{"id":10,"date":"2012-11-30T16:27:42","date_gmt":"2012-11-30T16:27:42","guid":{"rendered":"http:\/\/blogs.scu.edu\/tech\/?page_id=10"},"modified":"2012-12-10T20:25:40","modified_gmt":"2012-12-10T20:25:40","slug":"private-surveillance","status":"publish","type":"page","link":"https:\/\/blogs.scu.edu\/tech\/private-surveillance\/","title":{"rendered":"Private Surveillance"},"content":{"rendered":"<p>As innovation has stimulated advancement in technology, outdated laws must be updated and renewed to accommodate these advances. As surveillance has expanded to include video cameras, bugs, and wiretaps, existing litigation does little to protect those whose rights had been violated.<\/p>\n<div id=\"attachment_94\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.cisincusa.net\/investigation.html\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-94\" class=\"size-medium wp-image-94\" src=\"http:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/sq_surveillance-300x277.jpeg\" alt=\"\" width=\"300\" height=\"277\" srcset=\"https:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/sq_surveillance-300x277.jpeg 300w, https:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/sq_surveillance.jpeg 350w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-94\" class=\"wp-caption-text\">Domestic Surveillance. Source: <a href=\"http:\/\/www.cisincusa.net\/investigation.html\" target=\"_blank\">Capital International Security<\/a><\/p><\/div>\n<p>While the majority of Americans agree that <a title=\"Public Surveillance\" href=\"http:\/\/blogs.scu.edu\/tech\/public-surveillance\/\">public surveillance<\/a> is a necessary evil to stop crime and other illegal behaviors, private surveillance is a controversial issue.\u00a0 And behind this controversy, there is a slew of litigation that backs up the legality or certain types of surveillance in certain situations. Surveillance in public is deemed as okay, as there is little expectation of privacy in a public setting. In one\u2019s own home, however, there is an expectation of privacy. <a href=\"http:\/\/pursuitmag.com\/surveillance-by-private-investigators-and-the-law\/\" target=\"_blank\">Trespassing laws<\/a> exist in order to secure an American\u2019s privacy in the home and dictate that strangers are not allowed on private property. Although when we think of trespassing laws, we most likely immediate think of <em>physical <\/em>trespassing, this also dictates laws against <a href=\"http:\/\/www.safetybasement.com\/Security-camera-resources-and-information-s\/385.htm\" target=\"_blank\">videotaping<\/a>. If a camera is placed off of the surveyed property in a legal place, any footage is legal, with or without the consent of the filmed. Local laws can also be applied and may change the definition of trespassing accordingly. The bigger issue here is actual surveillance within one\u2019s home, without consent. In addition, audio surveillance requires the consent of one party in the conversation in question. If it is not granted, it is essentially illegal.<\/p>\n<div id=\"attachment_95\" style=\"width: 307px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.threetwoone.org\/uggabugga\/2005\/\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-95\" class=\"size-full wp-image-95\" src=\"http:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/fisa-cartoon-01.gif\" alt=\"\" width=\"297\" height=\"289\" \/><\/a><p id=\"caption-attachment-95\" class=\"wp-caption-text\">FISA cartoon<\/p><\/div>\n<p>In response to the Terrorist Attacks of September 11<sup>th<\/sup>, 2001, the <a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-107publ56\/pdf\/PLAW-107publ56.pdf\" target=\"_blank\">Patriot Act<\/a> was passed, expanding the authority for gaining information in the United States. Other aspects of the law crucial to domestic surveillance are increasing the discretion of government officers in detaining individuals suspected of engaging in terrorism, and reducing restrictions to gain information. In accordance with <a href=\"http:\/\/en.wikipedia.org\/wiki\/Arizona_SB_1070\" target=\"_blank\">Arizona Senate Bill 1070<\/a>, \u201creasonable suspicion\u201d is the only necessity for taking action. \u00a0The <a href=\"http:\/\/www.law.cornell.edu\/wex\/electronic_surveillance\" target=\"_blank\">Electronic Communications Privacy Act<\/a> grants warrants to officers to enter private property and bug electric communication devices. Also, the <a href=\"http:\/\/www.law.cornell.edu\/wex\/electronic_surveillance\" target=\"_blank\">Communications Assistance for Law Enforcement Act<\/a> requires the cooperation of telecom companies to provide access to the technology necessary to target a specific person and create a wiretap. <a href=\"http:\/\/www.law.cornell.edu\/wex\/electronic_surveillance\" target=\"_blank\">FISA<\/a>, the Foreign Intelligence Surveillance Act, allowed warrants to be granted to those looking to gather foreign intelligence, including U.S. citizens suspected in aiding foreign terrorists. These Acts require permission from a higher power, which grants the use of bugs and wiretaps when there is reasonable suspicion.<\/p>\n<div id=\"attachment_96\" style=\"width: 214px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/en.wikipedia.org\/wiki\/Homeland_(TV_series)\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-96\" class=\"size-medium wp-image-96\" src=\"http:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/Homelandposter-204x300.jpeg\" alt=\"\" width=\"204\" height=\"300\" srcset=\"https:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/Homelandposter-204x300.jpeg 204w, https:\/\/blogs.scu.edu\/tech\/files\/2012\/11\/Homelandposter.jpeg 220w\" sizes=\"auto, (max-width: 204px) 100vw, 204px\" \/><\/a><p id=\"caption-attachment-96\" class=\"wp-caption-text\">Homeland Promotional Advertisement. Source: <a href=\"http:\/\/en.wikipedia.org\/wiki\/Homeland_(TV_series)\" target=\"_blank\">Wiki<\/a><\/p><\/div>\n<p>In <a title=\"Actionable Surveillance in Little Brother\" href=\"http:\/\/blogs.scu.edu\/tech\/little-brother\/\" target=\"_blank\"><em>Little Brother<\/em><\/a>, the citizens of the greater San Francisco area are being watched by the government, specifically the Department of Homeland Security. This includes the use of cameras and bugs, even within private homes. We know now that a warrant mentioned above had to have been granted for these bugs to be legal. Another example of private surveillance is the TV show <a href=\"http:\/\/en.wikipedia.org\/wiki\/Homeland_(TV_series)\" target=\"_blank\"><em>Homeland<\/em><\/a>, which follows a CIA agent who suspects an American prisoner of war has been turned by terrorists located in Iraq, and invokes measures of surveillance within his home. Although it may seem as if private surveillance is a lesser issue than its public counterpart because it seems much less likely to occur, it is serious because its questioned legality, and necessary when it comes to issues of national security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As innovation has stimulated advancement in technology, outdated laws must be updated and renewed to accommodate these advances. As surveillance has expanded to include video cameras, bugs, and wiretaps, existing litigation does little to protect those whose rights had been &hellip; <a href=\"https:\/\/blogs.scu.edu\/tech\/private-surveillance\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":301,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/users\/301"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":19,"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":12,"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/pages\/10\/revisions\/12"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/tech\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}