Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Hyperlegality And Heightened Surveillance: The Case Of Threatened Species Lists, Irus Braverman Jul 2015

Hyperlegality And Heightened Surveillance: The Case Of Threatened Species Lists, Irus Braverman

Journal Articles

My contribution to the Debate "Thinking about Law and Surveillance" focuses on the project of governing nonhuman species through care, briefly pointing to how law and surveillance are interwoven in this context and to how conservation's biopolitical regimes are increasingly becoming more abstract, standardized, calculable, and algorithmic in scope. I argue that conservation’s focus on governing through care lends itself to heightened modes of surveillance and to hyperlegality - namely, to the intensified inspection and regulation of both governed and governing actors. I start with some preliminary explanations about my atypical use of the terms surveillance, law, and biopolitics.


When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Machine Learning And The Mosaic Theory, Renee Mcdonald Hutchins, Steve Bellovin, Tony Jebara, Sebastian Zimmeck

Journal Articles

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable expectations of privacy.1 An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped into …


Passing The Sniff Test: Police Dogs As Surveillance Technology, Irus Braverman Jan 2013

Passing The Sniff Test: Police Dogs As Surveillance Technology, Irus Braverman

Journal Articles

In October 2012, the Supreme Court of the United States will review the case of Florida v. Jardines, which revolves around the constitutionality of police canine Franky’s sniff outside a private residence. Essentially, the Court will need to decide whether or not the sniff constitutes a “search” for Fourth Amendment purposes. This Article presents a review of the often-contradictory case law that exists on this question to suggest that underlying the various cases is the Courts’ assumption of a juxtaposed relationship between nature and technology. Where dog sniffs are perceived as a technology, the courts have been inclined to also …


Zooveillance: Foucault Goes To The Zoo, Irus Braverman Sep 2012

Zooveillance: Foucault Goes To The Zoo, Irus Braverman

Journal Articles

The last three decades have witnessed a dramatic shift in the governance of North American zoo animals. During this period, captive animal administration has transformed from a materially, geographically, and technologically limited enterprise - focused on the control of individual zoo animals within specific institutions - into an ambitious collective project that encompasses all accredited North American zoos and that governs more than a million zoo animals. Tapping into a sophisticated voluntary and collaborative self-monitored administration, zoos have been able to rely upon genetics and demography to achieve the ultimate goal of captive animal conservation. This essay frames this story …


The Memory Gap In Surveillance Law, Patricia L. Bellia Jan 2008

The Memory Gap In Surveillance Law, Patricia L. Bellia

Journal Articles

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Jan 2005

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Journal Articles

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Jan 2004

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Journal Articles

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …


Chasing Bits Across Borders, Patricia L. Bellia Jan 2001

Chasing Bits Across Borders, Patricia L. Bellia

Journal Articles

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Jan 2000

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Journal Articles

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches.

The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …