Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Surveillance

Institution
Publication Year
Publication
Publication Type
File Type

Articles 121 - 147 of 147

Full-Text Articles in Law

The Fight To Frame Privacy, Woodrow Hartzog Apr 2013

The Fight To Frame Privacy, Woodrow Hartzog

Michigan Law Review

In his important new book, Nothing to Hide: The False Tradeoff Between Privacy and Security, Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that the predetermined abandonment of privacy in security-related disputes means that the structure of the privacy-security debate is inherently flawed. Solove understands that privacy is far too vital to our freedom and democracy to accept its inevitable demise. The central thesis of this Review is that Solove's polemic is a strong and desperately needed collection of frames that counterbalances the "nothing …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray Apr 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …


The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald Dec 2012

The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald

Susan Freiwald

The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney Jan 2012

Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney

Articles, Book Chapters, & Popular Press

With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Cctv And Human Rights, Benjamin J. Goold Jan 2010

Cctv And Human Rights, Benjamin J. Goold

All Faculty Publications

This chapter provides a brief overview of the human rights implications of closed circuit television (CCTV) surveillance, and aims to help CCTV managers and operators develop public area surveillance policies and practices that are consistent with a commitment to the protection of individual rights and a respect for civil liberties.


Do We Need A New Fourth Amendment?, Orin S. Kerr Apr 2009

Do We Need A New Fourth Amendment?, Orin S. Kerr

Michigan Law Review

Slobogin's book offers a new conceptualization of the Fourth Amendment rooted in what he calls the proportionality principle: An investigative technique should be permitted under the Constitution only if the strength of the government's justification for the technique is roughly proportionate to the level of intrusion it causes . Slobogin roots this principle in Terry v. Ohio and its pragmatic balancing of law-enforcement and privacy interests. To determine how much justification the Fourth Amendment requires, Slobogin argues, courts should assess the intrusiveness of the investigatory technique and then set a proportionate threshold of proof that the government must show. The …


Garbage Pails And Puppy Dog Tails: Is That What Katz Is Made Of?, Aya Gruber Jan 2008

Garbage Pails And Puppy Dog Tails: Is That What Katz Is Made Of?, Aya Gruber

Publications

This Article takes the opportunity of the fortieth anniversary of Katz v. U.S. to assess whether the revolutionary case's potential to provide broad and flexible privacy protection to individuals has been realized. Answering this question in a circumspect way, the Article pinpoints the language in Katz that was its eventual undoing and demonstrates how the Katz test has been plagued by two principle problems that have often rendered it more harmful to than protective of privacy. The manipulation problem describes the tendency of conservative courts to define reasonable expectations of privacy as lower than the expectations society actually entertains. The …


Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen Jan 2008

Dredging Up The Past: Lifelogging, Memory And Surveillance, Anita L. Allen

All Faculty Scholarship

The term “lifelog” refers to a comprehensive archive of an individual's quotidian existence, created with the help of pervasive computing technologies. Lifelog technologies would record and store everyday conversations, actions, and experiences of their users, enabling future replay and aiding remembrance. Products to assist lifelogging are already on the market; but the technology that will enable people fully and continuously to document their entire lives is still in the research and development phase. For generals, edgy artists and sentimental grandmothers alike, lifelogging could someday replace or complement, existing memory preservation practices. Like a traditional diary, journal or day-book, the lifelog …


Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner Apr 2007

Mission Creep: Public Health Surveillance And Medical Privacy, Wendy K. Mariner

Faculty Scholarship

The National Security Agency's domestic surveillance program has parallels in the growth of disease surveillance for public health purposes. This article explores whether laws requiring health providers to report to government names and identifiable information about patients with infectious or chronic diseases may be vulnerable to challenge as an invasion of privacy. A shift in the use of disease surveillance data from investigating disease outbreaks to data mining and analysis for research, budgeting, and policy planning, as well as bioterrorism, tests the boundaries of liberty and privacy. The Supreme Court has not reviewed a disease reporting law. Its few related …


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton Jun 2006

Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton

The University of New Hampshire Law Review

[Excerpt] “The English poet W.H. Auden once claimed that “Peeping Toms are never praised, like novelists or bird watchers, for the keenness of their observations.” Perhaps Auden would have modified his maxim had he lived in the age of terrorism. A certain degree of government surveillance of even intimate communications is expected, encouraged, and indeed praised when the government’s efforts lead to the prevention of catastrophe. However, it is also expected that the government will minimize these intrusions, will conduct surveillance only on legitimate targets, and will follow the procedural safeguards that the representatives of the people have enacted in …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Mar 2004

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Michigan Law Review

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Katz Is Dead. Long Live Katz, Peter P. Swire Mar 2004

Katz Is Dead. Long Live Katz, Peter P. Swire

Michigan Law Review

Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …


The New Privacy, Paul M. Schwartz, William M. Treanor May 2003

The New Privacy, Paul M. Schwartz, William M. Treanor

Michigan Law Review

In 1964, as the welfare state emerged in full force in the United States, Charles Reich published The New Property, one of the most influential articles ever to appear in a law review. Reich argued that in order to protect individual autonomy in an "age of governmental largess," a new property right in governmental benefits had to be recognized. He called this form of property the "new property." In retrospect, Reich, rather than anticipating trends, was swimming against the tide of history. In the past forty years, formal claims to government benefits have become more tenuous rather than more secure. …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …


Privacy In Confucian And Taoist Thought, Christina B. Whitman Jan 1985

Privacy In Confucian And Taoist Thought, Christina B. Whitman

Book Chapters

Only three aspects of the broad concept "privacy" will be explored in this essay: privacy as providing a sphere for intimate personal relationships with family and friends, privacy as freedom from surveillance for purposes of gathering personal information, and privacy as freedom from interference by government or social controls. These concepts describe quite different concerns. They are often grouped together under the single term "privacy," but not without some strain... A comparison between a modern Western value and its counterpart, if any, in very early Confucian and Taoist belief is inevitably somewhat strained. But it serves a purpose. If nothing …


The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson Jan 1983

The Constitutionality Of The Foreign Intelligence Surveillance Act Of 1978, Judith B. Anderson

Vanderbilt Journal of Transnational Law

Within its more limited scope, the Belfield decision provides a helpful approach to FISA cases by articulating both a solid rationale for FISA's in camera, ex parte provision and a workable balancing approach for determining whether open proceedings may be necessary. The Falvey decision, although broader in scope, does not provide a satisfactory rationale for FISA's deviation from the traditional fourth amendment warrant requirement, nor does it articulate a workable approach to evaluating a FISA-warranted surveillance. The Falvey court, by predicating its upholding of FISA on an acceptance of the national security exception, may perpetuate a debate that the statute …


Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb Apr 1980

Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb

University of Michigan Journal of Law Reform

This article evaluates the constitutionality of CCTV "searches." Part I discusses the present uses being made of closed circuit technology and evaluates the merits of the CCTV surveillance system. The critical policy trade-off is the system's effectiveness in combatting crime against the resulting loss of privacy to individual citizens.

Part II considers the constitutional implications of CCTV use in terms of three major doctrines: the Fourth Amendment prohibition against "unreasonable searches and seizures"; the constitutional right of privacy; and the First Amendment guarantees of free speech and association. This part briefly summarizes the state of the law concerning these constitutional …


Pen Registers After Smith V. Maryland, John S. Applegate, Amy Applegate Jan 1980

Pen Registers After Smith V. Maryland, John S. Applegate, Amy Applegate

Articles by Maurer Faculty

No abstract provided.


Westin: Privacy And Freedom, Stanley K. Laughlin Jr. Mar 1968

Westin: Privacy And Freedom, Stanley K. Laughlin Jr.

Michigan Law Review

A Review of Privacy and Freedom by Alan F. Westin


The Criminal's Right Of Privacy Jun 1929

The Criminal's Right Of Privacy

Michigan Law Review

The dissent of Mr. Justice Brandeis in the famed wire tapping case has been of especial interest to those who are acquainted with his article in the Harvard Law Review in 1890 on "The Right of Privacy." The law has witnessed few more fascinating developments than the engrafting of this latter concept into the formula of justice, few more conspicuous examples of creative juristic effort. Concerning it Dean Pound has said: "What may almost be called the classical example (of creative activity) is the paper on the Right of Privacy in which Mr. Justice Brandeis, then at the bar, was …