Home » Posts tagged "Digital"

Are Digital Inspections Constitutional?

Whether a search of your computer is legal depends, in large part, on where the search takes place.  If you are singled-out at an international boarder, for example, you are going to be searched regardless of the presence of a “articulable suspicion”.

If you are in a place where you have a reasonable expectation of privacy, on the other hand, the Fourth Amendment to the U.S. Constitution requires probable cause prior to a justified police search of your digital data.

This issue is coming-up with increasing frequency as people travel with their digital lives at their side; and thanks to the increasing sophistication of law enforcement search methods.

Courts have determined that international borders are areas where government interests trump any reasonable expectation of privacy, if one even exists at all.  Customs agents at these boarders are trained to look for smugglers, terrrorists, and child pornographers.

The heightened search and seizure powers of Customs agents were tested in a recent case involving a local contract employee with the Walled Lake Consolidated Schools.  Two years ago, the contractor was intercepted at the US-Canadian border in Buffalo, NY.  Customs agents conducted a digital inspection of his laptop and discovered images of child pornography; some of them made and distributed by the individual.

The former Davisburg resident and Walled Lake schools employee was sentenced last January by a federal judge to 60-years in federal prison.

While no one wants their digital life disturbed when traveling through borders, particularly lawyers with briefcases of confidential goldmines, neither does anyone feel sorry for child pornographers or terrorists.

In another recent case, this one involving a suspected “terrorist”, the former Muslim chaplain at Guantanamo Bay was routinely subjected to digital inspections whenever he re-entered the US.  Once, upon being searched and released, the Muslim chaplin discovered that the Customs agent left a forensic scan disc in his computer.  Although the chaplain was not a terrorist, he fit the profile, so the digital inspections were conducted.

A thorough digital scan of a lap top computer can take more than 3-hours, and that’s without securing a warrant.  Forensic hard-drive copies take even longer to produce.

Digitized information does not always carry signs of illegality like child porn images.  Evidence of terrorism, for example, is often well-hidden and encrypted in the machine’s hard-drive.

The National Association of Criminal Defense Lawyers has taken the position that laptop computer searches conducted at international borders are “non-routine” and thus should require some modicum of articulable suspicion.

Such articulable suspicion is required by highly invasive search modes such as the search of a person’s ailmentary canal.  A laptop search is probably even more intrusive as it encompasses your entire being, both personal and professional.

I am one of those attorneys that loves to write.  I write briefs, blog posts and articles on a variety of legal subjects.  To contact me or to engage in legal discourse or, if necessary, to schedule a free consultation, visit my web site.  www.clarkstonlegal.com

Since 1989, I have been an attorney licensed by the State Bar of Michigan. In my decades of general practice, I have served more than 1000 clients.

Among the first-50 attorneys in Michigan to complete the Family Law Certificate program offered by the Institute for Continuing Legal Education in Ann Arbor, MI, I have completed more than 250 divorces from start to finish.

In addition to family law, I have a robust criminal law practice, representing clients in jury trials and appeals across Michigan. Approved for felony assignments by the Oakland County Circuit Court, and for criminal appeals through the Michigan Appellate Assigned Counsel System, I know my way around the criminal justice system.

The Michigan Attorney General has appointed me to serve as a Special Assistant Attorney General (felony child support) and to serve Oakland County as a Public Administrator. These appointments have provided extensive family law, probate and elder law experience as a professional fiduciary in more than 75 cases.

My appellate docket has placed me before the Michigan Supreme Court, Mich Court of Appeals, and the U S Court of Appeals for the 6th Circuit. Serving 2-years as a pre-hearing attorney for the Mich Court of Appeals was my 1st job out of law school, followed by another 5-years in the appellate section of Plunkett & Cooney, one of Michigan’s largest private law firms.

For 8-years in the middle of my career, I was an Asst Professor and Director of Legal Studies at the Univ of Detroit Mercy. The UDM Law Review published my article on civil rights claims in the law enforcement seizure context. As a professor of legal studies, I trained paralegals in all aspects of assisting attorneys in private practice, publishing a comprehensive article on this subject in the Mich Bar Journal.

Juris Doctor from the University of Detroit (1988) Bachelor of Arts with honors from the University of Michigan in Ann Arbor, MI, (1984).

Article from articlesbase.com

Cybersecurtiy Securing Our Digital Future

The United States is one of the global leaders infiltrating technology into our daily lives and this technology adoption has transformed the global economy and connected people in ways never imagined. Children use the Internet daily to do homework, blog with their friends and teacher, and email their mom; it is second nature to them. My mom and dad can read the newspapers about their daughter on-line and can reach me anywhere in the world from their cell phone to mine. And people all over the world can post and watch videos and read our blogs within minutes of completion. I can’t imagine my world without this connectivity and I would bet that you cannot either.

Now consider that the same networks that provide this connectively also increasingly help control our critical infrastructure. These networks deliver power and water to our households and businesses, they enable us to access our bank accounts from almost any city in the world, and they are transforming the way our doctors provide healthcare. For all of these reasons, we need a safe Internet with a strong network infrastructure and we as a nation need to take prompt action to protect cyberspace for what we use it for today and will need in the future.

 

We are late in addressing this critical national need and our response must be focused, aggressive, and well-resourced. We now have a strong and common view of what is needed to achieve change. Ensuring that cyberspace is sufficiently resilient and trustworthy to support U.S. goals of economic growth, civil liberties and privacy protections, national security, and the continued advancement of democratic institutions requires making cyber security a national priority.

Protecting cyberspace requires strong vision and leadership and will require changes in policy, technology, education, and perhaps law. Conclusion outlines the beginning of a way forward in building a reliable, resilient, trustworthy digital infrastructure for the future.

There are opportunities for everyone—individuals, academia, industry, and governments—to contribute toward this vision. To accomplish our goals. It must begin with a national dialogue on cyber security and we should start with our family, friends, and colleagues.

 

 

Rosemarie Grabowski, A fellow PC user has always run her businesses from her home. So her computer is an important business tool that she relies on daily. Just a few of the reasons she is involved in the field of PC Security. Not just personal but two fold. She wants her computer to run as it should. For a free report that will show you exactly how to have your computer up and running hassle free and like new in a very short amount of time contact her at 308-687-6085 or www.topsecretfreereport.com/makeadifference-x or CHECK OUT MY BLOG FOR SOMEMORE TIMELY INFORMATION: http//mypcsafefreefromspyware.blogspot.com/

Article from articlesbase.com

More National Security Articles

Digital Slide Copier Instructions And Information Document

Information and instructions for digital camera slide copier devices. Slide copiers allow you to transfer your old photographic slides and film into digital format. This document has been refined for over 8 years by a company that sells these copiers.
Digital Slide Copier Instructions And Information Document