Back
 BLR  Vol.7 No.1 , March 2016
Enhanced Forms of Criminal Investigation: Analysis on Its Potential Risks to Human Rights
Abstract: Criminal investigation is the bedrock in fact inquiry for the criminal justice system. In the contemporary world, countries use technologically enhanced criminal investigation techniques for the alleged crime or for the probable crimes. The current trends show that those enhanced forms of criminal investigation techniques have been used in more extended manner. Such extended applications of those techniques have become the threats to individual rights such as right to privacy, freedom of expression, the right to freedom of association and assembly, the right to freedom of movement and the due process rights. This paper analyzes the available justifications, compatibility and ethical sides of these enhanced forms of investigating techniques by police or investigative organs. Moreover, it also critically analyzes the potential threats and implications of these enhanced forms of criminal investigations on the certain basic individual human rights. Under the umbrella of enhanced criminal investigation techniques, there are various special techniques. The scope of this paper is not to deal with the specific nature of each technique, rather it is limited only to the general behavior or characteristics, their underlying rationales and the possible threats on the rights of individuals.
Cite this paper: Jemberie, M. (2016) Enhanced Forms of Criminal Investigation: Analysis on Its Potential Risks to Human Rights. Beijing Law Review, 7, 33-41. doi: 10.4236/blr.2016.71004.
References

[1]   Abramson, J. M. (2005). Challenging Federal Wiretaps, Criminal Law Newsletter. The Colorado Lawyer, 34, 73.

[2]   Ask, K. (2006). Criminal Investigations: Motivations, Emotions and Cognitions in the Process of Evidence. Doctoral Dissertation at Department of Psychology, Goteborg: Goteborg University.

[3]   Bloss, W. (2007). Escalating US. Police Surveillance after 9/11: An Examination of Causes and Effects. Surveillance and Society, Special Issues on “Surveillance and Criminal Justice” Part 1, 4, 208-228.

[4]   Byne, J., et al. (2011). Technological Innovations in Crime Prevention and Policing: A Review of Research on Implementation and Impact. Voor Belgie: Maklu-Uitgervers.

[5]   Caremen, R. V. (2010). Criminal Procedure: Law and Practice (8th ed.). Boston, MA: Wadsworth, Cengage Learning.

[6]   Cavoukian, A. (2008). Privacy and Video Surveillance in Mass Transit System: A Special Investigation Report. Information and Privacy Commissioner, p. 2.

[7]   Cohen, S. A. (1982). Invasion of Privacy: Police and Electronic Surveillance in Canada. McGILL Law Journal, 27, 619-675.

[8]   Council of Europe, Recommendation 10 of the Committee of Ministers to Member States on “Special Investigative Techniques” in Relation to Serious Crimes Including Acts of Terrorism, 2005, Para. 1.

[9]   Del Carmen, R. V. (2009). Criminal Procedure: Laws and Practice (8th ed.). Belmont, CA: Wadsworth/Cengage Learning.

[10]   Doyle, C. (2012). Wiretapping, Tape Recorders, and Legal Ethics: An Overview of Questions Posed by Attorney Involvement in Secretly Recording Conversation. Congressional Research Service, p. 1.

[11]   Ferdico, J. N., et al. (2009). Criminal Procedure for the Criminal Justice Professional (10th ed.). Belmont, CA: Wadsworth/ Cengage Learning.

[12]   Hall, D. E. (2004) Criminal Law and Procedure (4th ed.). Thomson Delmar Learning, West Legal Studies.

[13]   Harfield, C. (2010). The Governance of Covert Investigation. Melbourne University Law Review, Vol.34.

[14]   Herbert, L. C. (2011). Challenging the (Un)Constitutionality of Governmental GPS Surveillance. American Bar Association, Criminal Justice, 26, 11 p.

[15]   Hewitt, M. (2008) Wiretapping: A Necessary for Effectively Combating Terrorism in the 21st Century. Senior Honors Thesis, Virginia: Honors Program of Liberty University.

[16]   Isnard, A. (2001). Can Surveillance Cameras be Successful in Preventing and Controlling Anti-Social Behaviors? (p. 7). Australian Institute of Criminology.

[17]   Kaplan, H. J. (2012). The History and Law of Wiretapping, ABA Sections of Litigation 2012 Section Annual Conference April 18-20, 2012: The Lesson of the Raj Rajarantnam Trial: Be Careful Who’s Listening.

[18]   Klein, E. (2013). Freedom of Movement: International Protection. Max Planck Institute for Comparative Public Law, Oxford: Heidelberg and Oxford University Press.

[19]   McCord, J. W. H., McCord, S. L., & Bailey, C. S. (2006). Criminal Law and Procedure for the Paralegal: A Systems Approach. New York: Thomson Delmar Learning.

[20]   Mooneh, T. (2010). Special Investigation Techniques. Data Processing and Privacy Protection in the Jurisprudence of the European Court of Human Rights, Pace Int’l L. Rev. Online Companion, at 97, p. 106.

[21]   Mullikin, A., & Rahman, S. M. (2010). The Ethical Dilemma of the U.S.A. Government Wiretapping. International Journal of Managing Information Technology (IJMIT), 2, 32.

[22]   Pikowsky, R. A. (2002). An Overview of the Law of Electronic Surveillance Post September 11, 2001 (p. 605). Moscow: Law Library Journal, University of Idaho Law Library.

[23]   Scheb, J. M. (2011). Criminal Law and Procedure (7th ed.). Boston, MA: Wadsworth, Cengage Learning.

[24]   Scheimin, M. (2009). Report of the Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism. Human Rights Council, 13th Session, A/HRC/13/37.

[25]   Sepulreda, M. et al. (2004). Universal and Regional Human Rights Protection: Cases and Commentaries. Costa Rica: University for Peace.

[26]   Sepulveda, M. et al. (2004). Human Rights Reference Hand Book (3rd ed.). Costa Rica: University of Peace.

[27]   Stutzer, A., et al. (2010). Camera Surveillance as a Measure of Counterterrorism? Economics of Security Working Paper 34, Berlin: Economic of Security.

[28]   Taylor, N. (2011). A Conceptual Legal Framework for Privacy, Accountability and Transparency in Visual Surveillance System. Surveillance and Society, 8, 455-470.

[29]   Tong, S., Bryant, R. P., & Horvath, M. A. H. (2009). Understanding Criminal Investigation (pp. 1-36). Wiley Blackwell, Hoboken, NJ: John Wiley and Sons Ltd.

[30]   U.S. Congress, Office of Technology Assessment (1988). Criminal Justice, New Technologies and the Constitution (p. 1). OTA-CIT-366, Washington, DC: U.S. Government Printing Office.

[31]   United Nations Conventions against Transnational Organized Crime, New York, 2004.

[32]   United Nations Office on Drugs and Crime (2011). Criminal Intelligence: Manual for Analysis. New York.

 
 
Top