Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in National Security Law
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.