Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Fourth Amendment (7)
- Privacy (7)
- Search (3)
- Technology (3)
- Big Data (2)
-
- Big data (2)
- Internet (2)
- Katz v. United States (2)
- Law (2)
- Police (2)
- Search warrants (2)
- Stored Communications Act (2)
- Surveillance (2)
- United States Supreme Court (2)
- Actions without notice (1)
- Algorithms (1)
- Analytics (1)
- Automobiles (1)
- Avatars (1)
- Biographic data (1)
- Biometric data (1)
- Black box (1)
- Cell phones (1)
- Cell site location information (1)
- Cloud Computing (1)
- Cognitive freedom (1)
- Crime prevention (1)
- Criminal law (1)
- Criminal procedure (1)
- Cybersecurity (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Science and Technology Law
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Dna Storage Banks: The Importance Of Preserving Dna Evidence To Allow For Transparency And The Preservation Of Justice, Cristina Martin
Dna Storage Banks: The Importance Of Preserving Dna Evidence To Allow For Transparency And The Preservation Of Justice, Cristina Martin
Chicago-Kent Law Review
What is the duty to preserve information in today’s society? In order for humanity to evolve, change and flourish in the future, society needs to preserve its information from the past. In the criminal justice field, preservation of evidence has special significance. DNA evidence in particular has become a helpful aid for innocent defendants who have been improperly imprisoned. Over the past twenty years, the number of exonerations of imprisoned criminal defendants has increased dramatically. With the advancement of technology, old, previously untestable or improperly tested DNA evidence will need to be retested. However, most states do not have proper …
How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton
How Privacy Killed Katz: A Tale Of Cognitive Freedom And The Property Of Personhood As Fourth Amendment Norm, Christian M. Halliburton
Akron Law Review
With each passing day, new technologies push the horizons of official government investigative and surveillance activity deeper and deeper into the mind and consciousness of the surveilled subject. While law enforcement agencies have always relied on observing the behavior and activity of suspicious targets, and there has been little judicial ink spent preserving the confidentiality of such observable activity, the law has been slow to respond to rapid increases in the capacity or scope of official observation that the advance of technologically sophisticated surveillance techniques helped facilitate. The sampling of techniques at the center of this Article allow the operators …
Carpe Diem: Privacy Protection In Employment Act, Ariana R. Levinson
Carpe Diem: Privacy Protection In Employment Act, Ariana R. Levinson
Akron Law Review
What these employees have in common is that their employers technologically monitored them, invading their privacy, yet their lawsuits were dismissed.6 Indeed, scholars generally agree that the law in the United States fails to adequately protect private sector employees from technological monitoring by their employers.7 This article proposes a solution: federal legislation intended to permit private sector employers to monitor their employees when necessary but to also provide their employees adequate privacy protection.8 Section II reviews the nature and extent of the problem of technological monitoring of employees by their employers. Section III surveys the laws and proposed legislation that …
Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan
Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan
Chicago-Kent Law Review
Event Data Recorders are receiving more attention as owners of automobiles have begun to realize that their driving histories are recorded. Event Data Recorders are the “black boxes” in automobiles that are installed in the vast majority of vehicles currently on the road. In the majority of states, the restrictions on what information can be retrieved from Event Data Recorders and used by police officers, advertising firms, and insurance companies remains a gray area. State laws governing Event Data Recorder technology greatly fluctuates by jurisdiction. If Event Data Recorder information falls into the wrong hands, the possession of the data …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
William & Mary Law Review
No abstract provided.
Aclu V. Clapper: The Fourth Amendment In The Digital Age, Erin E. Connare
Aclu V. Clapper: The Fourth Amendment In The Digital Age, Erin E. Connare
Buffalo Law Review
No abstract provided.
Leveraging Predictive Policing Algorithms To Restore Fourth Amendment Protections In High-Crime Areas In A Post-Wardlow World, Kelly K. Koss
Leveraging Predictive Policing Algorithms To Restore Fourth Amendment Protections In High-Crime Areas In A Post-Wardlow World, Kelly K. Koss
Chicago-Kent Law Review
Rapid technological changes have led to an explosion in Big Data collection and analysis through complex computerized algorithms. Law enforcement has not been immune to these technological developments. Many local police departments are now using highly advanced predictive policing technologies to predict when and where crime will occur in their communities, and to allocate crime-fighting resources based on these predictions.
Although predictive policing technology has an array of the potential uses, the scope of this Note is limited to addressing how the statistical outputs from these technologies can be used to restore eroded Fourth Amendment rights in alleged high-crime areas. …
Big Data And Predictive Reasonable Suspicion, Andrew Ferguson
Big Data And Predictive Reasonable Suspicion, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
Michigan Telecommunications & Technology Law Review
In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Publications
A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Stephen E Henderson
The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Lori B. Andrews