Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

Surveillance

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 40

Full-Text Articles in Law

Resisting Face Surveillance With Copyright Law, Amanda Levendowski May 2022

Resisting Face Surveillance With Copyright Law, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …


Debunking The Myth That Police Body Cams Are Civil Rights Tool, Scott Skinner-Thompson Jan 2022

Debunking The Myth That Police Body Cams Are Civil Rights Tool, Scott Skinner-Thompson

Publications

No abstract provided.


Criminal Justice Secrets, Meghan J. Ryan Jan 2022

Criminal Justice Secrets, Meghan J. Ryan

Faculty Journal Articles and Book Chapters

The American criminal justice system is cloaked in secrecy. The government employs covert surveillance operations. Grand-jury proceedings are hidden from public view. Prosecutors engage in closed-door plea-bargaining and bury exculpatory evidence. Juries convict defendants on secret evidence. Jury deliberations are a black box. And jails and prisons implement clandestine punishment practices. Although there are some justifications for this secrecy, the ubiquitous nature of it is contrary to this nation’s Founders’ steadfast belief in the transparency of criminal justice proceedings. Further, the pervasiveness of secrecy within today’s criminal justice system raises serious constitutional concerns. The accumulation of secrecy and the aggregation …


Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov Feb 2021

Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov

ProAcademy

The rapid growth of information technologies naturally determines the interest of researchers in them from various fields of science. Law, including criminal law, is no exception. Currently: a separate branch of law is being formed - information law. Despite this, until now in science unified approaches to the analysis of information and legal phenomena have not been developed. The article analyzes the formation and development of prosecutorial supervision over the execution of laws in the investigation of crimes in the field of information technology, and also studied the process of the emergence of information technology as a type of crime …


Surveillance And The Tyrant Test, Andrew Guthrie Ferguson Jan 2021

Surveillance And The Tyrant Test, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

How should society respond to police surveillance technologies? This question has been at the center of national debates around facial recog- nition, predictive policing, and digital tracking technologies. It is a debate that has divided activists, law enforcement officials, and academ- ics and will be a central question for years to come as police surveillance technology grows in scale and scope. Do you trust police to use the tech- nology without regulation? Do you ban surveillance technology as a manifestation of discriminatory carceral power that cannot be reformed? Can you regulate police surveillance with a combination of technocratic rules, policies, …


Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon Apr 2020

Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon

Washington and Lee Law Review

This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …


My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack Jan 2020

My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack

Mitchell Hamline Law Review

No abstract provided.


Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones May 2019

Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones

Cleveland State Law Review

Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …


Constraint And Control, Patricia Ayres Feb 2019

Constraint And Control, Patricia Ayres

Theses and Dissertations

I have long considered themes of the body. Drawing on my knowledge as a fashion designer, I bring materials and hardware from the fashion industry into my artwork transforming and rendering them non-functional. My sculptures relate to stories of isolation, separation, and confinement. The following pages will analyze how the United States penal system controls, constrains and restricts the body through physical and psychological wounds. Furthermore, they will examine how the Catholic Church controls people’s minds and behavior through a ritualistic belief system.


Psychosocial Analysis Of An Ethnography At The Cuyahoga County Public Defenders Office, Ernest M. Oleksy Dec 2018

Psychosocial Analysis Of An Ethnography At The Cuyahoga County Public Defenders Office, Ernest M. Oleksy

The Downtown Review

Too often, social science majors become jaded with their field of study due to a misperception of the nature of many potential jobs which they are qualified for. Such discord is prevalent amongst undergraduates who strive for work in the criminal justice system. Hollywood misrepresentations become the archetypes of the aforementioned field, leaving out the necessity and ubiquity of accompanying desk work. Still other social science majors struggle to identify theoretical interpretations in praxis.


Smart Devices In Criminal Investigations: How Section 8 Of The Canadian Charter Of Rights And Freedoms Can Better Protect Privacy In The Search Of Technology And Seizure Of Information, Lee-Ann Conrod Oct 2018

Smart Devices In Criminal Investigations: How Section 8 Of The Canadian Charter Of Rights And Freedoms Can Better Protect Privacy In The Search Of Technology And Seizure Of Information, Lee-Ann Conrod

LLM Theses

This thesis examines the jurisprudence from the Supreme Court of Canada (SCC) on informational privacy under section 8 of the Canadian Charter of Rights and Freedoms as it relates to searches of technology in the context of criminal investigations. The development and use of technology in criminal investigations will be detailed along with an overview of the current state of the law in this area. Challenges with the interpretation of section 8 demonstrate a prevalent uncertainty. This thesis proposes a new approach for the SCC to apply to cases where technology intersects with section 8 of the Charter. The proposal …


The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic Jan 2018

The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic

Journal of Criminal Law and Criminology

If Big Brother made movies, persistent aerial surveillance would be its masterpiece. Small airplanes are rigged with high-tech cameras that can continuously transmit real-time images to the ground. The aircraft is able to monitor an area of thirty square miles for ten hours at a time. This technology allows video analysts to zoom in and track the location of vehicles, and even people. It was originally designed for military use during the Iraq War, but since then, it has been adapted for civilian applications. In 2016, the Baltimore Police Department contracted with Persistent Surveillance Systems to carry out a trial …


Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu Jan 2018

Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu

Scholarly Articles

To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …


Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf Jan 2018

Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf

Scholarly Works

This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?

The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law Oct 2015

Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening Jan 2014

Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening

Eric J Struening

Leaks have revealed that the use of personal technology such as cell phones and e-mail plays a large part in how the government obtains national security information. However, it is still an open question of how far the protection of the Fourth Amendment provides an individual against government intrusion in that type of technology. This article examines how the Fourth Amendment applies to the real-time tracking of national security targets through technology. I argue that a non-physical, short-term, warrantless, real-time trace of an individual’s location for national security purposes will not infringe the prohibition against unreasonable searches and seizures. As …


Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer Jan 2014

Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer

David Barnhizer

None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer Mar 2013

The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer

Shaun Spencer

This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …


The Poverty Defense, Michele Estrin Gilman Jan 2013

The Poverty Defense, Michele Estrin Gilman

University of Richmond Law Review

No abstract provided.


Growing Up Policed In The Age Of Aggressive Policing Policies, Brett G. Stoudt, Michelle Fine, Madeline Fox Jan 2012

Growing Up Policed In The Age Of Aggressive Policing Policies, Brett G. Stoudt, Michelle Fine, Madeline Fox

NYLS Law Review

No abstract provided.


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Can We Find And Stop The "Jihad Janes"?, Diane Webber Jan 2011

Can We Find And Stop The "Jihad Janes"?, Diane Webber

Diane Webber

Two female American citizens, Colleen LaRose, a.k.a. “Jihad Jane” and Jamie Paulin-Ramirez, whose appearance and passports allow them to blend into Western society, currently represent “one of the worst fears” of intelligence and FBI analysts who work to identify terrorist threats. On both sides of the Atlantic, similar problems exist of homegrown terrorism and radicalization, and the internet has a huge impact on these issues. This paper examines the tools available to the U.S. and the U.K. to find and stop potential homegrown terrorists from perpetrating catastrophic acts of terror. After assessing the differences between U.S. and U.K. law, I …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins

University of Richmond Law Review

In this essay, I contend that when evaluating the constitutionality of enhanced surveillance devices, the existing test for assessing the occurrence of a Fourth Amendment search should be modified. Specifically, I suggest that intrusiveness should be unambiguously adopted by the Court as the benchmark for assessing and defining the existence of a search under the Fourth Amendment. Moreover, intrusiveness should be clearly defined to require an examination of two factors: the functionality of a challenged form of surveillance and the potential for disclosure created by the device.