Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Countering Jihadi Cool And The Case Of Raza V. City Of New York, Caroline Joan S. Picart Jan 2024

Countering Jihadi Cool And The Case Of Raza V. City Of New York, Caroline Joan S. Picart

Indiana Journal of Law and Social Equality

This Article begins with an explanation of the rhetoric, aesthetics, and culture of jihadi cool/chic, which is a crucial factor in the formation of self-radicalizing individuals. It then analyzes the jurisprudence, and legal and cultural ramifications of Raza v. City of New York, in which the New York Police Department had initiated an intense covert surveillance operation that focused on Muslims in New York and beyond without probable cause. This led to a lawsuit that claimed that the New York Police Department’s Muslim Surveillance Program violated the Fourteenth Amendment’s Equal Protection Clause, the First Amendment’s Free Exercise and Establishment Clauses, …


The Racialized History Of Vice Policing, India Thusi Jul 2023

The Racialized History Of Vice Policing, India Thusi

Articles by Maurer Faculty

Vice policing targets the consumption and commercialization of certain pleasures that have been criminalized in the United States—such as the purchase of narcotics and sexual services. One might assume that vice policing is concerned with eliminating these vices. However, in reality, this form of policing has not been centered on protecting and preserving the moral integrity of the policed communities by eradicating vice. Instead, the history of vice policing provides an example of the racialized nature of policing in the United States. Vice policing has been focused on (1) maintaining racial segregation, (2) containing vice in marginalized communities, and (3) …


The Next Pandemic Might Be A Petdemic, Hillary Greene Jan 2022

The Next Pandemic Might Be A Petdemic, Hillary Greene

Indiana Law Journal

A new scientific study shows that COVID-19 can be transmitted from cats to humans. Luckily, this channel of transmission seems extremely rare, at least thus far. But next time—and there will be a next time—we may not be so fortunate. This Article addresses this underappreciated risk of what I term a “petdemic”—a pandemic or epidemic that involves significant disease transmission between pets and humans. With nearly 70% of U.S. households owning pets, a petdemic could be catastrophic. One of our go-to responses for even perceived petdemics, honed over the last century, is to slaughter our pets. This pioneering Article proposes …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


The New Writs Of Assistance, Ian Samuel Jan 2018

The New Writs Of Assistance, Ian Samuel

Articles by Maurer Faculty

The providers of network services (and the makers of network devices) know an enormous amount about our lives. Because they do, these network intermediaries are being asked with increasing frequency to assist the government in solving crimes or gathering intelligence. Given how much they know about us, if the government can secure the assistance of these intermediaries, it will enjoy a huge increase in its theoretical capacity for surveillance—the ability to learn, in principle, almost anything about anyone. That has the potential to create serious social harm, even assuming that the government continues to adhere to ordinary democratic norms and …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney Jan 2015

Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney

Articles by Maurer Faculty

Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …


Biometric Id Cybersurveillance, Margaret Hum Oct 2013

Biometric Id Cybersurveillance, Margaret Hum

Indiana Law Journal

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

Prism And Privacy: Will This Change Everything?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Warrantless Location Tracking, Ian Samuel Jan 2008

Warrantless Location Tracking, Ian Samuel

Articles by Maurer Faculty

The ubiquity of cell phones has transformed police investigations. Tracking a suspect's movements by following her phone is now a common but largely unnoticed surveillance technique. It is useful, no doubt, precisely because it is so revealing; it also raises significant privacy concerns. In this Note, I consider what the procedural requirements for cell phone tracking should be by examining the relevant statutory and constitutional law. Ultimately, the best standard is probable cause; only an ordinary warrant can satisfy the text of the statutes and the mandates of the Constitution.


Pen Registers After Smith V. Maryland, John S. Applegate, Amy Applegate Jan 1980

Pen Registers After Smith V. Maryland, John S. Applegate, Amy Applegate

Articles by Maurer Faculty

No abstract provided.