Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (21)
- University of Michigan Law School (13)
- Washington and Lee University School of Law (10)
- Roger Williams University (9)
- University of Colorado Law School (9)
-
- Schulich School of Law, Dalhousie University (7)
- Selected Works (7)
- American University Washington College of Law (4)
- SJ Quinney College of Law, University of Utah (4)
- Vanderbilt University Law School (4)
- Columbia Law School (3)
- University of Massachusetts School of Law (3)
- University of Pennsylvania Carey Law School (3)
- University of Pittsburgh School of Law (3)
- University of Washington School of Law (3)
- Chicago-Kent College of Law (2)
- Cleveland State University (2)
- Maurer School of Law: Indiana University (2)
- Pepperdine University (2)
- Singapore Management University (2)
- Texas A&M University School of Law (2)
- The Catholic University of America, Columbus School of Law (2)
- The Peter A. Allard School of Law (2)
- University of Georgia School of Law (2)
- University of Miami Law School (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of the District of Columbia School of Law (2)
- Case Western Reserve University School of Law (1)
- Duke Law (1)
- Embry-Riddle Aeronautical University (1)
- Publication Year
- Publication
-
- Faculty Scholarship (27)
- Articles (8)
- Publications (8)
- Law Faculty Scholarship (7)
- Michigan Law Review (7)
-
- Articles, Book Chapters, & Popular Press (5)
- Scholarly Articles (5)
- All Faculty Scholarship (4)
- Utah Law Faculty Scholarship (4)
- Articles in Law Reviews & Other Academic Journals (3)
- Faculty Publications (3)
- Washington and Lee Law Review (3)
- All Faculty Publications (2)
- Articles by Maurer Faculty (2)
- Book Chapters (2)
- Georgia Journal of International & Comparative Law (2)
- Journal Articles (2)
- Michigan Telecommunications & Technology Law Review (2)
- Research Collection Yong Pung How School Of Law (2)
- Stephen E Henderson (2)
- Susan Freiwald (2)
- Vanderbilt Law School Faculty Publications (2)
- Washington and Lee Journal of Civil Rights and Social Justice (2)
- Anil Kalhan (1)
- Associate Professor Katina Michael (1)
- Buffalo Law Review (1)
- Canadian Journal of Law and Technology (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Publication Type
- File Type
Articles 61 - 90 of 147
Full-Text Articles in Law
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies
Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies
Life of the Law School (1993- )
No abstract provided.
Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff
Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff
Faculty Publications
Homeowners' notions of privacy in their dwellings and surroundings are under attack from the threat of pervasive surveillance by small civilian drones equipped with highly sophisticated visual and data-gathering capabilities. Streamlined rules recently issued by the Federal Aviation Administration ("FAA') have unleashed technological innovation that promises great societal benefits. However, the new rules expose homeowners to unwanted snooping because they lack limits on the distance drones may operate from residential dwellings or time of operations. Indeed, our society should not expect a federal agency to deal effectively with the widely diverse issues of drone technology facing the states, given the …
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
Scholarly Articles
This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog
Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog
Faculty Scholarship
It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …
Keeping Up With New Legal Titles, Franklin L. Runge
Keeping Up With New Legal Titles, Franklin L. Runge
Law Faculty Scholarly Articles
In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.
Performative Privacy, Scott Skinner-Thompson
Performative Privacy, Scott Skinner-Thompson
Publications
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.
This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …
Health Information Equity, Craig Konnoth
Health Information Equity, Craig Konnoth
Publications
In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Northwestern University Law Review
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.
This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin
University of Baltimore Law Review
In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …
Legitimate Invasions: What Ontario Can Learn From The History Of The Consumer Reporting Act, Eliie Marshall
Legitimate Invasions: What Ontario Can Learn From The History Of The Consumer Reporting Act, Eliie Marshall
Canadian Journal of Law and Technology
The growth of modern surveillance has attracted great public and scholarly interest. As Justice Abella recently noted in Douez v. Facebook, the Internet has transformed the potential harms flowing from an unjustified invasion of one’s personal information. Most analyses of the associated risks, however, imply that the techniques and motivations for surveillance are new. In fact, tactics for collecting and exchanging information about individuals to gain power over those individuals are well documented since time immemorial. From William the Conquerer’s Domesday Book to IBM’s first census tabulating machine, the advantage gained through data sharing has greatly benefited the state. The …
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …
Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle
Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle
All Faculty Scholarship
Plaintiffs seeking to challenge government surveillance programs have faced long odds in federal courts, due mainly to a line of Supreme Court cases that have set a very high bar to Article III standing in these cases. The origins of this jurisprudence can be directly traced to Laird v. Tatum, a 1972 case where the Supreme Court considered the question of who could sue the government over a surveillance program, holding in a 5-4 decision that chilling effects arising “merely from the individual’s knowledge” of likely government surveillance did not constitute adequate injury to meet Article III standing requirements.
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner
Eliminating The No Number, No List Response; Keeping The Cia Within The Scope Of The Law Amidst America's Global War On Terror, Joseph Meissner
Nevada Law Journal
No abstract provided.
Standing And Covert Surveillance, Christopher Slobogin
Standing And Covert Surveillance, Christopher Slobogin
Pepperdine Law Review
This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …
Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies
Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies
Washington and Lee Law Review
No abstract provided.
The Fisa Court And Article Iii, Stephen I. Vladeck
The Fisa Court And Article Iii, Stephen I. Vladeck
Washington and Lee Law Review
No abstract provided.
Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger
Surveillance As Loss Of Obscurity, Woodrow Hartzog, Evan Selinger
Washington and Lee Law Review
No abstract provided.
Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon
Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon
Journal of the National Association of Administrative Law Judiciary
This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …
The Surveillance State: Do License Plate Readers Impinge Upon Americans' Civil Liberties?, Jourdin Hermann
The Surveillance State: Do License Plate Readers Impinge Upon Americans' Civil Liberties?, Jourdin Hermann
Themis: Research Journal of Justice Studies and Forensic Science
The boundaries that delineate public from private sphere have challenged our political system’s foundations since its origination. License plate readers (LPRs), a tool used by law enforcement and private businesses, cause citizens and their government to question the criteria separating public and private information. While police and repossession agencies contend that license plate readers aid their work, the American Civil Liberties Union (ACLU) argues that surveillance equipment interferes with an individual’s right to privacy. Addressing such privacy concerns requires the public to hold its government accountable by petitioning for limits on LPR use and data retention. LPRs also pose unique …
Spying Inc., Danielle K. Citron
Spying Inc., Danielle K. Citron
Faculty Scholarship
The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.
Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …
Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert
Developing And Testing A Surveillance Impact Assessment Methodology, David Wright, Michael Friedewald, Raphael Gellert
Michael Friedewald
With the increasing pervasiveness of surveillance, from big companies such as Google and Facebook, as well as from the intelligence agencies, such as the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ), there is a clear need for a surveillance impact assessment (SIA), a method that addresses not only issues of privacy and data protection, but also ethical, social, economic, and political issues.
The SAPIENT project, funded by the European Commission, and undertaken by a consortium of partners from several European countries, aimed to develop an SIA methodology, based on stake- holder needs and a set …
The Un-Territoriality Of Data, Jennifer Daskal
The Un-Territoriality Of Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …
Can Americans Resist Surveillance?, Ryan Calo
Can Americans Resist Surveillance?, Ryan Calo
Articles
This Essay analyzes the ability of everyday Americans to resist and alter the conditions of government surveillance. Americans appear to have several avenues of resistance or reform. We can vote for privacy-friendly politicians, challenge surveillance in court, adopt encryption or other technologies, and put market pressure on companies not to cooperate with law enforcement.
In practice, however, many of these avenues are limited. Reform-minded officials lack the capacity for real oversight. Litigants lack standing to invoke the Constitution in court. Encryption is not usable and can turn citizens into targets. Citizens can extract promises from companies to push back against …
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …