Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez Jan 2020

A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez

Touro Law Review

No abstract provided.


Government Surveillance Accountability: The Failures Of Contemporary Canadian Interception Reports, Christopher Parsons, Adam Molnar Jan 2018

Government Surveillance Accountability: The Failures Of Contemporary Canadian Interception Reports, Christopher Parsons, Adam Molnar

Canadian Journal of Law and Technology

Real time electronic government surveillance is recognized as amongst the most intrusive types of government activity upon private citizens’ lives. There are usually stringent warranting practices that must be met prior to law enforcement or security agencies engaging in such domestic surveillance. In Canada, federal and provincial governments must report annually on these practices when they are conducted by law enforcement or the Canadian Security Intelligence Service, disclosing how often such warrants are sought and granted, the types of crimes such surveillance is directed towards, and the efficacy of such surveillance in being used as evidence and securing convictions.

This …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin Jan 2014

Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin

Oklahoma Law Review

Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the “mere evidence rule” in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the “object” of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search “might lead to evidence of wrongdoing” triggers a very different inquiry than probable cause to believe that a search “will produce evidence of criminal activity.” The failure to address the constraints that should be imposed on …


Ubiquitous Privacy, Thomas P. Crocker Jan 2014

Ubiquitous Privacy, Thomas P. Crocker

Oklahoma Law Review

No abstract provided.


Big Brother's Shadow: Decline In Reported Use Of Electronic Surveillance By Canadian Federal Law Enforcement, Nicholas Koutros, Julien Demers Jan 2013

Big Brother's Shadow: Decline In Reported Use Of Electronic Surveillance By Canadian Federal Law Enforcement, Nicholas Koutros, Julien Demers

Canadian Journal of Law and Technology

Despite popular perception of increased government surveillance, particularly since 9/11, a longitudinal study of the Annual Reports on the Use of Electronic Surveillance, published by Public Safety Canada between 1973 and 2011, demonstrates the opposite trend. This article first outlines this decline to situate the use of electronic surveillance by federal law enforcement. The second section of the article advances legal, political, and practical influences which are likely contributing to the diminished use of wiretapping by police. The purpose of this article is to present quantitative evidence to better inform the ongoing debate around extending “lawful access” regimes in Canada. …