What would you argue to defend yourself

Assignment Help Computer Engineering
Reference no: EM133453398

Case Study: In 2010, Steven Warshak sued the U.S. government for violating his 4th Amendment rights. In 2006, Warshak had been charged with 112 counts of conspiracy to wire, mail, and bank fraud, making false statements to banks, conspiracy to commit money laundering, and a variety of other crimes. These crimes were related to the business practices of his company Berkley's, which was known for its product "Enzyte," a male enhancement supplement. The prosecution used thousands of emails to prove its case. The e-mails had been obtained from Warshak's Internet service provider. Warshak was convicted of the majority of charges, including fraud and money laundering, and sentenced to 25 years in prison. In addition, a forfeiture hearing was held, and the jury found that most of Warshak's assets had been obtained through his criminal activities. The judge ordered that Warshak pay a fine of $93,000, surrender $495 million in proceeds/money/judgement, and $45 million in money-laundering proceeds.

Warshak appealed his prison sentence and the forfeiture of his assets, and in 2010 his arguments were heard by the 6th Circuit Court of Appeals. Warshak argued that using e-mails obtained from his Internet service provider violated his 4th Amendment rights against unreasonable search and seizure. In Katz v. United States, the Supreme Court established a two-pronged test of the right to privacy: (1) a person has "exhibited an actual [subjective] expectation of privacy" and (2) "that the expectation be one that society is prepared to recognize as reasonable." The Katz decision had not been applied to digital communication, however, leaving much private information open to seizure by law enforcement. The 6th Circuit for the first time extended the right to privacy to e-mails stored with third parties. Despite the Court's decision that the government had violated Warshak's Fourth Amendment rights, it did not overturn his conviction based on the grounds that the law enforcement officers had acted in "good faith" because they believed that the e-mails were not protected by the Fourth Amendment.

Following the Warshak decision, Congressman Kevin Yoder introduced the Email Privacy Act that would amend the Electronic Communications Privacy Act of 1986 to - prohibit a provider of remote computing server or electronic communication service to the public from knowingly divulging to a governmental entity the contents of any communication that is in electronic storage or otherwise maintained by the provider, subject to exceptions.

Question: Imagine if the government collected all your e-mails, posts on Twitter, Facebook, and any other social media websites, and charged you with the crime of violating copyright law by sharing music files or downloading pirated software. What would you argue to defend yourself? Be sure to include your discussion of the pros and cons of expanding the Fourth Amendment to digital communications.

Reference no: EM133453398

Questions Cloud

Discuss and explain stock and flow models : Briefly discuss and explain Stock and Flow Models of the following; Why are they important, does it apply or not to engineering field?
What amoeba can be found in warm water : What amoeba can be found in warm water? how does it have to enter the person to do harm?
What asymmetric operations does the security of ecc reply on : What asymmetric operations does the security of ECC reply on? (We all know the security of RSA depends on the following asymmetric operation
What is meant by competitive inhibition : What is meant by competitive inhibition? Noncompetitive inhibition? What happens with each? What is meant by reversibility and irreversibility?
What would you argue to defend yourself : What would you argue to defend yourself? Be sure to include your discussion of the pros and cons of expanding the Fourth Amendment to digital communications.
Why are organizations moving toward implementation of data : Why are organizations moving toward implementation of data warehouses? What are the benefits of data warehouses? What issues need to be considered by
What is the recommended period for booster shots : What is the immunization the patient should have received? What is the recommended period for booster shots.
Define the term public key and explain its role in public : Define the term "public key" and explain its role in public key cryptography. Explain the concept of a "digital signature" and how it is used in cryptography
Evaluate relevance of the triple bottom line to h&m group : Critically evaluate the relevance of the triple bottom line to H&M group and its use in meeting the demands of the H&M key stakeholder groups.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How the core value of responsible stewardship applies

how the core value of responsible stewardship applies to the development and enforcement of process synchronization in our computer systems.

  Explain the datasets used

Explain the datasets used. The report should clearly state the problem/challenge. Mention the importance of the problem and include some background

  Bourne shell and design suitable functions

Bourne shell and design suitable functions

  Examine the threat modeling approach

Examine the threat modeling approach as required for a correct execution of a penetration test. The PTES standard focuses on two key elements of traditional

  Describe and compare web service and mobile applications

SUP523: Systems and Applications Support - New Zealand - Diploma in Information Technology Technical Support - Describe and compare standalone

  Explain why are the hierarchical levels of an ea framework

you work at a large federal agency. a colleague proposes that the agency ea is no longer required because the agency

  What changes to the process would you recommend

What changes to the process would you recommend? What are the key design principles that govern the effectiveness of this process?

  Write a script to simulate the rolling of two dice

Write a script to simulate the rolling of two dice. The script should use Math.random to roll the first die and again to roll the second die.

  Calculate the triangular number for n

The function will have a single parameter of type string. It will print the reversed characters to the screen followed by a newline character.

  Count the amount of alphanumeric characters in the file

You are to write a program name wordcount.java that prompt the user for a user input file name.

  Define how security measures will safeguard the organization

Discuss an organization's need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs?

  Show effect of error propagation when ecb uses cts technique

Show the effect of error propagation when ECB uses the CTS technique. Show the effect of error propagation when CBC uses the CTS technique.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd