Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (10)
- National Security Law (8)
- Fourth Amendment (6)
- Constitutional Law (5)
- Science and Technology Law (5)
-
- Computer Law (4)
- Criminal Law (4)
- Internet Law (4)
- Air and Space Law (3)
- Civil Rights and Discrimination (3)
- International Law (3)
- President/Executive Department (3)
- Social and Behavioral Sciences (3)
- Civil Law (2)
- Comparative and Foreign Law (2)
- Health Law and Policy (2)
- Human Rights Law (2)
- Law and Politics (2)
- Law and Race (2)
- Law and Society (2)
- Sociology (2)
- Agency (1)
- Agriculture Law (1)
- Arts and Humanities (1)
- Business (1)
- Common Law (1)
- Computer Sciences (1)
- Criminology (1)
- Criminology and Criminal Justice (1)
- Institution
-
- University of Richmond (4)
- Washington and Lee University School of Law (3)
- Boston University School of Law (2)
- University of Arkansas at Little Rock William H. Bowen School of Law (2)
- University of Colorado Law School (2)
-
- University of Georgia School of Law (2)
- American University Washington College of Law (1)
- Cleveland State University (1)
- Maurer School of Law: Indiana University (1)
- Roger Williams University (1)
- Selected Works (1)
- The University of Akron (1)
- Union College (1)
- University of Florida Levin College of Law (1)
- University of Kentucky (1)
- University of Massachusetts School of Law (1)
- University of Pittsburgh School of Law (1)
- Publication
-
- University of Richmond Law Review (4)
- Scholarly Articles (3)
- Faculty Scholarship (2)
- Georgia Journal of International & Comparative Law (2)
- Publications (2)
-
- University of Arkansas at Little Rock Law Review (2)
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- ConLawNOW (1)
- Faculty Publications (1)
- Honors Theses (1)
- Indiana Journal of Global Legal Studies (1)
- Law Faculty Scholarly Articles (1)
- Life of the Law School (1993- ) (1)
- Teresa A. Miller (1)
- The Downtown Review (1)
- UF Law Faculty Publications (1)
- Publication Type
Articles 1 - 26 of 26
Full-Text Articles in Law
Postmodern Social Control: Dividuals And Surveillance, Ernest M. Oleksy
Postmodern Social Control: Dividuals And Surveillance, Ernest M. Oleksy
The Downtown Review
As a society's foundational philosophy changes, so, too, will its forms of social control. By using the works of thinkers like Deleuze and Foucault as pivot points, the dynamic nature of social interactions and the agents to mediate those actions shall be investigated. This article includes findings from archival analysis written in a journalistic prose for simplicity of consumption.
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
A Look At The Fourth Amendment Implications Of Drone Surveillance By Law Enforcement Today, Mary Mara
A Look At The Fourth Amendment Implications Of Drone Surveillance By Law Enforcement Today, Mary Mara
ConLawNOW
This paper will examine the current state of drone technology and its increasing prevalence in private and public settings. As police agencies seek to incorporate this new technology into their crime-fighting arsenal, serious Fourth Amendment privacy considerations arise. Although a national debate rages in this country about the impact of modern technology on privacy rights, Congress, the Federal Aviation Authority (FAA), and the Supreme Court have yet to weigh in on the Fourth Amendment implications of warrantless drone surveillance by law enforcement. Furthermore, while some states have attempted to step into the breach by passing legislation which limits the use …
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
Implementing The International Health Regulations (2005) With Search Engine-Based Syndromic Surveillance, Ryan Sullivan
Implementing The International Health Regulations (2005) With Search Engine-Based Syndromic Surveillance, Ryan Sullivan
Georgia Journal of International & Comparative Law
No abstract provided.
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Georgia Journal of International & Comparative Law
No abstract provided.
When Personal Becomes Profitable: Data Collection And The Complex Link Between Corporate And Government Surveillance And The Risk To Civil Liberties, Justin Gump
Honors Theses
Personal data represents a commodity of increasing interest to both the United States government and large corporations. While their reasons differ, the two powerful entities have worked together to radically expand the domestic surveillance activities in the U.S. As the government surreptitiously expanded its domestic surveillance under the guise of its “war on terror,” it quickly realized that the advanced technology and access to personal data held by many large corporations presented a valuable source of surveillance information. These companies, in turn, similarly saw an opportunity for revenue in both the sale of the data and large governmental contracts to …
Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley
Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley
University of Arkansas at Little Rock Law Review
No abstract provided.
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque
Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque
University of Richmond Law Review
No abstract provided.
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks
Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks
University of Richmond Law Review
No abstract provided.
Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies
Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies
Life of the Law School (1993- )
No abstract provided.
Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff
Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff
Faculty Publications
Homeowners' notions of privacy in their dwellings and surroundings are under attack from the threat of pervasive surveillance by small civilian drones equipped with highly sophisticated visual and data-gathering capabilities. Streamlined rules recently issued by the Federal Aviation Administration ("FAA') have unleashed technological innovation that promises great societal benefits. However, the new rules expose homeowners to unwanted snooping because they lack limits on the distance drones may operate from residential dwellings or time of operations. Indeed, our society should not expect a federal agency to deal effectively with the widely diverse issues of drone technology facing the states, given the …
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Scholarly Articles
This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …
Crimmigration-Counterterrorism, Margaret Hu
Crimmigration-Counterterrorism, Margaret Hu
Scholarly Articles
The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
Scholarly Articles
This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Policing Predictive Policing, Andrew Ferguson
Policing Predictive Policing, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Predictive policing is sweeping the nation, promising the holy grail of policing – preventing crime before it happens. Police have embraced predictive analytics and data-driven metrics to improve law enforcement tactics, practice, and strategy. Predictive “hot spots” become targets for intensive police surveillance. Targeted “hot people” become suspects. In big cities and small towns, data-based predictions drive police patrol schedules. Risk assessment algorithms target suspicious individuals. Increased data collection fuels a growing feedback loop requiring more robust data crunching systems.All of these predictive innovations share one thing in common: a belief that crime can be understood by identifying and analyzing …
Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog
Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog
Faculty Scholarship
It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …
Arkansas Airspace Ownership And The Challenge Of Drones, Lindsey P. Gustafson
Arkansas Airspace Ownership And The Challenge Of Drones, Lindsey P. Gustafson
University of Arkansas at Little Rock Law Review
No abstract provided.
Keeping Up With New Legal Titles, Franklin L. Runge
Keeping Up With New Legal Titles, Franklin L. Runge
Law Faculty Scholarly Articles
In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.
Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance
Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance
UF Law Faculty Publications
In the wake of high-profile incidents of school violence, school officials have increased their reliance on a host of surveillance measures to maintain order and control in their schools. Paradoxically, such practices can foster hostile environments that may lead to even more disorder and dysfunction. These practices may also contribute to the so-called “school-to-prison pipeline” by pushing more students out of school and into the juvenile justice system. However, not all students experience the same level of surveillance. This Article presents data on school surveillance practices, including an original empirical analysis of restricted data recently released by the U.S. Department …
Performative Privacy, Scott Skinner-Thompson
Performative Privacy, Scott Skinner-Thompson
Publications
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.
This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …
Health Information Equity, Craig Konnoth
Health Information Equity, Craig Konnoth
Publications
In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …