Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark May 2017

Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark

Robert M. Bloom

The past fifty years has witnessed an evolution in technology advancement in police surveillance. Today, one of the essential tools of police surveillance is something most Americans carry with them in their pockets every day, the cell phone. Cell phones not only contain a huge repository of personal data, they also provide continuous surveillance of a person’s movement known as cell site location information (CSLI). In 1986, Congress sought to provide some privacy protections to CSLI in the Stored Communication Act. Although this solution may have struck the proper balance in an age when cell phones were a mere novelty …


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2011

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert M. Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …