Warrantless GPS Surveillance: Search and Seizure - Using the Right to Exclude to Address the Constitutionality of GPS Tracking Systems Under the Fourth Amendment

2011 ◽  
Author(s):  
Jace C. Gatewood
1937 ◽  
Vol 6 (2) ◽  
pp. 175-181
Author(s):  
E. C. S. Wade

Apart from the passage through Parliament at the end of last year of the Public Order Act, the Courts have in the past few years interpreted police powers on several occasions in the direction of restricting liberty. No excuse is therefore required for examining once again in this Journal a topic, one aspect of which was discussed in the last number. The case of Elias v. Pasmore [1934] 2 K. B. 164 raised important questions as to the right of the police to search premises in the course of making an arrest on a warrant. That case recognized for the first time the validity on such an occasion of a search, which resulted in the discovery of documents (not being documents in the possession of the person named in the warrant) containing evidence of an offence committed by any person, even though the search and seizure were illegal as regards other documents discovered on that occasion. This protection for police action only extends to the actual documents which are evidence of the commission of a crime; but it matters not that the crime is one alleged to have been committed by some one other than the person in the course of arresting whom the search is being made.


2018 ◽  
Author(s):  
Jeffrey Vagle

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications — including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic communications is enough to give the NSA the right to store that data until it is able to decrypt or decode it.Through this provision, the NSA is automatically treating all electronic communications from U.S. citizens that are hidden or obscured through encryption — for whatever reason — as suspicious, a direct descendant of the “nothing-to-hide” family of privacy minimization arguments. The ubiquity of electronic communication in the United States and elsewhere has led to the widespread use of encryption, the vast majority of it for innocuous purposes. This Article argues that the mere encryption by individuals of their electronic communications is not alone a basis for individualized suspicion. Moreover, this Article asserts that the NSA’s policy amounts to a suspicionless search and seizure. This program is therefore in direct conflict with the fundamental principles underlying the Fourth Amendment, specifically the protection of individuals from unwarranted government power and the establishment of the reciprocal trust between citizen and government that is necessary for a healthy democracy.


Obiter ◽  
2016 ◽  
Vol 37 (3) ◽  
Author(s):  
Melody Musoni

The focus of this note is to analyze whether the Cybercrimes and Cybersecurity Bill provides a harmonization between search and seizure and the constitutional right to privacy. This will be achieved by discussing the State powers of search and seizure in cyberspace vis-à-vis the right to privacy as envisaged in the Protection of Personal Information Act. Further, this note investigates whether the Cybercrimes and Cybersecurity Bill achieves the purpose of combatting cybercrimes without the infringement of the right to privacy. Subsequently, the article provides plausible recommendations on how the State should lawfully conduct searches and seizures of articles related to cybercrimes.


Author(s):  
Mark Tee Kit Tsun ◽  
Lau Bee Theng ◽  
Hudyjaya Siswoyo ◽  
Sian Lun Lau

The development of human tracking systems has had a significant influence over the evolution of Assistive Technologies for aiding children with cognitive disabilities. Techniques that range from radio frequency, Inertial Measurement Units, and Electroencephalography to the Global Positioning System and depth-based vision systems have provided tools for researchers to incorporate indoor and outdoor localization, motion and activity tracking as well as well-being monitoring into their projects. This chapter aims to introduce the latest human tracking options to consider for implementation of future Assistive Technology projects. Some example research work is discussed with emphasis on how human tracking systems can help in gathering the right data. The chapter concludes with a discussion of a proposed hybrid vision-based system for assisting in full-time supervision of children with cognitive disabilities, utilizing the chapter's central theme of sensor fusion application.


Sign in / Sign up

Export Citation Format

Share Document