Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

2015

Institution
Keyword
Publication
Publication Type

Articles 1 - 17 of 17

Full-Text Articles in Science and Technology Law

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Dna Storage Banks: The Importance Of Preserving Dna Evidence To Allow For Transparency And The Preservation Of Justice, Cristina Martin Jul 2015

Dna Storage Banks: The Importance Of Preserving Dna Evidence To Allow For Transparency And The Preservation Of Justice, Cristina Martin

Chicago-Kent Law Review

What is the duty to preserve information in today’s society? In order for humanity to evolve, change and flourish in the future, society needs to preserve its information from the past. In the criminal justice field, preservation of evidence has special significance. DNA evidence in particular has become a helpful aid for innocent defendants who have been improperly imprisoned. Over the past twenty years, the number of exonerations of imprisoned criminal defendants has increased dramatically. With the advancement of technology, old, previously untestable or improperly tested DNA evidence will need to be retested. However, most states do not have proper …


How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton Jun 2015

How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton

Akron Law Review

With each passing day, new technologies push the horizons of official government investigative and surveillance activity deeper and deeper into the mind and consciousness of the surveilled subject. While law enforcement agencies have always relied on observing the behavior and activity of suspicious targets, and there has been little judicial ink spent preserving the confidentiality of such observable activity, the law has been slow to respond to rapid increases in the capacity or scope of official observation that the advance of technologically sophisticated surveillance techniques helped facilitate. The sampling of techniques at the center of this Article allow the operators …


Carpe Diem: Privacy Protection In Employment Act, Ariana R. Levinson Jun 2015

Carpe Diem: Privacy Protection In Employment Act, Ariana R. Levinson

Akron Law Review

What these employees have in common is that their employers technologically monitored them, invading their privacy, yet their lawsuits were dismissed.6 Indeed, scholars generally agree that the law in the United States fails to adequately protect private sector employees from technological monitoring by their employers.7 This article proposes a solution: federal legislation intended to permit private sector employers to monitor their employees when necessary but to also provide their employees adequate privacy protection.8 Section II reviews the nature and extent of the problem of technological monitoring of employees by their employers. Section III surveys the laws and proposed legislation that …


Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan Jun 2015

Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan

Chicago-Kent Law Review

Event Data Recorders are receiving more attention as owners of automobiles have begun to realize that their driving histories are recorded. Event Data Recorders are the “black boxes” in automobiles that are installed in the vast majority of vehicles currently on the road. In the majority of states, the restrictions on what information can be retrieved from Event Data Recorders and used by police officers, advertising firms, and insurance companies remains a gray area. State laws governing Event Data Recorder technology greatly fluctuates by jurisdiction. If Event Data Recorder information falls into the wrong hands, the possession of the data …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold May 2015

Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold

William & Mary Law Review

No abstract provided.


Aclu V. Clapper: The Fourth Amendment In The Digital Age, Erin E. Connare Apr 2015

Aclu V. Clapper: The Fourth Amendment In The Digital Age, Erin E. Connare

Buffalo Law Review

No abstract provided.


Leveraging Predictive Policing Algorithms To Restore Fourth Amendment Protections In High-Crime Areas In A Post-Wardlow World, Kelly K. Koss Jan 2015

Leveraging Predictive Policing Algorithms To Restore Fourth Amendment Protections In High-Crime Areas In A Post-Wardlow World, Kelly K. Koss

Chicago-Kent Law Review

Rapid technological changes have led to an explosion in Big Data collection and analysis through complex computerized algorithms. Law enforcement has not been immune to these technological developments. Many local police departments are now using highly advanced predictive policing technologies to predict when and where crime will occur in their communities, and to allocate crime-fighting resources based on these predictions.

Although predictive policing technology has an array of the potential uses, the scope of this Note is limited to addressing how the statistical outputs from these technologies can be used to restore eroded Fourth Amendment rights in alleged high-crime areas. …


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …


No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley Dec 2014

Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley

Stephen E Henderson

The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …


Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews Dec 2014

Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews

Lori B. Andrews

A comprehensive report concerning the many ways that webcams can be used against those who possess them. Digital Peepholes also provides in depth legal analysis of the legality of private companies and the government using people’s webcams to spy on them. A must read for anyone concerned with privacy or anyone with a webcam built in to their devices!