Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Crimmigration-Counterterrorism, Margaret Hu
Crimmigration-Counterterrorism, Margaret Hu
Scholarly Articles
The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …