What would you argue to defend yourself

Assignment Help Computer Engineering
Reference no: EM133453398

Case Study: In 2010, Steven Warshak sued the U.S. government for violating his 4th Amendment rights. In 2006, Warshak had been charged with 112 counts of conspiracy to wire, mail, and bank fraud, making false statements to banks, conspiracy to commit money laundering, and a variety of other crimes. These crimes were related to the business practices of his company Berkley's, which was known for its product "Enzyte," a male enhancement supplement. The prosecution used thousands of emails to prove its case. The e-mails had been obtained from Warshak's Internet service provider. Warshak was convicted of the majority of charges, including fraud and money laundering, and sentenced to 25 years in prison. In addition, a forfeiture hearing was held, and the jury found that most of Warshak's assets had been obtained through his criminal activities. The judge ordered that Warshak pay a fine of $93,000, surrender $495 million in proceeds/money/judgement, and $45 million in money-laundering proceeds.

Warshak appealed his prison sentence and the forfeiture of his assets, and in 2010 his arguments were heard by the 6th Circuit Court of Appeals. Warshak argued that using e-mails obtained from his Internet service provider violated his 4th Amendment rights against unreasonable search and seizure. In Katz v. United States, the Supreme Court established a two-pronged test of the right to privacy: (1) a person has "exhibited an actual [subjective] expectation of privacy" and (2) "that the expectation be one that society is prepared to recognize as reasonable." The Katz decision had not been applied to digital communication, however, leaving much private information open to seizure by law enforcement. The 6th Circuit for the first time extended the right to privacy to e-mails stored with third parties. Despite the Court's decision that the government had violated Warshak's Fourth Amendment rights, it did not overturn his conviction based on the grounds that the law enforcement officers had acted in "good faith" because they believed that the e-mails were not protected by the Fourth Amendment.

Following the Warshak decision, Congressman Kevin Yoder introduced the Email Privacy Act that would amend the Electronic Communications Privacy Act of 1986 to - prohibit a provider of remote computing server or electronic communication service to the public from knowingly divulging to a governmental entity the contents of any communication that is in electronic storage or otherwise maintained by the provider, subject to exceptions.

Question: Imagine if the government collected all your e-mails, posts on Twitter, Facebook, and any other social media websites, and charged you with the crime of violating copyright law by sharing music files or downloading pirated software. What would you argue to defend yourself? Be sure to include your discussion of the pros and cons of expanding the Fourth Amendment to digital communications.

Reference no: EM133453398

Questions Cloud

Discuss and explain stock and flow models : Briefly discuss and explain Stock and Flow Models of the following; Why are they important, does it apply or not to engineering field?
What amoeba can be found in warm water : What amoeba can be found in warm water? how does it have to enter the person to do harm?
What asymmetric operations does the security of ecc reply on : What asymmetric operations does the security of ECC reply on? (We all know the security of RSA depends on the following asymmetric operation
What is meant by competitive inhibition : What is meant by competitive inhibition? Noncompetitive inhibition? What happens with each? What is meant by reversibility and irreversibility?
What would you argue to defend yourself : What would you argue to defend yourself? Be sure to include your discussion of the pros and cons of expanding the Fourth Amendment to digital communications.
Why are organizations moving toward implementation of data : Why are organizations moving toward implementation of data warehouses? What are the benefits of data warehouses? What issues need to be considered by
What is the recommended period for booster shots : What is the immunization the patient should have received? What is the recommended period for booster shots.
Define the term public key and explain its role in public : Define the term "public key" and explain its role in public key cryptography. Explain the concept of a "digital signature" and how it is used in cryptography
Evaluate relevance of the triple bottom line to h&m group : Critically evaluate the relevance of the triple bottom line to H&M group and its use in meeting the demands of the H&M key stakeholder groups.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd