Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (6)
- Cleveland State University (3)
- Georgetown University Law Center (3)
- SelectedWorks (3)
- Washington and Lee University School of Law (3)
-
- University of Michigan Law School (2)
- University of Richmond (2)
- University of Tulsa College of Law (2)
- American University Washington College of Law (1)
- Boston University School of Law (1)
- City University of New York (CUNY) (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Mitchell Hamline School of Law (1)
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Notre Dame Law School (1)
- Roger Williams University (1)
- Schulich School of Law, Dalhousie University (1)
- Southern Methodist University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University at Buffalo School of Law (1)
- University of Colorado Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pittsburgh School of Law (1)
- Publication Year
- Publication
-
- Georgetown Law Faculty Publications and Other Works (3)
- Susan Freiwald (3)
- Articles, Chapters in Books and Other Contributions to Scholarly Works (2)
- Journal Articles (2)
- Michigan Law Review (2)
-
- Scholarly Articles (2)
- University of Richmond Law Review (2)
- Anil Kalhan (1)
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Cleveland State Law Review (1)
- David Barnhizer (1)
- Diane Webber (1)
- Eric J Struening (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty Scholarship (1)
- Journal of Criminal Law and Criminology (1)
- LLM Theses (1)
- Mitchell Hamline Law Review (1)
- NYLS Law Review (1)
- Patricia L. Bellia (1)
- ProAcademy (1)
- Publications (1)
- Scholarly Works (1)
- School of Law Conferences, Lectures & Events (1)
- Shaun Spencer (1)
- Teresa A. Miller (1)
- The Downtown Review (1)
- Theses and Dissertations (1)
- Touro Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 40
Full-Text Articles in Law
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …
Debunking The Myth That Police Body Cams Are Civil Rights Tool, Scott Skinner-Thompson
Debunking The Myth That Police Body Cams Are Civil Rights Tool, Scott Skinner-Thompson
Publications
No abstract provided.
Criminal Justice Secrets, Meghan J. Ryan
Criminal Justice Secrets, Meghan J. Ryan
Faculty Journal Articles and Book Chapters
The American criminal justice system is cloaked in secrecy. The government employs covert surveillance operations. Grand-jury proceedings are hidden from public view. Prosecutors engage in closed-door plea-bargaining and bury exculpatory evidence. Juries convict defendants on secret evidence. Jury deliberations are a black box. And jails and prisons implement clandestine punishment practices. Although there are some justifications for this secrecy, the ubiquitous nature of it is contrary to this nation’s Founders’ steadfast belief in the transparency of criminal justice proceedings. Further, the pervasiveness of secrecy within today’s criminal justice system raises serious constitutional concerns. The accumulation of secrecy and the aggregation …
Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov
Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov
ProAcademy
The rapid growth of information technologies naturally determines the interest of researchers in them from various fields of science. Law, including criminal law, is no exception. Currently: a separate branch of law is being formed - information law. Despite this, until now in science unified approaches to the analysis of information and legal phenomena have not been developed. The article analyzes the formation and development of prosecutorial supervision over the execution of laws in the investigation of crimes in the field of information technology, and also studied the process of the emergence of information technology as a type of crime …
Surveillance And The Tyrant Test, Andrew Guthrie Ferguson
Surveillance And The Tyrant Test, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
How should society respond to police surveillance technologies? This question has been at the center of national debates around facial recog- nition, predictive policing, and digital tracking technologies. It is a debate that has divided activists, law enforcement officials, and academ- ics and will be a central question for years to come as police surveillance technology grows in scale and scope. Do you trust police to use the tech- nology without regulation? Do you ban surveillance technology as a manifestation of discriminatory carceral power that cannot be reformed? Can you regulate police surveillance with a combination of technocratic rules, policies, …
Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon
Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon
Washington and Lee Law Review
This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …
My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack
My Brother's Keeper: Using The Intelligence Toolbox On Domestic Terrorism, Brandon Carmack
Mitchell Hamline Law Review
No abstract provided.
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cleveland State Law Review
Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …
Constraint And Control, Patricia Ayres
Constraint And Control, Patricia Ayres
Theses and Dissertations
I have long considered themes of the body. Drawing on my knowledge as a fashion designer, I bring materials and hardware from the fashion industry into my artwork transforming and rendering them non-functional. My sculptures relate to stories of isolation, separation, and confinement. The following pages will analyze how the United States penal system controls, constrains and restricts the body through physical and psychological wounds. Furthermore, they will examine how the Catholic Church controls people’s minds and behavior through a ritualistic belief system.
Psychosocial Analysis Of An Ethnography At The Cuyahoga County Public Defenders Office, Ernest M. Oleksy
Psychosocial Analysis Of An Ethnography At The Cuyahoga County Public Defenders Office, Ernest M. Oleksy
The Downtown Review
Too often, social science majors become jaded with their field of study due to a misperception of the nature of many potential jobs which they are qualified for. Such discord is prevalent amongst undergraduates who strive for work in the criminal justice system. Hollywood misrepresentations become the archetypes of the aforementioned field, leaving out the necessity and ubiquity of accompanying desk work. Still other social science majors struggle to identify theoretical interpretations in praxis.
Smart Devices In Criminal Investigations: How Section 8 Of The Canadian Charter Of Rights And Freedoms Can Better Protect Privacy In The Search Of Technology And Seizure Of Information, Lee-Ann Conrod
LLM Theses
This thesis examines the jurisprudence from the Supreme Court of Canada (SCC) on informational privacy under section 8 of the Canadian Charter of Rights and Freedoms as it relates to searches of technology in the context of criminal investigations. The development and use of technology in criminal investigations will be detailed along with an overview of the current state of the law in this area. Challenges with the interpretation of section 8 demonstrate a prevalent uncertainty. This thesis proposes a new approach for the SCC to apply to cases where technology intersects with section 8 of the Charter. The proposal …
The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic
The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic
Journal of Criminal Law and Criminology
If Big Brother made movies, persistent aerial surveillance would be its masterpiece. Small airplanes are rigged with high-tech cameras that can continuously transmit real-time images to the ground. The aircraft is able to monitor an area of thirty square miles for ten hours at a time. This technology allows video analysts to zoom in and track the location of vehicles, and even people. It was originally designed for military use during the Iraq War, but since then, it has been adapted for civilian applications. In 2016, the Baltimore Police Department contracted with Persistent Surveillance Systems to carry out a trial …
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Scholarly Articles
To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Scholarly Works
This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?
The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Crimmigration-Counterterrorism, Margaret Hu
Crimmigration-Counterterrorism, Margaret Hu
Scholarly Articles
The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening
Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening
Eric J Struening
Leaks have revealed that the use of personal technology such as cell phones and e-mail plays a large part in how the government obtains national security information. However, it is still an open question of how far the protection of the Fourth Amendment provides an individual against government intrusion in that type of technology. This article examines how the Fourth Amendment applies to the real-time tracking of national security targets through technology. I argue that a non-physical, short-term, warrantless, real-time trace of an individual’s location for national security purposes will not infringe the prohibition against unreasonable searches and seizures. As …
Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer
Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer
David Barnhizer
None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …
The Trickle-Down War, Rosa Brooks
The Trickle-Down War, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Anil Kalhan
With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Patricia L. Bellia
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
Shaun Spencer
This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …
The Poverty Defense, Michele Estrin Gilman
The Poverty Defense, Michele Estrin Gilman
University of Richmond Law Review
No abstract provided.
Growing Up Policed In The Age Of Aggressive Policing Policies, Brett G. Stoudt, Michelle Fine, Madeline Fox
Growing Up Policed In The Age Of Aggressive Policing Policies, Brett G. Stoudt, Michelle Fine, Madeline Fox
NYLS Law Review
No abstract provided.
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
Can We Find And Stop The "Jihad Janes"?, Diane Webber
Can We Find And Stop The "Jihad Janes"?, Diane Webber
Diane Webber
Two female American citizens, Colleen LaRose, a.k.a. “Jihad Jane” and Jamie Paulin-Ramirez, whose appearance and passports allow them to blend into Western society, currently represent “one of the worst fears” of intelligence and FBI analysts who work to identify terrorist threats. On both sides of the Atlantic, similar problems exist of homegrown terrorism and radicalization, and the internet has a huge impact on these issues. This paper examines the tools available to the U.S. and the U.K. to find and stop potential homegrown terrorists from perpetrating catastrophic acts of terror. After assessing the differences between U.S. and U.K. law, I …
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
University of Richmond Law Review
In this essay, I contend that when evaluating the constitutionality of enhanced surveillance devices, the existing test for assessing the occurrence of a Fourth Amendment search should be modified. Specifically, I suggest that intrusiveness should be unambiguously adopted by the Court as the benchmark for assessing and defining the existence of a search under the Fourth Amendment. Moreover, intrusiveness should be clearly defined to require an examination of two factors: the functionality of a challenged form of surveillance and the potential for disclosure created by the device.