Introduction
Homeland Security is tasked with the responsibility of safeguarding the US from threats, both foreign and domestic. In the age of technological revolution unseen and unrivaled in any previous era of human history, digital surveillance is both more commonly accepted and viewed suspiciously by people who use cell phones, the Internet, social media, or even vehicles where GPS tracking systems are built-in. Many people allow Google, a public company, to monitor their movements and track where they have been, while others turn off Google tracking and use private networks because they want to maintain their privacy in the age in of digital technological intrusion and mass surveillance. The question that the Supreme Court raised but did not answer directly in United States v. Jones, 565 U.S. (2012) was what constituted a reasonable expectation of privacy in the digitalized world. Did using a GPS tracking device without a warrant constitute a violation of the 4th Amendment? The Supreme ruled in a 5-4 decision that it did, and this served as a landmark ruling in terms of how far law enforcement can go to track suspects. FBI Director Robert Mueller went so far as to testify before Congress that the Jones ruling had placed a significant limit on the FBI’s ability to conduct surveillance (Johnson, 2012). Yet in the case of Jones, the government tried him again, this time using the GPS data from the car’s built-in system. The case resulted in a mistrial and Jones, aware that another trial would commence, agreed to a plea deal. Thus, what initially seemed a victory for 4th Amendment rights advocates soon showed itself as little more than a technical victory that could easily be gotten around because of built-in digital communication systems that law enforcement can access for surveillance purposes. For Homeland Security, the Jones ruling may seem like a limitation but the reality is that DHS has multiple tools available to it that can be used to assist in the tracking of suspects. This paper will describe the background of 4th Amendment case law and the case of United States v. Jones, 565 U.S. (2012), explain the ruling of the Supreme Court, and discuss it within the wider context of the responsibilities and capabilities of Homeland Security to engage in surveillance work within the confines of the Jones ruling.
United States v. Jones, 565 U.S.
The 4th Amendment has always been a thorny issue for law enforcement. The ruling of Harris v. United States (1947) allowed law enforcement to conduct searches regardless of the reason for the arrest of the person; however, that allowance was later limited by the ruling in Chimel v. California (1969), which confined law enforcement’s right to search to within the context of securing the premises of weapons that the detained person might use against law enforcement. To search the premises for evidence to support the case of wrongdoing would still require a warrant. Thus, even if a murder was committed in a home, police would still need a warrant to search it.
Before those cases, however, came the Exclusionary Rule, which was implemented in order to stop unlawful searches and seizures. It hailed from so-called “fruit of the poisonous tree” doctrine that was set down in the ruling from Weeks v. United States (1914) as well as in latter 1920 case of Silverthorne Lumber Co. v. United States. Exceptions to this rule came about as law enforcement put forward situations where it was in the public’s best interest to conduct searches without warrant in certain circumstances. The ruling in Arizona v. Gant (2009) gave validation to the concept of search incident to arrest as put forward by Chimel v. California decades earlier. Yet the US Supreme Court ruled definitively in favor of the 4th...
References
Athan Theoharis, Richard H. (2006). The Central Intelligence Agency: Security Under Scrutiny. Greenwood Publishing Group
DHS. (2018). Centralized area video surveillance. Retrieved from https://www.dhs.gov/publication/centralized-area-video-surveillance-system
DHS. (2020). Mobile surveillance capability. Retrieved from https://www.dhs.gov/taxonomy/term/3557/all/feed
Epic. (2012). Patriot Act extension. Retrieved from https://epic.org/privacy/terrorism/usapatriot/extension/
Johnson, C. (2012). FBI Still Struggling With Supreme Court's GPS Ruling. Retrieved from https://www.npr.org/2012/03/21/149011887/fbi-still-struggling-with-supreme-courts-gps-ruling
Schad, M. (1967). Police Liability for Invasion of Privacy. Clev.-Marshall L. Rev., 16, 428.
United States v. Jones. (2012). Retrieved from https://www.oyez.org/cases/2011/10-1259
Homeland Security Questioning the Legality of the Patriot Act The Department of Homeland Security After the September 11 attacks, the United States was, undoubtedly, in a state of fury, sadness, desperation and general turmoil. Our country's iconic positivity had to be rebuilt, and threats, above everything else, had to be kept at bay and far away from U.S. soil. The State Department undertook a number of policies to achieve this goal, and one
Homeland Security The obligation for homeland security inside the United States became obvious following the terrorist attacks that took place on September 11, 2001. The national debate that followed has concerned an amount of multifaceted and diverse difficulties. The issues linking to homeland security are a lot of the times blurred for the reason that the nation is dealing with a new kind of struggle, a new hazard right on American
Homeland Security The attacks of September 11, 2001 have necessitated a new awareness of the shortcomings of the American security system. It follows that there also arose the need to reassess this security system and to enhance the measures already in place so that the possibility of future attacks can be minimized. The emotions aroused by 9/11 doubtlessly played a large part in allowing the government to use measures that would
Homeland Security The needs to be prepared for any disaster or attack constitute the need of standard operating procedures which need to be followed accurately. Standard operating procedures ensure that the right procedures are followed when dealing with any disaster affecting the society. The main purpose of having standard operating procedures is to guarantee that investigations are done in a consistent manner which should be correct. The use of standard operating
Homeland Security How is command and control affected by "span of control"? Command and control refers the actions of a properly designated commander. This commander will then exercise his or her authority over assigned forces in the accomplishment of the mission. This ability to oversee forces is directly related to the span of control, or how many people the commander oversees. If the commander does not have authority over personnel, equipment, communications,
Homeland Security and U.S. Intelligence Formation of Department of Homeland Security & U.S. Intelligence on Terrorism Definition of Intelligence Rationale for Formation of DHS Effectiveness of DHS Importance of Intelligence & Analysts Research Philosophy Research Methods & Its Limitations Data Collection & Analysis National security has been a major concern for United States in past few decades. However, since 2001, this concern has turn into a serious threat for national security. The given research is performed with the intent
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now