Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Felony Financial Disenfranchisement, Neel U. Sukhatme, Alexander Billy, Gaurav Bagwe Jan 2022

Felony Financial Disenfranchisement, Neel U. Sukhatme, Alexander Billy, Gaurav Bagwe

Georgetown Law Faculty Publications and Other Works

Individuals with prior felony convictions often must complete all terms of their sentence before they regain voter eligibility. Many jurisdictions include legal-financial obligations (LFOs) — fines, fees, and/or restitution stemming from convictions — in the terms of the sentence. Twenty-eight states, governing over 182 million Americans, either directly or indirectly tie LFO repayment to voting privileges, a practice we call felony financial disenfranchisement.

Proponents of felony financial disenfranchisement posit that returning citizens must satisfy the financial obligations stemming from convictions to restore themselves as community equals. Moralism aside, others claim low rates of electoral participation among those with felony convictions …


The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue Jan 2021

The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The past eight years have witnessed an explosion in the number of publicly-available opinions and orders issued by the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review. From only six opinions in the public domain 1978–2012, by early 2021, eighty-eight opinions had been released. The sharp departure is even more pronounced in relation to orders: from only one order declassified during 1978–2012, since 2013, 288 have been formally released. These documents highlight how the courts’s roles have evolved since 2004 and reveal four key areas that dominate the courts’ jurisprudence: its position as a specialized, Article III …


Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue Apr 2019

Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, …


Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue Jan 2019

Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …


The Fourth Amendment In A Digital World, Laura K. Donohue Jan 2017

The Fourth Amendment In A Digital World, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue Jan 2015

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.

The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …


Substitute Arguments In Constitutional Law, Louis Michael Seidman Jan 2015

Substitute Arguments In Constitutional Law, Louis Michael Seidman

Georgetown Law Faculty Publications and Other Works

In this article, I argue that that substitution is crucial to our practice of constitutional law. Of course, if one wished, one could easily extend the domain of substitution beyond these boundaries. Substitute arguments are an important aspect of law more generally and, indeed, of life. I have nonetheless chosen to limit my discussion to constitutional substitution because, I believe, overt discussion of substitution in this particular area illuminates important aspects of our constitutional regime-–aspects that substitution itself regularly obscures. To put my central point directly, I hope to show that constitutional law amounts to one, giant substitute argument.


Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue Jan 2014

Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …


Advisory Adjudication, Girardeau A. Spann Jan 2012

Advisory Adjudication, Girardeau A. Spann

Georgetown Law Faculty Publications and Other Works

The Supreme Court decision in Camreta v. Greene is revealing. The Court first issues an opinion authorizing appeals by prevailing parties in qualified immunity cases, even though doing so entails the issuance of an advisory opinion that is not necessary to resolution of the dispute between the parties. And the Court then declines to reach the merits of the underlying constitutional claim in the case, because doing so would entail the issuance of an advisory opinion that was not necessary to the resolution of the dispute between the parties. The Court's decision, therefore, has the paradoxical effect of both honoring …


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …