⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 suprem~1.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 4 页
字号:
          of a substitution in favor  of a right to privacy,  Black recalls          his dissenting opinion in Griswold  v. Connecticut. There he held          that  the Constitution does not provide a "right to privacy" that          protects  individuals  from laws  which  compromise  privacy. The          conclusion of his dissenting opinion in Katz states:               No general  right is created by  the [Fourth] Amendment               so  as to give this  Court the unlimited  power to hold               unconstitutional  everything   which  affects  privacy.               Certainly  the  Framers,   well  acquainted  with   the               excesses of governmental power, did not intend to grant               this Court such omnipotent lawmaking authority as that.               The history of governments  proves that it is dangerous               to freedom to repose such powers in the courts.43          Given Black's originalist position,  it is understandable that he          could not be reconciled  with the Court's decision to  extend the          protection of the Fourth Amendment to recording and wiretapping.               Although  Black recognizes  the legitimate need  to regulate          wiretapping,  he believed  that  the obstacles  presented by  the          Berger  Court should have been  dealt with in  another manner. In          particular, he is  concerned with the Court's  adoption of rights          discourse. Rather than upholding a right  to privacy by expanding          the  meaning of  "seizure"  to include  conversation,  presumably          Black felt that  the Court  should have deferred  to Congress  in          order that the law be updated by amendment to the Constitution.               During the years following the decision in Katz, the Supreme          Court  continued to uphold  civil rights,  such as  an individual          right to privacy,  in the face  of technological developments  in          other  domains. In fact, it  can be shown  that the Supreme Court          has gradually  moved from policies  which tolerate  technological          advances at the  expense of individual  rights to policies  which          put  decisions in  the  hands of  individuals. In  the nineteenth          century, the Court upheld statutes which called for the universal          vaccination of citizens. It  also protected laws which authorized          the  government to  sterilize criminals.  In the  early twentieth          century, however, the Court  opposed sterilization on the grounds          that basic human  rights outweigh any  potential harm to  society          that  may come from the children of criminals. In recent decades,          computerized data  banks  have  enabled  governments  to  compile          extensive records on citizens without their knowledge or consent.          While  upholding  the  need of  the  state  to  compile data  for          specific  purposes,  the  Court  has  insisted   that  reasonable          measures be taken to  maintain confidentiality. Just over fifteen          years  ago,  the Court  decide that  a  woman's right  to privacy          outweighs  the state's  interests  in  cases regarding  abortion.          Finally,   with  the   recent  advancements   in  life-sustaining          technologies,  the Court  has  upheld the  individual's right  to                              
          ____________________               42Id. at 373.
                 ___               43Id. at 374.
                 ___                                          10          withhold treatment despite a conflict with the traditions of  the          medical  profession.  In  general,  the  Court  has  displayed  a          cautious attitude toward new  technologies in favor of individual          rights. In  particular, the Court has  perceived the government's          widespread use of computer technologies as a threat to individual          privacy. Underlying these decisions, however, is a constitutional          philosophy  which  favors  individual   rights  in  the  face  of          technological change.44          Congress and the Regulation of Government Surveillance               Congress responded to  the decision of the  Supreme Court in          Katz with Title III of the Omnibus Crime Control and Safe Streets          Act of 1968.45 This  legislation was enacted to regulate  the use          of  electronic  surveillance  by  law  enforcement  agencies.  By          effectively   revising  the   Fourth  Amendment   to  incorporate          wiretapping, the Court in Katz opened the way for the legislature          to enact regulations without recourse  to the lengthy process  of          constitutional amendment. Title III of Omnibus was only a part of          an act of Congress which found  that "the high incidence of crime          in  the  United States  threatens  peace,  security, and  general          welfare of the  Nation and its  citizens."46 While attempting  to          find new ways to  "prevent crime," Congress tried to  balance the          privacy  interests of the individual with the legitimate means of          law enforcement by the state.               Title III  was the first comprehensive  piece of legislation          to   address  the   issue   of   communications   privacy.47   In          particular, it protected only two types of communications against          electronic  eavesdropping: (1)  telephone  conversations and  (2)          face-to-face   communication.48   The    law   established    the          requirement of a  warrant for  the interception of  wire or  oral          communications  under circumstances  where there is  a reasonable          expectation of  privacy.49 It  also laid out  specific procedures          for  obtaining a  warrant, including  restrictions  to electronic          surveillance which  limit its  use to  certain types  of criminal                              
          ____________________               44See D.  Jones Merritt,  The Constitution  in  a Brave  New             ___                     __________________________________          World: A Century of  Technological Change and Constitutional Law,      ________________________________________________________________          Oregon Law Review, Vol. 69, Num. 1 (1990).               45 (Title III) 18 U.S.C.    2510-2520 (1968).               4618 U.S.C. Title I               47See   R.  W.   Kastenmeier,  D.   Leavy,  and   D.  Beier,             ___          Communications Privacy: A  Legislative Perspective, Wisconsin Law      __________________________________________________          Review 1989:715.               4818 U.S.C.  2516.               49Id.  2510.
                 ___                                          11          investigations.  In  this   way,  Congress  enacted   legislation          designed  to  meet  the technical  demands  of  the  Berger Court          regarding probable cause and to address the political concerns of          the Katz Court regarding the protection of individual privacy.               In a  short period of  time, technological change  proved to          make Title III  inadequate. By restricting itself specifically to          telephone wiretapping,  its regulations could not  be extended to          new  communication  technologies  like  cellular  telephones  and          electronic mail. As a result,  these communications did not  fall          under   the   Fourth  Amendment's   protection   against  illicit          government  surveillance. Hence, Title III was criticized for its          failure to anticipate technological advancement.               In order to address  the inadequacies of Title III, Congress          instituted the  Electronic  Communications Privacy  Act  of  1986          (ECPA).50 Its  primary  concern was  to  safeguard the  right  of          individual privacy from erosion due to technological advancement.          Hence,   it  extended   Fourth   Amendment   protection  to   new          communication  technologies  such  as  cellular  telephones, data          transmissions,  and  electronic   mail.  Unlike  the  design   of          Title III,   Congress  tried   to  anticipate   potential  abuses          associated with  developments  such as  multi-media  technologies          which would fall under  more than one classification  of service.          The  ECPA also expanded the  scope of sites  protected to include          not only  public carriers  such as telephone  companies but  also          private  services  such  as  corporate computers.  Prior  to  the          enactment  of the ECPA, no federal statute addressed the issue of          data  interception.  With  the  ECPA, electronic  mail  and  data          transmissions   are  protected  in   manner  that  parallels  the          protection   of   voice   communications.51   Hence,   government          interception of  these types  of communication is  only permitted          under  the restrictions  of  a warrant.  However, the  procedures          differ  from  those  applicable  to  telephone  wiretapping.  For          example,  court  authorization  for  data   interception,  unlike          wiretapping,  can   be  based  upon  suspicion   of  any  federal          felony.52               In  addition  to  technological   change,  Congress  had  to          consider political factors in drafting the ECPA. Protecting civil          rights  is  not  without  its  difficulties.  During  the  Reagan          Administration,  bills supported  by the Justice  Department were          favored  while   ones  opposed   by  it  were   likely  defeated.          Consequently, the  ECPA needed the  support of the  Department of          Justice in order to be signed by the President. However, the ECPA          bill   was  given   very   strong   support  from   corporations.          (Communications providers  wanted to ensure  their customers that                              
          ____________________               5018 U.S.C.  2510-2520 (The ECPA is actually an amendment to          Omnibus which leaves much of Title III intact).               51Id.  2510(12).
                 ___               52Id.  2518(3).
                 ___                                          12          the  new technologies  would  be  protected.)  As a  result,  the          success  of the ECPA depended upon the support of civil liberties          groups,  business interests,  and law  enforcement officials.  By          enacting  the ECPA,  Congress not  only preserved  existing civil          liberties  but  also  expanded  protection of  communications  to          include government and private sector interception of data.53          The Executive and the Powers of Law Enforcement               The Constitution  of the  United States vests  the President          with  the powers of the Executive, including the power to enforce          the  laws.54  At the  time  the  Constitution was  ratified,  the          Fourth Amendment was included  in order to protect  citizens from          the unreasonable search and seizure of their goods  by government          agents. With  the development of communication  technologies, the          Executive  has  expanded  its  capabilities  to  engaged  in  the          surveillance of  citizens. In  recent decades, the  Supreme Court          has heard many cases which bear witness to the great interest law          enforcement agencies have  in electronic surveillance.  Moreover,          the  civil rights  movement bears  witness to the  great interest          citizens  have in  preventing their  government from  becoming an          Orwellian  state.  After   decades  of  unrestricted   electronic          surveillance,  the Court's  decision in  Katz finally  opened the          door  for the first legislation to regulate wiretapping under the          Fourth  Amendment.  With  Title III  of  Omnibus  and  the  ECPA,          Congress  placed limits upon the  powers of the  Executive in the          name of an individual right  to privacy. Legal restrictions  were          deemed  necessary  in  order  to  protect  individuals  from  the          ceaseless surveillance of Big Brother.               Given  that  the  ECPA  was designed  to  anticipate  future          technological developments, it would  seem that a lasting balance          between individual privacy  and government surveillance  has been          struck.  Yet  the ECPA  did  not  anticipate  the development  of          private  sector cryptology  along with  the growth  of electronic          mail   services.   These   technological    developments   enable          individuals to ensure the  privacy of their communication without          recourse  to civil  rights legislation. A  warrant may  grant the          power to access personal data, but it is  powerless to crack data          encryption.  After  years of  negotiating  restrictions upon  the          legal  powers  of  the   Executive  in  the  wake   of  expanding          communications  technologies, law  enforcement agencies  now find          themselves seeking restrictions upon the technological  powers of          individuals in the wake of expanding civil rights.               Government interest in restricting cryptology dates back  to                              
          ____________________               53See Communications Privacy, pp. 733-737.
                 ___               54Article II   2 declares "The President  shall be Commander          in Chief of the Army  and Navy of the United States ...  ." while           3 states  "... he shall  take Care that  the Laws be  faithfully          executed, ... ."                                          13          legislation banning the export of cryptologic devices and related          research.55 At  that time,  the government  saw  cryptology as  a          means  to  protect  classified  information.  These  laws  placed          cryptology  on  a list  of  munitions, giving  the  President the          authority  to  regulate  its  development  and  deployment.56  In          recent decades, the National Security Agency (NSA) has been given          executive  responsibility to  regulate cryptologic  standards for          classified and national security information. It develops its own          cryptosystems  and appraises publicly  available cryptosystems in          order  to  offers  private  sector corporations  a  guarantee  of          security. In  1977, the NSA endorsed the Data Encryption Standard          (DES)  issued  by the  National  Bureau  of Standards  (NBS)  for          nonclassified  government  and   private  sector   cryptosystems.          However,  recent  technological   developments,  especially   the          widespread  growth of  powerful  private  sector computers,  have          forced the  NSA  not to  renew  its guarantee.  In light  of  the          inadequacy   of  DES,  the  NSA  made  plans  to  issue  its  own          cryptosystem  for both government and private sector information.          It argued that cryptologic research, development, and use by  the          private sector threatens government security. In other words, the          NSA is  seeking to  control all  cryptology, even  private sector          cryptosystems,  due to  the  reliance of  national security  upon          economic strength. To this end, the Reagan Administration drafted          the   National  Security   Decision  Directive   145.57  It   was          withdrawn, however,  after  being  severely  criticized  for  the          imbalance  of authority  it gave  to the  President over  private          sector information.58               In 1987,  Congress enacted  the Computer Security  Act which

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -