Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in National Security Law

Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn Jan 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


Madison At Fort Meade: Checks, Balances, And The Nsa, Peter Margulies May 2016

Madison At Fort Meade: Checks, Balances, And The Nsa, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney Jan 2015

Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney

Articles by Maurer Faculty

Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Revisiting "Special Needs" Theory Via Airport Searches, Alexander A. Reinert Jul 2012

Revisiting "Special Needs" Theory Via Airport Searches, Alexander A. Reinert

Articles

Controversy has raged since the Transportation Security Administration (TSA) introduced Advanced Imaging Technology, capable of producing detailed images of travelers' bodies, and "enhanced" pat frisks as part of everyday airport travel. In the face of challenges in the courts and in public discourse, the TSA has justified the heightened security measures as a necessary means to prevent terrorist attacks. The purpose of this Essay is to situate the Fourth Amendment implications of the new regime within a broader historical context. Most germane, after the Federal Aviation Administration (FAA) introduced sweeping new screening of air travelers in the 1960s and 1970s …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

UF Law Faculty Publications

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher N. Baldwin Jr., Robert B. Shaw Jan 2006

Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher N. Baldwin Jr., Robert B. Shaw

UF Law Faculty Publications

The article discusses the constitutionality of warrantless wiretapping surveillance by the National Security Agency (NSA) on U.S. citizens. The wiretapping program existed weeks after the September 11, 2001 attacks, on the justification that Congress authorized the president to wiretap U.S. citizens without a warrant, and that the president had inherent authority as commander-in-chief. But it is argued that Congress did not expressly authorize the president to conduct warrantless wiretapping and that he does not have such inherent authority.

We intend this Article to be a commentary on the constitutionality of the NSA wiretapping program solely as it relates to the …


Indefinite Material Witness Detention Without Probable Cause: Thinking Outside The Fourth Amendment, Michael Greenberger Nov 2004

Indefinite Material Witness Detention Without Probable Cause: Thinking Outside The Fourth Amendment, Michael Greenberger

Faculty Scholarship

A constitutional issue recently addressed by the United States Court of Appeals for the Second Circuit in United States v. Awadallah, 349 F.3d 42 (2003), has not received the widespread attention of high-profile litigation concerning the Justice Department's other controversial counter-terrorism policies. It is equally important. The issue arises out of Attorney General Ashcroft's announcement shortly after the terrorist attacks of September 11, 2001 that the aggressive detention of material witnesses [was] vital to preventing, disrupting or delaying new attacks. Since that time, the Department of Justice has used the federal material witness statute (18 U.S.C. Section 3144) to …