Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy Law

Surveillance

Institution
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 147

Full-Text Articles in Law

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies Feb 2017

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff Jan 2017

Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff

Faculty Publications

Homeowners' notions of privacy in their dwellings and surroundings are under attack from the threat of pervasive surveillance by small civilian drones equipped with highly sophisticated visual and data-gathering capabilities. Streamlined rules recently issued by the Federal Aviation Administration ("FAA') have unleashed technological innovation that promises great societal benefits. However, the new rules expose homeowners to unwanted snooping because they lack limits on the distance drones may operate from residential dwellings or time of operations. Indeed, our society should not expect a federal agency to deal effectively with the widely diverse issues of drone technology facing the states, given the …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog Jan 2017

Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …


Keeping Up With New Legal Titles, Franklin L. Runge Jan 2017

Keeping Up With New Legal Titles, Franklin L. Runge

Law Faculty Scholarly Articles

In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.


Performative Privacy, Scott Skinner-Thompson Jan 2017

Performative Privacy, Scott Skinner-Thompson

Publications

Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.

This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …


Health Information Equity, Craig Konnoth Jan 2017

Health Information Equity, Craig Konnoth

Publications

In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …


Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin Jan 2016

Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin

University of Baltimore Law Review

In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Legitimate Invasions: What Ontario Can Learn From The History Of The Consumer Reporting Act, Eliie Marshall Jan 2016

Legitimate Invasions: What Ontario Can Learn From The History Of The Consumer Reporting Act, Eliie Marshall

Canadian Journal of Law and Technology

The growth of modern surveillance has attracted great public and scholarly interest. As Justice Abella recently noted in Douez v. Facebook, the Internet has transformed the potential harms flowing from an unjustified invasion of one’s personal information. Most analyses of the associated risks, however, imply that the techniques and motivations for surveillance are new. In fact, tactics for collecting and exchanging information about individuals to gain power over those individuals are well documented since time immemorial. From William the Conquerer’s Domesday Book to IBM’s first census tabulating machine, the advantage gained through data sharing has greatly benefited the state. The …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle Jan 2016

Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle

All Faculty Scholarship

Plaintiffs seeking to challenge government surveillance programs have faced long odds in federal courts, due mainly to a line of Supreme Court cases that have set a very high bar to Article III standing in these cases. The origins of this jurisprudence can be directly traced to Laird v. Tatum, a 1972 case where the Supreme Court considered the question of who could sue the government over a surveillance program, holding in a 5-4 decision that chilling effects arising “merely from the individual’s knowledge” of likely government surveillance did not constitute adequate injury to meet Article III standing requirements.


Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law Oct 2015

Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies Oct 2015

Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner Sep 2015

Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner

Nevada Law Journal

No abstract provided.


Standing And Covert Surveillance, Christopher Slobogin Jul 2015

Standing And Covert Surveillance, Christopher Slobogin

Pepperdine Law Review

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …


Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies Jun 2015

Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies

Washington and Lee Law Review

No abstract provided.


The Fisa Court And Article Iii, Stephen I. Vladeck Jun 2015

The Fisa Court And Article Iii, Stephen I. Vladeck

Washington and Lee Law Review

No abstract provided.


Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger Jun 2015

Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger

Washington and Lee Law Review

No abstract provided.


Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon May 2015

Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon

Journal of the National Association of Administrative Law Judiciary

This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …


The Surveillance State: Do License Plate Readers Impinge Upon Americans' Civil Liberties?, Jourdin Hermann May 2015

The Surveillance State: Do License Plate Readers Impinge Upon Americans' Civil Liberties?, Jourdin Hermann

Themis: Research Journal of Justice Studies and Forensic Science

The boundaries that delineate public from private sphere have challenged our political system’s foundations since its origination. License plate readers (LPRs), a tool used by law enforcement and private businesses, cause citizens and their government to question the criteria separating public and private information. While police and repossession agencies contend that license plate readers aid their work, the American Civil Liberties Union (ACLU) argues that surveillance equipment interferes with an individual’s right to privacy. Addressing such privacy concerns requires the public to hold its government accountable by petitioning for limits on LPR use and data retention. LPRs also pose unique …


Spying Inc., Danielle K. Citron Mar 2015

Spying Inc., Danielle K. Citron

Faculty Scholarship

The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.

Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …


Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert Jan 2015

Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert

Michael Friedewald

With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.

The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …


The Un-Territoriality Of Data, Jennifer Daskal Jan 2015

The Un-Territoriality Of Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …


Can Americans Resist Surveillance?, Ryan Calo Jan 2015

Can Americans Resist Surveillance?, Ryan Calo

Articles

This Essay analyzes the ability of everyday Americans to resist and alter the conditions of government surveillance. Americans appear to have several avenues of resistance or reform. We can vote for privacy-friendly politicians, challenge surveillance in court, adopt encryption or other technologies, and put market pressure on companies not to cooperate with law enforcement.

In practice, however, many of these avenues are limited. Reform-minded officials lack the capacity for real oversight. Litigants lack standing to invoke the Constitution in court. Encryption is not usable and can turn citizens into targets. Citizens can extract promises from companies to push back against …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …