Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Electronic surveillance

Discipline
Institution
Publication Year
Publication

Articles 1 - 28 of 28

Full-Text Articles in Law

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher Jan 2022

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher

Faculty Articles

Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …


Pandemic Surveillance Discrimination, Christian Sundquist Jan 2021

Pandemic Surveillance Discrimination, Christian Sundquist

Articles

The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …


Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel Dec 2020

Law Enforcement’S Use Of Facial Recognition Software In United States Cities, Samantha Jean Wunschel

Honors Program Theses and Projects

Facial recognition software is something we use every day, whether it’s a suggested tag on our Facebook post or a faster way to unlock our phones. As technology becomes increasingly pervasive in our lives, law enforcement has adapted to utilize the new tools available in accessory to their investigations and the legal process.


Digital Internment, Margaret Hu Jan 2020

Digital Internment, Margaret Hu

Faculty Publications

In Korematsu, Hirabayashi, and the Second Monster, Eric L. Muller explores whether Korematsu v. United States is dead post-Trump v. Hawaii, and whether by failing to strike down Hirabayashi v. United States, the “mother” of Korematsu and a “second monster” lives on. This brief response Essay contends that answering these questions first demands grasping how Trump v. Hawaiifailed to fully address the program implemented by the Muslim Ban–Travel Ban: Extreme Vetting. Extreme Vetting can be characterized as a form of “digital internment” through a complex web of cybersurveillance, administrative-imposed restraints, and “identity-management” rationales that are …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Faculty Publications

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu Dec 2017

Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu

Faculty Publications

This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies. …


Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Big Data Blacklisting, Margaret Hu Sep 2015

Big Data Blacklisting, Margaret Hu

Faculty Publications

“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Apr 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Using Gps Devices In Inspector General Investigations After Cunningham V. New York State Department Of Labor, Wesley Cheng Jan 2014

Using Gps Devices In Inspector General Investigations After Cunningham V. New York State Department Of Labor, Wesley Cheng

Center for the Advancement of Public Integrity (Inactive)

When the New York State Office of the Inspector General (“NY-OIG”) suspected that a New York State employee named Michael Cunningham was submitting false time reports, its investigators turned to electronic surveillance to assist in their collection of evidence. Without obtaining a judicial warrant, NY-OIG investigators covertly attached a global positioning system (GPS) device to Cunningham’s car and collected data on Cunningham’s vehicular movements twenty-four hours a day for a month, including during his vacation. Ultimately, the GPS data was used in a disciplinary hearing leading to Cunningham’s termination.


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Responses To The Five Questions, Charles J. Dunlap Jr. Jan 2012

Responses To The Five Questions, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Electronic Evidence In Canada, Robert Currie, Steve Coughlan Jan 2012

Electronic Evidence In Canada, Robert Currie, Steve Coughlan

Articles, Book Chapters, & Popular Press

This chapter discusses the issues surrounding electronic evidence in Canada. Topics discussed include the best evidence rule, electronic signatures, web-based evidence, and video-tape and security camera evidence. In addition rules around protection of privacy, discovery, and confidentiality are pursued. Finally the chapter also considers the many issues which arise around gathering electronic evidence in the criminal context, including wiretaps, general warrants, and searches of computers and cell phones.


Kwiatkowski: Privacy Protection And Risk Analysis: Losing The Forest In The Telephoto Shots Of The Trees, Steve Coughlan Jan 2010

Kwiatkowski: Privacy Protection And Risk Analysis: Losing The Forest In The Telephoto Shots Of The Trees, Steve Coughlan

Articles, Book Chapters, & Popular Press

Checklists of factors are a helpful feature in assisting courts to determine how to find the proper balance in a variety of situations. Properly used they can help to achieve a certain level of uniformity and predictability, though they do not guarantee it. However, it is also important to recognize that checklists are a way of getting at the right analysis — they are not in and of themselves that analysis. Checklists also create the possibility of becoming encumbered in specifics and therefore losing sight of the overall goal. The Supreme Court decided two decades ago that the reasonable expectation …


The Protect America Act Of 2007: A Framework For Improving Intelligence Collection In The War On Terror, Jeffrey F. Addicott, Michael T. Mccaul Jan 2008

The Protect America Act Of 2007: A Framework For Improving Intelligence Collection In The War On Terror, Jeffrey F. Addicott, Michael T. Mccaul

Faculty Articles

The most important weapon in the War on Terror is intelligence. The Protect America Act of 2007, a modification of the Foreign Intelligence Surveillance Act (FISA), was favored by Congress for providing a positive framework for ensuring the proper rule of law kept pace with changes in technology. FISA closed the intelligence gaps that had arisen because of the application of the Act to foreign persons in foreign countries.

FISA codifies in federal law the procedures associated with how electronic surveillance and searches of acquisition of foreign intelligence is conducted. In order to conduct electronic surveillance, a court order must …


Electronic Surveillance Of Terrorism: The Intelligence/Law Enforcement Dilemma - A History, William Funk Jan 2007

Electronic Surveillance Of Terrorism: The Intelligence/Law Enforcement Dilemma - A History, William Funk

Faculty Articles

The Foreign Intelligence Surveillance Act (FISA) has been much in the news. Because the requirements for a judicial warrant under FISA do not require the traditional showings for electronic surveillance for law enforcement purposes, one of the issues relating to EISA is the extent to which surveillance under that Act may be undertaken for the purposes of criminal law enforcement, rather than for obtaining foreign counterintelligence or counterterrorism information. This issue became particularly salient after 9/11 when at the administration's urging Congress passed an amendment to KISA in the USA PATRIOT Act that eliminated the previous requirement that "the purpose" …


How To Skip The Constitution, David Cole Nov 2006

How To Skip The Constitution, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Jan 2005

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Journal Articles

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …


America After 9/11: Freedom Preserved Or Freedom Lost: Hearing Before The S. Comm. On The Judiciary, 108th Cong., Nov. 18, 2003 (Statement Of Viet D. Dinh, Prof. Of Law, Geo. U. L. Center), Viet D. Dinh Nov 2003

America After 9/11: Freedom Preserved Or Freedom Lost: Hearing Before The S. Comm. On The Judiciary, 108th Cong., Nov. 18, 2003 (Statement Of Viet D. Dinh, Prof. Of Law, Geo. U. L. Center), Viet D. Dinh

Testimony Before Congress

No abstract provided.


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …


The Death Of Privacy?, A. Michael Froomkin Jan 2000

The Death Of Privacy?, A. Michael Froomkin

Articles

The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition technology and other biometrics, cell-phone tracking, vehicle tracking, satellite monitoring, workplace surveillance, Internet tracking from cookies to "clicktrails", hardware-based identifiers, intellectual property-protecting "snitchware," and sense-enhanced searches that allow observers to see through everything from walls to clothes. The cumulative and reinforcing effect of these technologies may …


Commentary On Financial Privacy, Lynn M. Lopucki Jan 1999

Commentary On Financial Privacy, Lynn M. Lopucki

UF Law Faculty Publications

My three criticisms are this: First, Peter frames the problem as privacy versus government surveillance, thus ignoring the best solution to the problem, which is to make more information public. Second, Peter exaggerates the human need for privacy by presenting the need as immutable and essentially coextensive with embarrassment. People do not need nearly the privacy they think they do. Third, if Peter’s broad view of privacy holds, then you can forget about the information age.


The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin Jan 1995

The Metaphor Is The Key: Cryptography, The Clipper Chip, And The Constitution, A. Michael Froomkin

Articles

No abstract provided.


Criminal Evidence And The Ear Of The Law, Daniel H. Derby Jan 1986

Criminal Evidence And The Ear Of The Law, Daniel H. Derby

Scholarly Works

No abstract provided.


Electronic Surveillance, Computers, And The Fourth Amendment - The New Telecommunications Environment Calls For Reexamination Of Doctrine, Arthur R. Landever Jan 1984

Electronic Surveillance, Computers, And The Fourth Amendment - The New Telecommunications Environment Calls For Reexamination Of Doctrine, Arthur R. Landever

Law Faculty Articles and Essays

We are in the midst of a revolution in information collection and telecommunications. Computer networking, the unification of the various telecommunications systems, the establishment of central data banks, and government tracking and profiling of vast numbers of Americans present momentous challenges for our constitutional system. Increasingly, in our evolving culture, an individual enters the public setting in order to conduct his personal life. Fourth Amendment doctrine respecting electronic surveillance, as well as Supreme Court notions of "free choice" and "assumption of risk" must come to grips with this new reality. In the main, the author urges judicial intervention, as the …


A Proposed Electronic Surveillance Control Act, G. Robert Blakey, James A. Hancock Jun 1968

A Proposed Electronic Surveillance Control Act, G. Robert Blakey, James A. Hancock

Journal Articles

The purpose of this article is not to enter into the still active debate on the propriety of electronic surveillance, nor is it to reexamine the policy arguments for and against court order electronic surveillance legislation. Debate needs to be brought down to specifics. Mr. Justice Holmes had a favorite admonition, "[T]hink things instead of words." It is our purpose, therefore, to give to that debate a concrete proposal." Our proposal is a statute that is intended to serve as a starting point for meaningful dialogue; it is not meant to be the final word in the debate.


The Consent Problem In Wiretapping & Eavesdropping: Surreptitious Monitoring With The Consent Of A Participant In A Conversation, Kent Greenawalt Jan 1968

The Consent Problem In Wiretapping & Eavesdropping: Surreptitious Monitoring With The Consent Of A Participant In A Conversation, Kent Greenawalt

Faculty Scholarship

The extent to which American society should permit wiretapping and electronic eavesdropping has been considered by judges, legislators and scholars for many years, although this consideration has yet to result in legal rules that respond rationally and consistently to the conflicting demands of privacy and effective law enforcement. Constitutional analysis has, until very recently, relied on concepts like "physical invasion of a constitutionally protected area," producing distinctions with little relation to underlying social values; statutory restrictions on wiretapping have been much more severe than those imposed on eavesdropping, though the latter, particularly in light of the rapidly developing technology, poses …


Wiretapping And Bugging: Striking A Balance Between Privacy And Law Enforcement, Kent Greenawalt Jan 1967

Wiretapping And Bugging: Striking A Balance Between Privacy And Law Enforcement, Kent Greenawalt

Faculty Scholarship

The conflict between individual privacy and the needs of law enforcement occurs at a number of points in our system of criminal justice. It is not unique to wiretapping and electronic eavesdropping, but the competing claims in that area do have their own special character. They are qualitatively different from those in regard to, say, confessions. The kinds of crimes and criminals affected are different, as are the relevant assertions about individual freedom.

Law enforcement officials, almost to a man, consider wiretapping and eavesdropping valuable weapons in the fight against crime. They are most helpful in regard to consensual crimes …