Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Series

Institution
Keyword
Publication Year
Publication

Articles 31 - 57 of 57

Full-Text Articles in Privacy Law

The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies Jul 2014

The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Of Relevance And Reform Under Section 215, Peter Margulies Feb 2014

Of Relevance And Reform Under Section 215, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies Jan 2014

Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney Jan 2014

Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …


Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Supra Synopses, Ryan W. Dumm, Laura Turczanski Jan 2013

Supra Synopses, Ryan W. Dumm, Laura Turczanski

Seattle University Law Review SUpra

No abstract provided.


Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba Jan 2013

Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba

Faculty Scholarship

Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …


Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Protecting Information Privacy, Charles D. Raab, Benjamin J. Goold Jan 2011

Protecting Information Privacy, Charles D. Raab, Benjamin J. Goold

All Faculty Publications

This report for the Equality and Human Rights Commission (the Commission) examines the threats to information privacy that have emerged in recent years, focusing on the activities of the state. It argues that current privacy laws and regulation do not adequately uphold human rights, and that fundamental reform is required. It identifies two principal areas of concern: the state’s handling of personal data, and the use of surveillance by public bodies. The central finding of this report is that the existing approach to the protection of information privacy in the UK is fundamentally flawed, and that there is a pressing …


How Much Surveillance Is Too Much? Some Thoughts On Surveillance, Democracy, And The Political Value Of Privacy, Benjamin J. Goold Jan 2010

How Much Surveillance Is Too Much? Some Thoughts On Surveillance, Democracy, And The Political Value Of Privacy, Benjamin J. Goold

All Faculty Publications

Over the past decade it has become increasingly common to speak of the emergence of a surveillance society. Surveillance is an almost inescapable part of 21st century life. There is a very real danger that individual privacy - as it is currently understood - may soon become a thing of the past. Some would argue privacy is already dead and we have no choice but to accept our newly transparent lives. For many, surveillance has become part of daily life during visit banks, stores, shopping malls, and many public streets and parks. Travel through airports subjects our bodies to physical …


Surveillance And The Political Value Of Privacy, Benjamin J. Goold Jan 2009

Surveillance And The Political Value Of Privacy, Benjamin J. Goold

All Faculty Publications

The steady expansion in the use of surveillance technologies by the state and private sector represents a substantial threat to the privacy of ordinary individuals. Yet despite the best efforts of civil libertarians, many members of the public still struggle to understand why privacy is valuable and deserves to be protected as a basic right. In part, this is a result of the inherent complexity of the idea of privacy, but it is also due a tendency on the part of privacy advocates to focus on the individual - as opposed to the social and political dimensions - of privacy. …


Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab Jan 2009

Putting Surveillance On The Political Agenda – A Short Defence Of Surveillance: Citizens And The State, Benjamin J. Goold, Charles D. Raab

All Faculty Publications

In February 2009 the House of Lords Constitutional Committee in the United Kingdom published the report Surveillance: Citizens and the State. Some have hailed this as a landmark document. Volume 6(3) of Surveillance & Society published 4 invited responses to this report written by prominent scholars. In the attached paper the two Specialist Advisers to this Committee set the context for the report and provide a brief rejoinder to the four responses. NOTE: The authors write in their academic and personal capacities, and not as representatives of the Committee.


Le Développement De L’Évaluation De La Menace De La Criminalité Organisée Et L’Architecure De Sécurité Intérieure (Development Of The Organised Crime Threat Assessment (Octa) And Internal Security Architecture), Benjamin J. Goold Jan 2009

Le Développement De L’Évaluation De La Menace De La Criminalité Organisée Et L’Architecure De Sécurité Intérieure (Development Of The Organised Crime Threat Assessment (Octa) And Internal Security Architecture), Benjamin J. Goold

All Faculty Publications

Cette note propose une vue d’ensemble de l’approche européenne des questions de sécurité, de lutte contre le terrorisme et contre la criminalité organisée. Elle aborde plus particulièrement le rôle de la Stratégie européenne de sécurité (SES) dans l’élaboration des politiques et des dispositions institutionnelles, ainsi que l’influence de l’OCTA (Évaluation de la menace de la criminalité organisée). cette note recommande qu’un certain nombre de mesures soient prises pour recentrer et rationaliser les structures existantes attachées aux questions de sécurité et de lutte contre le terrorisme et le crime organisé. Le nombre d’agences directement ou indirectement impliquées dans le recueil d’informations, …


The Chains Of The Constitution And Legal Process In The Library: A Post-Usa Patriot Reauthorization Act Assessment, Susan Nevelow Mart Jan 2008

The Chains Of The Constitution And Legal Process In The Library: A Post-Usa Patriot Reauthorization Act Assessment, Susan Nevelow Mart

Publications

Since the Patriot Act was passed in 2001, controversy has raged over nearly every provision. The controversy has been particularly intense over provisions that affect the patrons of libraries. This article follows those Patriot Act provisions that affect libraries, and reviews how they have been interpreted, how the Patriot Reauthorization Acts have changed them, and what government audits and court affidavits reveal about the use and misuse of the Patriot Act. The efforts of librarians and others opposed to the Patriot Act have had an effect, both legislatively and judicially, in changing and challenging the Patriot Act. Because libraries are …


Book Review, Susan Nevelow Mart Jan 2008

Book Review, Susan Nevelow Mart

Publications

No abstract provided.


Privacy, Identity And Security, Benjamin J. Goold Jan 2007

Privacy, Identity And Security, Benjamin J. Goold

All Faculty Publications

This paper examines the relationship between security, surveillance, privacy and identity, both in the context of legislation such as the Anti-terrorism Act and the PATRIOT Act, and also in the light of ongoing changes in how that personal information is gathered, processed and used. It is argued that prevailing notions of privacy — and the legal frameworks that aim to protect privacy interests — are ill-suited to defending individuals from an increasingly sophisticated array of surveillance and data processing techniques, which enable information to be acquired and shared at almost zero-cost and which threaten to establish the ‘categorical identity’ as …


Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney Jan 2007

Public Protection, Proportionality, And The Search For Balance, Benjamin J. Goold, Liora Lazarus, Gabriel Swiney

All Faculty Publications

This report examines how courts in the UK and Europe respond when human rights and security appear to conflict. It compares cases from the United Kingdom, France, Germany, Spain, and the European Court of Human Rights (ECtHR). It examines how rights are applied and how courts use the concept of proportionality to mediate conflicts between rights and security. The report concludes that British courts are less consistent in their application of proportionality than countries with constitutional rights protections which tend to be more rigorous in their protections of rights than are countries, like the UK, that rely instead on the …


Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart Jan 2004

Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart

Publications

Library patrons are worried about the government looking over their shoulder while they read and surf the Internet. Because of the broad provisions of the USA PATRIOT Act, the lack of judicial and legislative oversight, the potential for content overcollection, and the ease with which applications for pen register, section 215 orders, or national security letters can be obtained, these fears cannot be dismissed.


Public Area Surveillance And Police Work: The Impact Of Cctv On Police Behaviour And Autonomy, Benjamin J. Goold Jan 2003

Public Area Surveillance And Police Work: The Impact Of Cctv On Police Behaviour And Autonomy, Benjamin J. Goold

All Faculty Publications

Drawing on a recent study of the impact of closed circuit television (CCTV) cameras on policing practices in a large English police force, this paper considers whether the presence of surveillance cameras affects the working attitudes and behaviour of individual police officers. In particular, this paper asks whether CCTV makes the police more accountable or more cautious in the exercise of their discretion in public spaces. Although noting that in certain circumstances CCTV may inadvertently help to reduce incidences of police misconduct, this paper concludes by arguing that more needs to be done to prevent the police from interfering with …


Cultural Diversity And The Police In The United States: Understanding Problems And Finding Solutions, Benjamin J. Goold, Karyn Hadfield Jan 2002

Cultural Diversity And The Police In The United States: Understanding Problems And Finding Solutions, Benjamin J. Goold, Karyn Hadfield

All Faculty Publications

For over 150 years, there has been a history of tension and conflict between the police and minority communities in the United States. In principle, the police exist to enforce the law and protect all citizens regardless of race or ethnic background, yet police departments across the country have been repeatedly accused of targeting and harassing racial minorities, and of failing to root out racist attitudes and practices within their ranks. Recent, high profile cases of beatings by police have only served to heighten concerns over the mistreatment of minorities by the police, resulting in widespread calls for major legal …


Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza Jan 2002

Privacy And The Post-September 11 Immigration Detainees: The Wrong Way To A Right (And Other Wrongs), Sadiq Reza

Articles & Chapters

No abstract provided.


Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr. Oct 1983

Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.

Supreme Court Case Files

No abstract provided.