselves on being smarter about how we use our computers.
 



BerrakComertSecondPaper 2 - 21 Dec 2011 - Main.BerrakComert
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Changed:
<
<

Paper Title

>
>

Hard Drives, File Cabinets?

 -- By BerrakComert - 20 Dec 2011
Added:
>
>
As the Internet, computers and new technologies root further into our daily lives, we face questions of how to address the issues relating to these new elements of our lives. The easiest way to categorize and solve these new problems is to resort to analogies and use our knowledge and experience that have already been there for centuries. In light of this seemingly simple approach, we can think of everything that is happening in this new segment of our lives the same as what we know except in a different environment. Accordingly, cybercrimes would simply be crimes committed in a different environment. Our online privacy would be our privacy in a different environment, a note we write online would be like a public speech we gave. However; this oversimplification cannot be inclusive enough to cover what the fast developing digital world keeps offering. Second, the most exciting thing about the internet era was the freedom it promised and did bring. This oversimplifying analogy of adapting our old concepts to the digital world does not only violate the freedom of the digital era but makes us much less free, even less free than what we began with. And finally, especially in criminal law, analogies can result to very restrictive means that threaten our freedoms and privacy even more aggressively than before.

One of the analogies of the digital world utilized by courts and legal scholars suggest that computer hard drives are just like filing cabinets that we put our files. But our computers contain the broadest data about us in the richest variety. Further, it also contains a lot of information about us, our past or present, which we do not even intentionally keep there.

When discussing computers as source of evidence, especially in the context of cybercrimes, the most commonly discussed examples are child pornography cases. Due to dreadfulness of the crime alleged, the exorbitance of violating the privacy of the suspect computer owner appears more tolerable. The necessity of such invasive measure becomes more questionable in cases of tax fraud, In the Matter of the Search of: 3817 W. West End, or illegal steroid use by professional athletes, United States v. Comprehensive Drug Testing.

Examples from other places in the world can be much more dramatic and clearer to display the level of the privacy rape. A Turkish journalist, Ahmet Şık, was detained on 3 March 2011 along with other journalists. He has been under arrest since 6 March 2011, the main evidence against him being the copy of the unpublished book he wrote, which was found during a warrant in his home and allegedly in the computers of a news website, which was also alleged to have connections with an alleged ultra-nationalist organization in Turkey with possible ties to members of the country's military and security forces, a military coup plot, or merely a conspiracy for some.

As the severeness of the offence changes or even the definition of the offense blurs, it is more difficult to justify the necessity of such invasive measure. Even if governments want to treat our computers as filing cabinets, do we use them as filing cabinets, or do we treat them as a private area where we imagine and expect to be more free and untouchable by others.

In order to protect the 4th Amendment rights of the citizens, the Courts have adopted various restrictive measures limiting the computer hard drive searches. Such restrictions include (i) on-site seizure of computers, (ii) timing of the subsequent off-site search, (iii) method of the off-site search, and (iv) return of the seized computers when searches are complete. While the constitutionality and utility of such restrictions are still argued, it is important to note that these restrictions are nowhere near answering the privacy concern of individuals.

Border searches

 

Section I


BerrakComertSecondPaper 1 - 20 Dec 2011 - Main.BerrakComert
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="SecondPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

-- By BerrakComert - 20 Dec 2011

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 3r3 - 21 Dec 2011 - 22:07:11 - BerrakComert
Revision 2r2 - 21 Dec 2011 - 06:30:58 - BerrakComert
Revision 1r1 - 20 Dec 2011 - 23:42:32 - BerrakComert
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM