Law in the Internet Society

View   r2  >  r1  ...
BerrakComertSecondPaper 2 - 21 Dec 2011 - Main.BerrakComert
Line: 1 to 1
 
META TOPICPARENT name="SecondPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Changed:
<
<

Paper Title

>
>

Hard Drives, File Cabinets?

 -- By BerrakComert - 20 Dec 2011
Added:
>
>
As the Internet, computers and new technologies root further into our daily lives, we face questions of how to address the issues relating to these new elements of our lives. The easiest way to categorize and solve these new problems is to resort to analogies and use our knowledge and experience that have already been there for centuries. In light of this seemingly simple approach, we can think of everything that is happening in this new segment of our lives the same as what we know except in a different environment. Accordingly, cybercrimes would simply be crimes committed in a different environment. Our online privacy would be our privacy in a different environment, a note we write online would be like a public speech we gave. However; this oversimplification cannot be inclusive enough to cover what the fast developing digital world keeps offering. Second, the most exciting thing about the internet era was the freedom it promised and did bring. This oversimplifying analogy of adapting our old concepts to the digital world does not only violate the freedom of the digital era but makes us much less free, even less free than what we began with. And finally, especially in criminal law, analogies can result to very restrictive means that threaten our freedoms and privacy even more aggressively than before.

One of the analogies of the digital world utilized by courts and legal scholars suggest that computer hard drives are just like filing cabinets that we put our files. But our computers contain the broadest data about us in the richest variety. Further, it also contains a lot of information about us, our past or present, which we do not even intentionally keep there.

When discussing computers as source of evidence, especially in the context of cybercrimes, the most commonly discussed examples are child pornography cases. Due to dreadfulness of the crime alleged, the exorbitance of violating the privacy of the suspect computer owner appears more tolerable. The necessity of such invasive measure becomes more questionable in cases of tax fraud, In the Matter of the Search of: 3817 W. West End, or illegal steroid use by professional athletes, United States v. Comprehensive Drug Testing.

Examples from other places in the world can be much more dramatic and clearer to display the level of the privacy rape. A Turkish journalist, Ahmet Şık, was detained on 3 March 2011 along with other journalists. He has been under arrest since 6 March 2011, the main evidence against him being the copy of the unpublished book he wrote, which was found during a warrant in his home and allegedly in the computers of a news website, which was also alleged to have connections with an alleged ultra-nationalist organization in Turkey with possible ties to members of the country's military and security forces, a military coup plot, or merely a conspiracy for some.

As the severeness of the offence changes or even the definition of the offense blurs, it is more difficult to justify the necessity of such invasive measure. Even if governments want to treat our computers as filing cabinets, do we use them as filing cabinets, or do we treat them as a private area where we imagine and expect to be more free and untouchable by others.

In order to protect the 4th Amendment rights of the citizens, the Courts have adopted various restrictive measures limiting the computer hard drive searches. Such restrictions include (i) on-site seizure of computers, (ii) timing of the subsequent off-site search, (iii) method of the off-site search, and (iv) return of the seized computers when searches are complete. While the constitutionality and utility of such restrictions are still argued, it is important to note that these restrictions are nowhere near answering the privacy concern of individuals.

Border searches

 

Section I


BerrakComertSecondPaper 1 - 20 Dec 2011 - Main.BerrakComert
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="SecondPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

-- By BerrakComert - 20 Dec 2011

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 2r2 - 21 Dec 2011 - 06:30:58 - BerrakComert
Revision 1r1 - 20 Dec 2011 - 23:42:32 - BerrakComert
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM