Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Law
Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen
Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen
Touro Law Review
No abstract provided.
Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor
Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor
University of Michigan Journal of Law Reform
In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …
Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter
Preventing A Modern Panopticon: Law Enforcement Acquisition Of Real-Time Cellular Tracking Data, Steven B. Toeniskoetter
Richmond Journal of Law & Technology
Nineteenth Century philosopher Jeremy Bentham designed a prison system known as the Panopticon which was arranged in such a way that a single guard could, at any given time, view the activities and whereabouts of any particular prisoner. Bentham designed the prison in such a way that the prisoners could never tell whether they were being watched. Twentieth Century French philosopher Michel Foucault further considered use of the Panopticon as a means of societal control through fear in his seminal book Discipline and Punish: The Birth of the Prison.
Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck
Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck
Federal Communications Law Journal
Since the grant of the first Commercial Mobile Radio Service ("CMRS") license over twenty years ago, the wireless industry has grown from a service of convenience to one that is indispensable. What once was a device used for sporadic phone calls now is viewed by many Americans as a source of invaluable communication and security. As the wireless industry matured, government officials turned to the mobile phone as a way to make the United States safer. E-9 11, the Communications Assistance for Law Enforcement Act ("CALEA"), Wireless Priority Service ("WPS"), and Outage Reporting all were initiated on the wireless platform …
Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary
Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary
Federal Communications Law Journal
In no industry has the impact of the events of September 11, 2001 ("9/11") been felt more strongly than in the communications industry. After 9/11, as the American people demanded a greater sense of security, Congress and the executive branch agencies reacted with new laws, new regulations, and new practices designed to protect our nation's critical communications infrastructure and enhance the ability of law enforcement and intelligence agencies to investigate those who would do us harm. The U.S. communications providers could do so consistent with their responsibilities to customers and to shareholders. That partnership, based upon rules developed over decades, …
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Richmond Journal of Law & Technology
Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …