Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Biometric identification (3)
- Electronic surveillance laws (2)
- Immigration policy (2)
- Mass surveillance (2)
- National Security (2)
-
- United States Supreme Court (2)
- Artificial intelligence laws (1)
- Civil-military relations (1)
- Constitutional Interpretation (1)
- Counterterrorism--Government policy (1)
- Data security (1)
- Electronic surveillance (1)
- Fiduciary Duty (1)
- George W. Bush (1)
- Human Rights (1)
- Iraq (1)
- Judicial Power (1)
- National security (1)
- Race discrimination (1)
- Social injustice (1)
- Terrorism (1)
- War on Terrorism 2001- (1)
Articles 1 - 11 of 11
Full-Text Articles in Law
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
Faculty Publications
This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …
Digital Internment, Margaret Hu
Digital Internment, Margaret Hu
Faculty Publications
In Korematsu, Hirabayashi, and the Second Monster, Eric L. Muller explores whether Korematsu v. United States is dead post-Trump v. Hawaii, and whether by failing to strike down Hirabayashi v. United States, the “mother” of Korematsu and a “second monster” lives on. This brief response Essay contends that answering these questions first demands grasping how Trump v. Hawaiifailed to fully address the program implemented by the Muslim Ban–Travel Ban: Extreme Vetting. Extreme Vetting can be characterized as a form of “digital internment” through a complex web of cybersurveillance, administrative-imposed restraints, and “identity-management” rationales that are …
Bulk Biometric Metadata Collection, Margaret Hu
Bulk Biometric Metadata Collection, Margaret Hu
Faculty Publications
Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …
Crimmigration-Counterterrorism, Margaret Hu
Crimmigration-Counterterrorism, Margaret Hu
Faculty Publications
The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically-driven screening technologies can be better understood through the analytical prism of “crimmigrationcounterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” to …
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Faculty Publications
This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …
Interest-Balancing Vs. Fiduciary Duty: Two Models For National Security Law, Evan Fox-Decent, Evan J. Criddle
Interest-Balancing Vs. Fiduciary Duty: Two Models For National Security Law, Evan Fox-Decent, Evan J. Criddle
Faculty Publications
No abstract provided.
Section 2: The Law Under George W. Bush, Institute Of Bill Of Rights Law, William & Mary Law School
Section 2: The Law Under George W. Bush, Institute Of Bill Of Rights Law, William & Mary Law School
Supreme Court Preview
No abstract provided.
Global Test Threatens Security, Alan J. Meese
Annan Leaves Door Open For U.S. Action, Alan J. Meese
Annan Leaves Door Open For U.S. Action, Alan J. Meese
Popular Media
No abstract provided.
Section 3: The War On Terror, Institute Of Bill Of Rights Law, William & Mary Law School
Section 3: The War On Terror, Institute Of Bill Of Rights Law, William & Mary Law School
Supreme Court Preview
No abstract provided.
Crisis And Constitutionalism, Michael J. Gerhardt
Crisis And Constitutionalism, Michael J. Gerhardt
Faculty Publications
No abstract provided.