Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Surveillance

Discipline
Institution
Publication
Publication Type

Articles 1 - 28 of 28

Full-Text Articles in Law

Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger Dec 2020

Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger

Washington Law Review Online

Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …


The Contemporary Position Of Public International Law From The Right To Privacy In The Digital Age, Rezeq Salmoudi Nov 2020

The Contemporary Position Of Public International Law From The Right To Privacy In The Digital Age, Rezeq Salmoudi

Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث

The right to privacy is one of the pivotal rights rooted in the history of human beings. Almost all legal systems have always regarded this right as being sacred and should never be violated. Paradoxically, as life goes on, the threat to this right is growing rapidly, which constitutes a challenge to human rights' defenders and activists. This challenge is mainly triggered by the ever-advancing revolution of technology, which enables, inter alia, the State, more than ever before, to interfere with one's private life, This, in turn, endangers the societal value of privacy. However, the cyber surveillance programs have proved …


Inescapable Surveillance, Matthew Tokson Nov 2020

Inescapable Surveillance, Matthew Tokson

Utah Law Faculty Scholarship

Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.

In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Submission To The Justice And Electoral Committee On The Search And Surveillance Bill 2009, Samuel Beswick, William Fotherby Sep 2020

Submission To The Justice And Electoral Committee On The Search And Surveillance Bill 2009, Samuel Beswick, William Fotherby

All Faculty Publications

This submission to the Justice and Electoral Select Committee of the New Zealand Parliament addresses the surveillance regime created by the Search and Surveillance Bill 2009.


Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li Sep 2020

Privacy In Pandemic: Law, Technology, And Public Health In The Covid-19 Crisis, Tiffany Li

Faculty Scholarship

The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors are using new technologies, like heat sensing, and technologically-influenced programs, like contact tracing, alike in response, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the …


Fixing Informational Asymmetry Through Trademark Search, Jessica Silbey Aug 2020

Fixing Informational Asymmetry Through Trademark Search, Jessica Silbey

Faculty Scholarship

I call this paper a “Levendowski special.” It follows the signature format of much of Professor Levendowski’s prior work which, as in the latest article, recruits a legal tool typically aimed at one set of problems for the purpose of cleverly addressing a different set of problems. Her past articles harnessed copyright law to “fix artificial intelligence’s implicit bias” (2018) and to “combat revenge porn.” (2014). This paper draws on Professor Levendowski’s expertise working in private practice as a trademark attorney to address the problem of surveillance technology opacity. It is a primer on how to investigate trademark …


A New Compact For Sexual Privacy, Danielle K. Citron Jun 2020

A New Compact For Sexual Privacy, Danielle K. Citron

Faculty Scholarship

Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies, and nude photos. Individuals hardly appreciate the extent of the monitoring, and even if they did, little can be done to curtail it. What is big business for firms is a big risk for individuals. The handling of intimate data undermines the values that sexual privacy secures—autonomy, dignity, intimacy, and equality. It can imperil people’s job, housing, insurance, and other crucial opportunities. More often, women and minorities shoulder a disproportionate amount of the burden.

Privacy law is failing us. Our …


Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl May 2020

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl

Catholic University Law Review

Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.

This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …


Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent May 2020

Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent

ConLawNOW

As the fight against the coronavirus pandemic continues, state governments are considering more invasive surveillance to determine who has been exposed to the virus and who is most likely to catch the virus in the future. Widespread efforts to test temperatures have been initiated; calls for contact tracing have increased; and plans have been revealed to allow only those testing positive for the virus’s antibodies (who presumably now are immune) to return to work and travel. Such fundamental liberties may now hinge on the mere probabilities that one may catch the disease or be immune from it.

To assess the …


Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore May 2020

Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore

Loyola of Los Angeles Law Review

No abstract provided.


Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham May 2020

Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham

Research Collection Yong Pung How School Of Law

As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure …


Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon Apr 2020

Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon

Washington and Lee Law Review

This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …


The Danger Of Facial Recognition In Our Children’S Classrooms, Nila Bala Mar 2020

The Danger Of Facial Recognition In Our Children’S Classrooms, Nila Bala

Duke Law & Technology Review

No abstract provided.


Privacy As Safety, A. Michael Froomkin, Zak Colangelo Mar 2020

Privacy As Safety, A. Michael Froomkin, Zak Colangelo

Washington Law Review

The idea that privacy makes you safer is unjustly neglected: public officials emphasize the dangers of privacy while contemporary privacy theorists acknowledge that privacy may have safety implications but hardly dwell on the point. We argue that this lack of emphasis is a substantive and strategic error and seek to rectify it. This refocusing is particularly timely given the proliferation of new and invasive technologies for the home and for consumer use more generally, not to mention surveillance technologies such as so-called smart cities.

Indeed, we argue—perhaps for the first time in modern conversations about privacy—that in many cases privacy …


Automation In Moderation, Hannah Bloch-Wehba Mar 2020

Automation In Moderation, Hannah Bloch-Wehba

Faculty Scholarship

This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.

In fact, however, the …


Management Culture And Surveillance, J.S. Nelson Feb 2020

Management Culture And Surveillance, J.S. Nelson

Seattle University Law Review

As the modern workplace increasingly adopts technology, that technology is being used to surveil workers in ways that can be highly invasive. Ostensibly, management uses surveillance to assess workers’ productivity, but it uses the same systems to, for example, map their interpersonal relationships, study their conversations, collect data on their health, track where they travel on and off the job, as well as monitor and manipulate their emotional responses. Many of these overreaches are justified in the name of enterprise control. That justification should worry us. This Article aims to make us think about how surveillance is being used as …


Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan Jan 2020

Bad Actors: Authenticity, Inauthenticity, Speech, And Capitalism, Sarah C. Haan

Scholarly Articles

“Authenticity” has evolved into an important value that guides social media companies’ regulation of online speech. It is enforced through rules and practices that include real-name policies, Terms of Service requiring users to present only accurate information about themselves, community guidelines that prohibit “coordinated inauthentic behavior,” verification practices, product features, and more.

This Article critically examines authenticity regulation by the social media industry, including companies’ claims that authenticity is a moral virtue, an expressive value, and a pragmatic necessity for online communication. It explains how authenticity regulation provides economic value to companies engaged in “information capitalism,” “data capitalism,” and “surveillance …


42nd Annual Foulston-Siefkin Lecture: The Next Wave Of Fourth Amendment Challenges After Carpenter, Matthew Tokson Jan 2020

42nd Annual Foulston-Siefkin Lecture: The Next Wave Of Fourth Amendment Challenges After Carpenter, Matthew Tokson

Utah Law Faculty Scholarship

This is an edited and adapted version of the 42nd Annual Foulston Siefkin Lecture, delivered at Washburn University School of Law.

The lecture discusses the future of Fourth Amendment law following the Supreme Court’s enormously important decision in Carpenter v. United States. It analyzes Carpenter and argues that its detailed account of the privacy harms caused by government surveillance will be its most important legacy. Moreover, the Court’s emphasis on the risk of privacy harm is not a one-off or a sharp break from previous practice. Carpenter is consistent with a long line of Supreme Court decisions ignoring or reshaping …


My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack Jan 2020

My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack

Mitchell Hamline Law Review

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Tracing Biometric Assemblages In India’S Surveillance State: Reproducing Colonial Logics, Reifying Caste Purity, And Quelling Dissent Through Aadhaar, Priya Prabhakar Jan 2020

Tracing Biometric Assemblages In India’S Surveillance State: Reproducing Colonial Logics, Reifying Caste Purity, And Quelling Dissent Through Aadhaar, Priya Prabhakar

Scripps Senior Theses

Tracing Biometric Assemblages in India’s Surveillance State seeks to understand the historical conditions that rendered the nation-state of India as having the world’s largest biometric surveillance system: Aadhaar. Surveillance practices used by the British Raj mirrors the current social order of the ruling Bharatiya Janata Party (BJP), as they use surveillance to similar ends in today’s political economy, through the intersecting forces of neoliberalism and ethnonationalism. This thesis is an exploration into how India’s current surveillance regimes cultivate biometric surveillant assemblages through Aadhaar. Contrary to claims that Aadhaar was created to empower the poor, I argue that these surveillance regimes …


The Ethics Of Dna Testing At The Border, Medha D. Makhlouf Jan 2020

The Ethics Of Dna Testing At The Border, Medha D. Makhlouf

Faculty Scholarly Works

From 2018 to 2020, the U.S. government dramatically expanded DNA surveillance of immigrants. The most recent expansion, finalized in March 2020, effectively requires the collection of DNA from all immigration detainees and storage of their genetic information in the Federal Bureau of Investigation’s (“FBI”) Combined DNA Index System (“CODIS”) database for criminal forensic investigation. This new policy is ethically troubling because it fails to address the potential privacy harms it creates; shifts the application of DNA analysis for criminal investigation from retrospective to prospective assessment of criminality; and disparately impacts racial and ethnic minorities. In this time of extreme immigration …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


Transparency After Carpenter, Hannah Bloch-Wehba Jan 2020

Transparency After Carpenter, Hannah Bloch-Wehba

Faculty Scholarship

This brief invited response to Professor Matthew Tokson’s Foulston-Siefkin lecture on the Supreme Court's decision in Carpenter v. United States makes two contributions. First, I highlight the social, political, and economic factors at play in the Carpenter decision. The Carpenter Court recognized, in particular, that digital surveillance implicates the rights of more than just criminal suspects: it poses unique and unappreciated threats to public governance of policing. The decision, I argue, reflects longstanding preoccupations in Fourth Amendment decisions with protecting the “public” — particularly innocent third parties — from intrusive and baseless investigations. In so doing, I situate Professor Tokson’s …


Data Battles, Platform Shutdowns, And Digital Rights In Surveillance: Labor Politics In The Online Sex Industry, Winifred R. Poster Jan 2020

Data Battles, Platform Shutdowns, And Digital Rights In Surveillance: Labor Politics In The Online Sex Industry, Winifred R. Poster

Saint Louis University Law Journal

Sex workers are often portrayed as groups with little authority over their jobs. But lately they are making much use of online spaces, both large scale public-facing platforms and their own smaller websites. Taking a deeper ethnographic look into their online activities, I recount a story of highly adept, technologically proficient, and expert digital navigation by sex workers online.

The analysis follows the trajectory of platforms in the online sex industry over the last two decades. First it charts the rise of platforms for matching, reviewing, and identity verification, many of which developed roughly around the 2000s, and their impact …


Sentenced To Surveillance: Fourth Amendment Limits On Electronic Monitoring, Kate Weisburd Jan 2020

Sentenced To Surveillance: Fourth Amendment Limits On Electronic Monitoring, Kate Weisburd

GW Law Faculty Publications & Other Works

As courts and legislatures increasingly recognize that “digital is different” and attempt to limit government surveillance of private data, one group is conspicuously excluded from this new privacy-protective discourse: the five million people in the United States on probation, parole, or other forms of community supervision. This Article is the first to explore how warrantless electronic surveillance is dramatically transforming community supervision and, as a result, amplifying a growing privacy-protection disparity: those in the criminal legal system are increasingly losing privacy protections even while those not in the system are increasingly gaining privacy protections. The quickly expanding use of GPS-equipped …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …