Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Entire DC Network

Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters Dec 2021

Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters

Duke Journal of Constitutional Law & Public Policy Sidebar

The devastation wreaked by the COVID-19 pandemic spurred innovations in technology and public policy. Many countries rushed to implement extensive quarantines, and some introduced disease surveillance, including location tracking to enforce quarantines. Though the United States has never implemented high-tech quarantine surveillance, such technology will certainly be available for the next disease outbreak.

Absent significant doctrinal change, the Fourth Amendment likely bars some, but not all, forms of quarantine surveillance. Quarantine surveillance probably constitutes a Fourth Amendment “search” that generally must be backed by probable cause. This probable cause requirement, and its subcomponent of individualized suspicion, likely applies differently to …


“The New Pinkertons”: Anti-Union Consultants And Surveillance Tech Thwart Organizing, Jo Constantz Dec 2021

“The New Pinkertons”: Anti-Union Consultants And Surveillance Tech Thwart Organizing, Jo Constantz

Capstones

In 2020, just 6.3% of U.S. private-sector workers were union members, despite the fact that 68% of Americans approve of labor unions, the highest since 1965, and nearly half of non-union workers say they would join.

After World War II, wage growth kept pace with GDP growth, but then began to diverge in the 1970s, according to a study by the RAND Corporation. After 1975, incomes of the bottom 90% rose more slowly than the economy as a whole, while incomes of the top 10% grew faster. The declining wage growth coincided with and is closely related to a drop-off …


Social Norms In Fourth Amendment Law, Matthew Tokson, Ari Ezra Waldman Nov 2021

Social Norms In Fourth Amendment Law, Matthew Tokson, Ari Ezra Waldman

Michigan Law Review

Courts often look to existing social norms to resolve difficult questions in Fourth Amendment law. In theory, these norms can provide an objective basis for courts’ constitutional decisions, grounding Fourth Amendment law in familiar societal attitudes and beliefs. In reality, however, social norms can shift rapidly, are constantly being contested, and frequently reflect outmoded and discriminatory concepts. This Article draws on contemporary sociological literatures on norms and technology to reveal how courts’ reliance on norms leads to several identifiable errors in Fourth Amendment jurisprudence.

Courts assessing social norms generally adopt what we call the closure principle, or the idea that …


The Missing Algorithm: Safeguarding Brady Against The Rise Of Trade Secrecy In Policing, Deborah Won Oct 2021

The Missing Algorithm: Safeguarding Brady Against The Rise Of Trade Secrecy In Policing, Deborah Won

Michigan Law Review

Trade secrecy, a form of intellectual property protection, serves the important societal function of promoting innovation. But as police departments across the country increasingly rely on proprietary technologies like facial recognition and predictive policing tools, an uneasy tension between due process and trade secrecy has developed: to fulfill Brady’s constitutional promise of a fair trial, defendants must have access to the technologies accusing them, access that trade secrecy inhibits. Thus far, this tension is being resolved too far in favor of the trade secret holder—and at too great an expense to the defendant. The wrong balance has been struck.

This …


American Informant, Ramzi Kassem Sep 2021

American Informant, Ramzi Kassem

Michigan Journal of Race and Law

Part of my childhood was spent in Baghdad, Iraq, during the rule of Saddam Hussein. At that time, the regime offered free and universal education and healthcare. Literacy rates in the country surpassed much of the Arabic-speaking world and, indeed, the Global South. As the celebrated Egyptian intellectual, Taha Hussein, famously put it: “Cairo writes; Beirut prints; and Baghdad reads.” Booksellers were everywhere in Baghdad. Its people read voraciously and passionately debated literature, poetry, and a range of other subjects.

But what struck me, even as a child, was the absence of sustained talk about politics in bookshops, markets, and …


Israel’S Sigint Oversight Ecosystem: Covid-19 Secret Location Tracking As A Test Case, Amir Cahane May 2021

Israel’S Sigint Oversight Ecosystem: Covid-19 Secret Location Tracking As A Test Case, Amir Cahane

The University of New Hampshire Law Review

By mid-March 2020, Israel had experienced the first wave of the COVID-19 pandemic. Within a fortnight, confirmed coronavirus cases surged from half a dozen to 178 cases. In response to the challenge of identifying potential carriers, the government tasked the Israeli Security Agency (the ISA, or Shin Bet) with tracing the routes of confirmed coronavirus patients via cellphone location tracking and identifying individuals with whom the patients had been in close contact.

Israel's ISA communications metadata collection measures have been shrouded in veil of secrecy. The debate – in parliament and in court – regarding the use of the country's …


Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov Feb 2021

Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov

ProAcademy

The rapid growth of information technologies naturally determines the interest of researchers in them from various fields of science. Law, including criminal law, is no exception. Currently: a separate branch of law is being formed - information law. Despite this, until now in science unified approaches to the analysis of information and legal phenomena have not been developed. The article analyzes the formation and development of prosecutorial supervision over the execution of laws in the investigation of crimes in the field of information technology, and also studied the process of the emergence of information technology as a type of crime …


Strengthening Section 14141: Using Pattern Or Practice Investigations To End Violence Between Police And Communities, Sigourney Norman Jan 2021

Strengthening Section 14141: Using Pattern Or Practice Investigations To End Violence Between Police And Communities, Sigourney Norman

Journal of Civil Rights and Economic Development

(Excerpt)

Imagine you are on your way home from work and driving your usual route. You hear police sirens getting louder and louder. You realize you are the subject of their chase, but you cannot imagine why. You slow down and pull over, not wanting to cause confrontation. The officer beats on your car door. You roll down your window and ask why you have been pulled over. The officer informs you that your tail light is broken. Next, the officer orders you out of the car. Your heart races as the officer pats you down. You wonder if the …


Applying The Narrative Policy Framework To The Usa Freedom Act Of 2015, Michael Sean Hall Jan 2021

Applying The Narrative Policy Framework To The Usa Freedom Act Of 2015, Michael Sean Hall

Walden Dissertations and Doctoral Studies

The domestic security dilemma is a recurring problem whereby counterterrorism programs are continuously in a state of flux as demands for increased civil liberties and national security compete, as demonstrated by the USA PATRIOT Act of 2001 and USA FREEDOM Act of 2015. The National Security Agency bulk metadata collection program (NSA Surveillance Program) was created to identify terrorists and prevent terrorist attacks, but the USA FREEDOM Act prohibited the program in 2015. The NSA Surveillance Program's prohibition is problematic because the United States may not obtain the intelligence necessary to prevent a terrorist attack. The purpose of this qualitative …


What Is Privacy? That’S The Wrong Question, Woodrow Hartzog Jan 2021

What Is Privacy? That’S The Wrong Question, Woodrow Hartzog

Faculty Scholarship

Privacy has never had a precise meaning. But in the early 1900s, the concept took on new life as a term of art in legal frameworks. The result has been a bit of a mess, as no singular definition has been adequate for all purposes. Daniel Solove, perhaps the most influential privacy scholar of our day, wrote at the turn of the millennium that privacy was “a concept in disarray.”

In this short essay reflecting upon Solove’s impact on the modern study of information privacy, I argue that the chaos and futility of competing conceptualizations of privacy is why Solove’s …


Health Care Sanctuaries, Medha D. Makhlouf Jan 2021

Health Care Sanctuaries, Medha D. Makhlouf

Faculty Scholarly Works

It is increasingly common for noncitizens living in the United States to avoid seeing a doctor or enrolling in publicly funded health programs because they fear surveillance by immigration authorities. This is the consequence of a decades-long shift in the locus of immigration enforcement activities from the border to the interior, as well as a recent period of heightened immigration enforcement. These fears persist because the law incompletely constrains immigration surveillance in health care.

This Article argues that immigration surveillance in health care is a poor choice of resource allocation for immigration enforcement because it has severe consequences for health …


Child-Proofing Global Public Health In Anticipation Of Emergency, Frederick M. Abbott Jan 2021

Child-Proofing Global Public Health In Anticipation Of Emergency, Frederick M. Abbott

Scholarly Publications

No abstract provided.


Trademarks As Surveillance Transparency, Amanda Levendowski Jan 2021

Trademarks As Surveillance Transparency, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

We know very little about the technologies that watch us. From cell site simulators to predictive policing algorithms, the lack of transparency around surveillance technologies makes it difficult for the public to engage in meaningful oversight. Legal scholars have critiqued various corporate and law enforcement justifications for surveillance opacity, including contract and intellectual property law. But the public needs a free, public, and easily accessible source of information about corporate technologies that might be used to watch us. To date, the literature has overlooked a free, extensive, and easily accessible source of information about surveillance technologies hidden in plain sight: …


From Lex Informatica To The Control Revolution, Julie E. Cohen Jan 2021

From Lex Informatica To The Control Revolution, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …


Toward Racially Equitable And Accountable Tech, Andrea Giampetro-Meyer, Janae James, Sydney Brooke Jan 2021

Toward Racially Equitable And Accountable Tech, Andrea Giampetro-Meyer, Janae James, Sydney Brooke

Marquette Law Review

This Article examines three distinct areas to consider how we might move

toward racially equitable and accountable tech. The three distinct areas are:

(1) fair housing, (2) surveillance, and (3) social media. Fair housing raises

questions about where today’s racially biased algorithms fit within the context

of historical, racist government housing policy. Surveillance raises questions

about how some tech tools render Black faces invisible, while others render

Black faces dangerously conspicuous. Social media highlights the clash

between civil rights and civil liberties, especially when racial justice conflicts

with freedom of speech. Our analysis leads us to consider the extent to …


Surveillance And The Tyrant Test, Andrew Guthrie Ferguson Jan 2021

Surveillance And The Tyrant Test, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

How should society respond to police surveillance technologies? This question has been at the center of national debates around facial recog- nition, predictive policing, and digital tracking technologies. It is a debate that has divided activists, law enforcement officials, and academ- ics and will be a central question for years to come as police surveillance technology grows in scale and scope. Do you trust police to use the tech- nology without regulation? Do you ban surveillance technology as a manifestation of discriminatory carceral power that cannot be reformed? Can you regulate police surveillance with a combination of technocratic rules, policies, …


A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog Jan 2021

A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

Data privacy law fails to stop companies from engaging in self-serving, opportunistic behavior at the expense of those who trust them with their data. This is a problem. Modern tech companies are so entrenched in our lives and have so much control over what we see and click that the self-dealing exploitation of people has become a major element of the internet’s business model.

Academics and policymakers have recently proposed a possible solution: require those entrusted with people’s data and online experiences to be loyal to those who trust them. But many have concerns about a duty of loyalty. What, …


The Case Of The Nosy Neighbors, Johanna Gunawan, Woodrow Hartzog Jan 2021

The Case Of The Nosy Neighbors, Johanna Gunawan, Woodrow Hartzog

Faculty Scholarship

Inspired by companies like Clearview AI, Nextdoor, and Amazon, this case study asks students to assume the role of a high-ranking ethics-focused employee at a (fictional) neighborhood-focused social media company. It involves challenging ethical questions around how social media services and surveillance tools are built and used, and the complicated relationship between companies, their users, and law enforcement authorities. Students should pay particular attention to the values implicated by certain design decisions, and the competing incentives for corporations that might complicate the picture for ethical decision making.


Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson Jan 2021

Agonistic Privacy & Equitable Democracy, Scott Skinner-Thompson

Publications

This Essay argues that legal privacy protections—which enable individuals to control their visibility within public space—play a vital role in disrupting the subordinating, antidemocratic impacts of surveillance and should be at the forefront of efforts to reform the operation of both digital and physical public space. Robust privacy protections are a touchstone for empowering members of different marginalized groups with the ability to safely participate in both the physical and digital public squares, while also preserving space for vibrant subaltern counterpublics. By increasing heterogeneity within the public sphere, privacy can also help decrease polarization by breaking down echo chambers and …


A General Defense Of Information Fiduciaries, Andrew F. Tuch Jan 2021

A General Defense Of Information Fiduciaries, Andrew F. Tuch

Scholarship@WashULaw

Countless high-profile abuses of user data by leading technology companies have raised a basic question: should firms that traffic in user data be held legally responsible to their users as “information fiduciaries”? Privacy legislation to impose fiduciary-like duties of care, confidentiality, and loyalty on data collectors enjoys bipartisan support but faces strong opposition from scholars. First, critics argue that the information fiduciary concept flies in the face of fundamental corporate law principles that require firms to prioritize shareholder interests over those of users. Second, it is said that the overwhelming self-interest of digital companies makes fiduciary loyalty impossible as a …


Examining Sociodemographic Data Reporting Requirements In State Disease Surveillance Systems, Samantha Bent Weber, Amanda Moreland, Rachel Hulkower, Tara Ramanathan Holiday Jan 2021

Examining Sociodemographic Data Reporting Requirements In State Disease Surveillance Systems, Samantha Bent Weber, Amanda Moreland, Rachel Hulkower, Tara Ramanathan Holiday

Saint Louis University Journal of Health Law & Policy

Law plays an important role in the collection of data related to disease and injury in a population. A robust system of laws sets out requirements for the collection, analysis, and dissemination of disease reporting data from local, state, territorial, and federal public health institutions. Occurrence of disease, including outbreaks of novel infectious agents like coronaviruses, influenza viruses, and others that have arisen in recent years, often require epidemiologists and others to understand not only the etiology and specific context of diseases and conditions, but also the trajectory of their spread among and across communities. Capturing sociodemographic data is critical …


The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson Jan 2021

The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson

Faculty Scholarship

Industry and government tried to use information technologies to respond to the COVID-19 pandemic, but using the internet as a tool for disease surveillance, public health messaging, and testing logistics turned out to be a disappointment. Why weren’t these efforts more effective? This Essay argues that industry and government efforts to leverage technology were doomed to fail because tech platforms have failed over the past few decades to make their tools trustworthy, and lawmakers have done little to hold these companies accountable. People cannot trust the interfaces they interact with, the devices they use, and the systems that power tech …


Era Of Accelerating Digital Convergence: Security, Surveillance, Data, Privacy, Big Tech, And Politics, John Taschner Jan 2021

Era Of Accelerating Digital Convergence: Security, Surveillance, Data, Privacy, Big Tech, And Politics, John Taschner

American University International Law Review

No abstract provided.