丸善雄松堂株式会社
学術情報ソリューション事業部
法律情報営業部

〒160-0002
東京都新宿区四谷坂町10-10
Tel: 03-6367-6120
Fax: 03-6367-6215

※2018年5月7日より電話・Fax番号が変わりました。

ご注文に際して

個人情報保護方針

コーポレートサイト

通信の傍受と盗聴 第3版

Wiretapping and Eavesdropping: Surveillance in the Internet Age, 3rd Edition

Clifford Fishman, Anne McKenna

4 vols. Looseleaf. 2007 to date.(追録年1回)

West (CBC).

¥177,446

在庫あり

裁判あるいは審理前手続における「盗聴による証拠」の問題を取り扱った文献。

【主な内容】

・盗聴令状を得るための要件と手続

・傍受命令、報告、証拠排除、証拠テープの証明

・盗聴で得た証拠の開示と異議 

・判例と制定法

・令状のサンプル、手続書類、チェックリスト等を収録

第3版では、コンピュータ、インターネットに関する記述が大幅に増え、連邦コンピュータ法規やコンピュータ詐欺及び不正使用禁止法(1986年)の解説、コンピュータ捜査のための令状、携帯電話、生態認証等についても詳述しています。

【Table of Contents】

Volume 1

Part I. Legislation and Definitions

Chapter

1.Background and Overview; Messages to Our Readers

2.Statutory and Other Definitions

Part II. Statutory Protection of Wire, Oral and Electronic Communications

3.Crimes and Civil Actions Relating to Communications Privacy

4.Toll Records, Pen Registers, and other Information about Wire Communications and E-mail

5.Consensual Interceptions

6.Other Exceptions and Situations

7.Stored Wire and Electronic Communications

Part III. Title III and FISA Applications and Orders

8.Application and Order

9.Extensions and Second-Generation Orders

10.Roving Interceptions

11.Emergency Surveillance

12.Foreign Intelligence and National Security Surveillance

Part IV. Execution of a Title III Interception Order

13.[Reserved]

14.Roles and Responsibilities; Investigative Disclosure and Use

15.Minimization

16.Other Crimes and Criminals

17.[Reserved]

18.Inventory and Notice

19.Sealing, Custody and Storage of Recordings

20.[Reserved]

Volume 2

Part V. Computers, the Internet and the Law

Chapter

21.Internet Technology and Cybercrime: an Overview

22.Computers, the Internet and the Fourth Amendment

23.Searching Computers: Warrant Exceptions

24.Searching Computers: Warrant Requirements

25.Federal Computer Legislation

26.Computer Fraud and Abuse Act, 18 U.S.C.A. § 1030

27.Computer-Related Crimes and Civil Actions: State Legislation [Reserved]

Part VI. Surveillance with Other Electronic Devices; Radio and Telecommunications

28.Cellular Phones: Technology, Investigation and Tracking

29.Electronic Tracking Devices

30.Technologically Enhanced Visual Surveillance; Other Forms of Surveillance Technology

32.Biometrics

Part VII. Pretrial Litigation

32.Grand Jury Use of Intercepted Communications

33.Preliminary Defense Strategy and Motions

34.Grounds for Suppression

35.Litigating the Suppression Motion

Part VIII. The Trial

36.Transcripts and Translations

37.Authentication, Audibility and Intelligibility

38.Voice Identification

39.E-mail Authentication [Reserved]

40.Computer and Network Data Evidentiary Issues [Reserved]

41.Other Issues at Trial

Appendices

A.Sample Network Banner Language

B.Stored Communications Act, 18 U.S.C. § 2703(d)

C.Sample Language for Preservation Request Letters under 18 U.S.C. 2703(f)

D.Sample Application and Order for Pen Register/Trap and Trace for Web-Based Email Account

E.Sample Application and Order for Pen Register/Trap and Trace to Collect Addresses on Email Sent to/from Target Account

F.Sample Application and Order for Pen Register/Trap and Trace on a Computer Network Intruder

G.Sample Subpoena Language

H.Sample Letter for Provider Monitoring

I.Search Warrants and Accompanying Affidavits to Search and Seize Computers

J.Sample Authorization for Monitoring of Computer Trespasser Activity

Table of Laws and Rules

Table of Cases

Index