Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (4)
- Computer Sciences (3)
- Fourth Amendment (3)
- Information Security (3)
- Internet Law (3)
-
- Physical Sciences and Mathematics (3)
- Law Enforcement and Corrections (2)
- Privacy Law (2)
- Science and Technology Law (2)
- Animal Law (1)
- Comparative and Foreign Law (1)
- Computer Law (1)
- Constitutional Law (1)
- First Amendment (1)
- Fourteenth Amendment (1)
- Health Law and Policy (1)
- International Law (1)
- Law and Race (1)
- Legal History (1)
- Legislation (1)
- President/Executive Department (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Law
Countering Jihadi Cool And The Case Of Raza V. City Of New York, Caroline Joan S. Picart
Countering Jihadi Cool And The Case Of Raza V. City Of New York, Caroline Joan S. Picart
Indiana Journal of Law and Social Equality
This Article begins with an explanation of the rhetoric, aesthetics, and culture of jihadi cool/chic, which is a crucial factor in the formation of self-radicalizing individuals. It then analyzes the jurisprudence, and legal and cultural ramifications of Raza v. City of New York, in which the New York Police Department had initiated an intense covert surveillance operation that focused on Muslims in New York and beyond without probable cause. This led to a lawsuit that claimed that the New York Police Department’s Muslim Surveillance Program violated the Fourteenth Amendment’s Equal Protection Clause, the First Amendment’s Free Exercise and Establishment Clauses, …
The Racialized History Of Vice Policing, India Thusi
The Racialized History Of Vice Policing, India Thusi
Articles by Maurer Faculty
Vice policing targets the consumption and commercialization of certain pleasures that have been criminalized in the United States—such as the purchase of narcotics and sexual services. One might assume that vice policing is concerned with eliminating these vices. However, in reality, this form of policing has not been centered on protecting and preserving the moral integrity of the policed communities by eradicating vice. Instead, the history of vice policing provides an example of the racialized nature of policing in the United States. Vice policing has been focused on (1) maintaining racial segregation, (2) containing vice in marginalized communities, and (3) …
The Next Pandemic Might Be A Petdemic, Hillary Greene
The Next Pandemic Might Be A Petdemic, Hillary Greene
Indiana Law Journal
A new scientific study shows that COVID-19 can be transmitted from cats to humans. Luckily, this channel of transmission seems extremely rare, at least thus far. But next time—and there will be a next time—we may not be so fortunate. This Article addresses this underappreciated risk of what I term a “petdemic”—a pandemic or epidemic that involves significant disease transmission between pets and humans. With nearly 70% of U.S. households owning pets, a petdemic could be catastrophic. One of our go-to responses for even perceived petdemics, honed over the last century, is to slaughter our pets. This pioneering Article proposes …
Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin
Articles by Maurer Faculty
תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …
The New Writs Of Assistance, Ian Samuel
The New Writs Of Assistance, Ian Samuel
Articles by Maurer Faculty
The providers of network services (and the makers of network devices) know an enormous amount about our lives. Because they do, these network intermediaries are being asked with increasing frequency to assist the government in solving crimes or gathering intelligence. Given how much they know about us, if the government can secure the assistance of these intermediaries, it will enjoy a huge increase in its theoretical capacity for surveillance—the ability to learn, in principle, almost anything about anyone. That has the potential to create serious social harm, even assuming that the government continues to adhere to ordinary democratic norms and …
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Biometric Id Cybersurveillance, Margaret Hum
Biometric Id Cybersurveillance, Margaret Hum
Indiana Law Journal
The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …
Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Warrantless Location Tracking, Ian Samuel
Warrantless Location Tracking, Ian Samuel
Articles by Maurer Faculty
The ubiquity of cell phones has transformed police investigations. Tracking a suspect's movements by following her phone is now a common but largely unnoticed surveillance technique. It is useful, no doubt, precisely because it is so revealing; it also raises significant privacy concerns. In this Note, I consider what the procedural requirements for cell phone tracking should be by examining the relevant statutory and constitutional law. Ultimately, the best standard is probable cause; only an ordinary warrant can satisfy the text of the statutes and the mandates of the Constitution.
Pen Registers After Smith V. Maryland, John S. Applegate, Amy Applegate
Pen Registers After Smith V. Maryland, John S. Applegate, Amy Applegate
Articles by Maurer Faculty
No abstract provided.