Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen Jan 2017

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen

Touro Law Review

No abstract provided.


Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor Sep 2016

Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor

University of Michigan Journal of Law Reform

In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …


Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter Jan 2007

Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter

Richmond Journal of Law & Technology

Nineteenth Century philosopher Jeremy Bentham designed a prison system known as the Panopticon which was arranged in such a way that a single guard could, at any given time, view the activities and whereabouts of any particular prisoner. Bentham designed the prison in such a way that the prisoners could never tell whether they were being watched. Twentieth Century French philosopher Michel Foucault further considered use of the Panopticon as a means of societal control through fear in his seminal book Discipline and Punish: The Birth of the Prison.


Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck May 2005

Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck

Federal Communications Law Journal

Since the grant of the first Commercial Mobile Radio Service ("CMRS") license over twenty years ago, the wireless industry has grown from a service of convenience to one that is indispensable. What once was a device used for sporadic phone calls now is viewed by many Americans as a source of invaluable communication and security. As the wireless industry matured, government officials turned to the mobile phone as a way to make the United States safer. E-9 11, the Communications Assistance for Law Enforcement Act ("CALEA"), Wireless Priority Service ("WPS"), and Outage Reporting all were initiated on the wireless platform …


Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary May 2005

Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary

Federal Communications Law Journal

In no industry has the impact of the events of September 11, 2001 ("9/11") been felt more strongly than in the communications industry. After 9/11, as the American people demanded a greater sense of security, Congress and the executive branch agencies reacted with new laws, new regulations, and new practices designed to protect our nation's critical communications infrastructure and enhance the ability of law enforcement and intelligence agencies to investigate those who would do us harm. The U.S. communications providers could do so consistent with their responsibilities to customers and to shareholders. That partnership, based upon rules developed over decades, …


Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett Jan 2002

Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett

Richmond Journal of Law & Technology

Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …