Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (5)
- Surveillance (4)
- Bulk metadata collection (2)
- FISA (2)
- Foreign intelligence surveillance court (2)
-
- Fourth Amendment (2)
- National security (2)
- Remote biometric identification (2)
- ALPR (1)
- Advisory adjudication (1)
- Aerial surveillance (1)
- Air Pollution Variance Board v. Western Alfalfa Corp. (1)
- Alito (1)
- Amendment 4 (1)
- Article III (1)
- Automated license plate readers (1)
- Beepers (1)
- Big data (1)
- Blackstone (1)
- Bluetooth (1)
- Boyd (1)
- Boyd v. United States (1)
- Brandeis (1)
- CSLI (1)
- California v. Ciraolo (1)
- Camreta (1)
- Carpenter (1)
- Cell site location information (1)
- Cell site location information (CLSI) (1)
- Ciraolo (1)
Articles 1 - 13 of 13
Full-Text Articles in Law
Felony Financial Disenfranchisement, Neel U. Sukhatme, Alexander Billy, Gaurav Bagwe
Felony Financial Disenfranchisement, Neel U. Sukhatme, Alexander Billy, Gaurav Bagwe
Georgetown Law Faculty Publications and Other Works
Individuals with prior felony convictions often must complete all terms of their sentence before they regain voter eligibility. Many jurisdictions include legal-financial obligations (LFOs) — fines, fees, and/or restitution stemming from convictions — in the terms of the sentence. Twenty-eight states, governing over 182 million Americans, either directly or indirectly tie LFO repayment to voting privileges, a practice we call felony financial disenfranchisement.
Proponents of felony financial disenfranchisement posit that returning citizens must satisfy the financial obligations stemming from convictions to restore themselves as community equals. Moralism aside, others claim low rates of electoral participation among those with felony convictions …
The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue
The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The past eight years have witnessed an explosion in the number of publicly-available opinions and orders issued by the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review. From only six opinions in the public domain 1978–2012, by early 2021, eighty-eight opinions had been released. The sharp departure is even more pronounced in relation to orders: from only one order declassified during 1978–2012, since 2013, 288 have been formally released. These documents highlight how the courts’s roles have evolved since 2004 and reveal four key areas that dominate the courts’ jurisprudence: its position as a specialized, Article III …
Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue
Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, …
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …
The Fourth Amendment In A Digital World, Laura K. Donohue
The Fourth Amendment In A Digital World, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …
Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue
Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue
High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.
The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …
Substitute Arguments In Constitutional Law, Louis Michael Seidman
Substitute Arguments In Constitutional Law, Louis Michael Seidman
Georgetown Law Faculty Publications and Other Works
In this article, I argue that that substitution is crucial to our practice of constitutional law. Of course, if one wished, one could easily extend the domain of substitution beyond these boundaries. Substitute arguments are an important aspect of law more generally and, indeed, of life. I have nonetheless chosen to limit my discussion to constitutional substitution because, I believe, overt discussion of substitution in this particular area illuminates important aspects of our constitutional regime-–aspects that substitution itself regularly obscures. To put my central point directly, I hope to show that constitutional law amounts to one, giant substitute argument.
Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue
Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …
Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole
Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole
Georgetown Law Faculty Publications and Other Works
In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …
Advisory Adjudication, Girardeau A. Spann
Advisory Adjudication, Girardeau A. Spann
Georgetown Law Faculty Publications and Other Works
The Supreme Court decision in Camreta v. Greene is revealing. The Court first issues an opinion authorizing appeals by prevailing parties in qualified immunity cases, even though doing so entails the issuance of an advisory opinion that is not necessary to resolution of the dispute between the parties. And the Court then declines to reach the merits of the underlying constitutional claim in the case, because doing so would entail the issuance of an advisory opinion that was not necessary to the resolution of the dispute between the parties. The Court's decision, therefore, has the paradoxical effect of both honoring …
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …