Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher Jan 2022

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher

Faculty Articles

Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …


Pandemic Surveillance Discrimination, Christian Sundquist Jan 2021

Pandemic Surveillance Discrimination, Christian Sundquist

Articles

The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …


Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel Dec 2020

Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel

Honors Program Theses and Projects

Facial recognition software is something we use every day, whether it’s a suggested tag on our Facebook post or a faster way to unlock our phones. As technology becomes increasingly pervasive in our lives, law enforcement has adapted to utilize the new tools available in accessory to their investigations and the legal process.


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Faculty Publications

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu Dec 2017

Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu

Faculty Publications

This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies. …


Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Big Data Blacklisting, Margaret Hu Sep 2015

Big Data Blacklisting, Margaret Hu

Faculty Publications

“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Apr 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Electronic Evidence In Canada, Robert Currie, Steve Coughlan Jan 2012

Electronic Evidence In Canada, Robert Currie, Steve Coughlan

Articles, Book Chapters, & Popular Press

This chapter discusses the issues surrounding electronic evidence in Canada. Topics discussed include the best evidence rule, electronic signatures, web-based evidence, and video-tape and security camera evidence. In addition rules around protection of privacy, discovery, and confidentiality are pursued. Finally the chapter also considers the many issues which arise around gathering electronic evidence in the criminal context, including wiretaps, general warrants, and searches of computers and cell phones.


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …


The Death Of Privacy?, A. Michael Froomkin Jan 2000

The Death Of Privacy?, A. Michael Froomkin

Articles

The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, Internet tracking from cookies to "clicktrails", hardware-based identifiers, intellectual property-protecting "snitchware," and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may …


Commentary On Financial Privacy, Lynn M. Lopucki Jan 1999

Commentary On Financial Privacy, Lynn M. Lopucki

UF Law Faculty Publications

My three criticisms are this: First, Peter frames the problem as privacy versus government surveillance, thus ignoring the best solution to the problem, which is to make more information public. Second, Peter exaggerates the human need for privacy by presenting the need as immutable and essentially coextensive with embarrassment. People do not need nearly the privacy they think they do. Third, if Peter’s broad view of privacy holds, then you can forget about the information age.


The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin Jan 1995

The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin

Articles

No abstract provided.


The Consent Problem In Wiretapping & Eavesdropping: Surreptitious Monitoring With The Consent Of A Participant In A Conversation, Kent Greenawalt Jan 1968

The Consent Problem In Wiretapping & Eavesdropping: Surreptitious Monitoring With The Consent Of A Participant In A Conversation, Kent Greenawalt

Faculty Scholarship

The extent to which American society should permit wiretapping and electronic eavesdropping has been considered by judges, legislators and scholars for many years, although this consideration has yet to result in legal rules that respond rationally and consistently to the conflicting demands of privacy and effective law enforcement. Constitutional analysis has, until very recently, relied on concepts like "physical invasion of a constitutionally protected area," producing distinctions with little relation to underlying social values; statutory restrictions on wiretapping have been much more severe than those imposed on eavesdropping, though the latter, particularly in light of the rapidly developing technology, poses …


Wiretapping And Bugging: Striking A Balance Between Privacy And Law Enforcement, Kent Greenawalt Jan 1967

Wiretapping And Bugging: Striking A Balance Between Privacy And Law Enforcement, Kent Greenawalt

Faculty Scholarship

The conflict between individual privacy and the needs of law enforcement occurs at a number of points in our system of criminal justice. It is not unique to wiretapping and electronic eavesdropping, but the competing claims in that area do have their own special character. They are qualitatively different from those in regard to, say, confessions. The kinds of crimes and criminals affected are different, as are the relevant assertions about individual freedom.

Law enforcement officials, almost to a man, consider wiretapping and eavesdropping valuable weapons in the fight against crime. They are most helpful in regard to consensual crimes …