Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 33

Full-Text Articles in National Security Law

Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary Jan 2022

Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary

Seattle Journal of Technology, Environmental & Innovation Law

The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?

Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …


Learning From The Past: Using Korematsu And Other Japanese Internment Cases To Provide Protections Against Immigration Detentions, Caleb Ward Mar 2021

Learning From The Past: Using Korematsu And Other Japanese Internment Cases To Provide Protections Against Immigration Detentions, Caleb Ward

Arkansas Law Review

One of the darkest periods in modern United States history is reoccurring with mixed public approval. During World War II, the United States government enacted executive orders creating a curfew, proscribing living areas, and forcing the exclusion and detention of all Japanese descendants from the West Coast. The United States justified these grievous freedom and equality violations through an increased need for national security “because we [were] at war with [Japan].” However, this perceived increased need for national security came from a fraudulent assessment showing any Japanese-American could be planning espionage or sabotage of the United States. After the war, …


Recent Developments, Peyton Hildebrand Aug 2020

Recent Developments, Peyton Hildebrand

Arkansas Law Review

In a 5-4 opinion, the United States Supreme Court once again denied a Bivens action. This case involved a tragic crossborder shooting by a border patrol agent standing on United States soil, who shot and killed a young boy standing on Mexican soil. Petitioners, the boy’s parents, sought relief under Biven2, arguing the agent’s action violated the Constitution. However, the Court determined the cross-border shooting was a new Bivens context, which required an analysis of whether any special factors “counseled hesitation” for the cause of action to be extended. The Court concluded Bivens was inappropriate because several factors “counseled hesitation”—namely, …


Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl May 2020

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl

Catholic University Law Review

Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.

This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque Mar 2017

Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque

University of Richmond Law Review

No abstract provided.


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams Mar 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams

University of Richmond Law Review

No abstract provided.


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn Jan 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


Madison At Fort Meade: Checks, Balances, And The Nsa, Peter Margulies May 2016

Madison At Fort Meade: Checks, Balances, And The Nsa, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick Jan 2015

Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick

Indiana Law Journal

No abstract provided.


Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney Jan 2015

Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney

Articles by Maurer Faculty

Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Circumventing The Constitution For National Security: An Analysis Of The Evolution Of The Foreign Intelligence Exception To The Fourth Amendment’S Warrant Requirement, Sarah Fowler Apr 2014

Circumventing The Constitution For National Security: An Analysis Of The Evolution Of The Foreign Intelligence Exception To The Fourth Amendment’S Warrant Requirement, Sarah Fowler

University of Miami National Security & Armed Conflict Law Review

Though few are even aware of its existence, the foreign intelligence exception to the Fourth Amendment’s warrant requirement affects the lives of nearly every American. Recent leaks of top-­‐secret National Security Administration documents depict how the government has morphed the exception into a massive catch all that allows intelligence agencies to perform invasive searches without a warrant and in complete disregard of the Constitution. The foreign intelligence exception began as a narrow tool to shield sensitive national security investigations, but its application has reached an alarming breadth.

This note explores the creation and expansion of the foreign intelligence exception, tracing …


The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa Jan 2014

The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa

Pepperdine Law Review

No abstract provided.


Whose Metadata Is It Anyways? Why Riley V. California Illustrates That The National Security Administration's Bulk Data Collection Is A Fourth Amendment Problem, Jesse S. Weinstein Jan 2014

Whose Metadata Is It Anyways? Why Riley V. California Illustrates That The National Security Administration's Bulk Data Collection Is A Fourth Amendment Problem, Jesse S. Weinstein

Jesse S Weinstein

No abstract provided.


Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean Jan 2014

Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean

Adam Lamparello

The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …


Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher Baldwin, Robert Shaw Jul 2013

Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher Baldwin, Robert Shaw

Fletcher N. Baldwin

The article discusses the constitutionality of warrantless wiretapping surveillance by the National Security Agency (NSA) on U.S. citizens. The wiretapping program existed weeks after the September 11, 2001 attacks, on the justification that Congress authorized the president to wiretap U.S. citizens without a warrant, and that the president had inherent authority as commander-in-chief. But it is argued that Congress did not expressly authorize the president to conduct warrantless wiretapping and that he does not have such inherent authority.

We intend this Article to be a commentary on the constitutionality of the NSA wiretapping program solely as it relates to the …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jul 2013

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

Fletcher N. Baldwin

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D. Jun 2013

The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.

Michael I Niman Ph.D.

It reads like a political thriller. An NSA spook, Edward Snowden, meets his conscience, blows the whistle on a massive secret attack on the Fourth Amendment, and is pursued globally by an obsessed president. Spice things up with a bit of character development cross-pollinated with a history lesson. First there’s Darth President. His administration has earned the distinction of invoking the Espionage Act of 1917 (a constitutionally questionable World War One relic) more than all other presidents in the previous 96 years combined—by a factor of two. The Obama administration has charged eight people under the act. All previous administrations …


The Fourth Amendment's National Security Exception: Its History And Limits, L. Rush Atkinson Jan 2013

The Fourth Amendment's National Security Exception: Its History And Limits, L. Rush Atkinson

L. Rush Atkinson

Each year, federal agents conduct thousands of “national security investigations” into suspected spies, terrorists, and other foreign threats. The constitutional limits imposed by the Fourth Amendment, however, remain murky, and the extent to which national security justifies deviations from the Amendment’s traditional rules is unclear. With little judicial precedent on point, the gloss of past executive practice has become an important means for gauging the boundaries of today’s national security practices. Accounts of past executive practice, however, have thus far been historically incomplete, leading to distorted analyses of its precedential significance. Dating back to World War II, national security investigations …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron

David C. Gray

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


Revisiting "Special Needs" Theory Via Airport Searches, Alexander A. Reinert Jul 2012

Revisiting "Special Needs" Theory Via Airport Searches, Alexander A. Reinert

Articles

Controversy has raged since the Transportation Security Administration (TSA) introduced Advanced Imaging Technology, capable of producing detailed images of travelers' bodies, and "enhanced" pat frisks as part of everyday airport travel. In the face of challenges in the courts and in public discourse, the TSA has justified the heightened security measures as a necessary means to prevent terrorist attacks. The purpose of this Essay is to situate the Fourth Amendment implications of the new regime within a broader historical context. Most germane, after the Federal Aviation Administration (FAA) introduced sweeping new screening of air travelers in the 1960s and 1970s …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

UF Law Faculty Publications

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …