Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Big Data Blacklisting, Margaret Hu Sep 2015

Big Data Blacklisting, Margaret Hu

Faculty Publications

“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …


Does The "One-Party Consent" Exception Effectuate The Underlying Goals Of Title Iii?, Thomas C. Daniels Jul 2015

Does The "One-Party Consent" Exception Effectuate The Underlying Goals Of Title Iii?, Thomas C. Daniels

Akron Law Review

Title III is an attempt to balance two purposes - protection of private citizens and control of organized crime. 9 Because of these diametric purposes, discussion of all aspects of Title III is beyond the scope of this comment. The first section of this comment will discuss the Supreme Court's past and present position on the use of electronic surveillance. The remainder of the comment will trace the development of the "one-party consent" exception as codified in Title III, analyzing its continued validity and applicability to private unauthorized electronic surveillance.


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley Apr 2015

Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley

Michigan Law Review First Impressions

Electronic surveillance in the digital age is essentially a cat-and-mouse game between governmental agencies that are developing new techniques and technologies for surveillance, juxtaposed against privacy rights advocates who voice concerns about such technologies. In November 2014, there was a discovery of a new twist on a relatively old theme. Recently, the Wall Street Journal reported that the U.S. Marshals Service was running a surveillance program employing devices—dirtboxes—that gather all cell phone numbers in the surrounding area. Other federal agencies, including the Drug Enforcement Agency, Immigration and Custom Enforcement, and the Department of Homeland Security, are also documented to have …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Apr 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


The Law Of Electronic Surveillance, Patricia Bellia, James Carr Mar 2015

The Law Of Electronic Surveillance, Patricia Bellia, James Carr

Patricia L. Bellia

The Law of Electronic Surveillance provides objective analysis of issues related to the government's gathering of evidence through electronic devices. Providing more than 2,500 case citations, it covers major developments and important cases. Key topics include: Challenging court-ordered wiretaps; Electronic search warrants; Foreign intelligence surveillance; Suppression of evidence obtained; Voice exemplars and other identification evidence; Electronic surveillance of a defendant s attorney; Legal uses that may be made of evidence obtained from electronic surveillance; Confronting and challenging electronic surveillance; Executing an electronic search; Criminal penalties and civil remedies for illegal electronic surveillance; Electronic surveillance types and legal developments prior to …


Assessing The Velocity, Scale, Volume, Intensity And “Creedal Congruence” Of Immigrants In Setting A Nation’S Admissions Policy, David Barnhizer Jan 2015

Assessing The Velocity, Scale, Volume, Intensity And “Creedal Congruence” Of Immigrants In Setting A Nation’S Admissions Policy, David Barnhizer

David Barnhizer

Table of Contents Death of the “Melting Pot” The Rejection of Assimilation and the Rise of “Identity Sects” Western Europe and the US Face Significant Challenges to Their Creeds and Cultures The Radicalizing Search for Identity and Meaning The Velocity, Scale and Difference of Migrant Entry Into Dissimilar Cultures Assimilation Is Not Easy Under the Best of Circumstances ISIS, al-Qaeda and The Old Man of the Mountain What Are the Creedal Values For Which Western Nations Should Expect Commitment from Immigrants and Citizens? “Warning! Do Not Approach!” Beyond Non-Assimilation to Cultural Transformation The Right to Preserve a “Cultural Ecosystem” The …