Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Surveillance

Discipline
Institution
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Law

Postmodern Social Control: Dividuals And Surveillance, Ernest M. Oleksy Dec 2017

Postmodern Social Control: Dividuals And Surveillance, Ernest M. Oleksy

The Downtown Review

As a society's foundational philosophy changes, so, too, will its forms of social control. By using the works of thinkers like Deleuze and Foucault as pivot points, the dynamic nature of social interactions and the agents to mediate those actions shall be investigated. This article includes findings from archival analysis written in a journalistic prose for simplicity of consumption.


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


A Look At The Fourth Amendment Implications Of Drone Surveillance By Law Enforcement Today, Mary Mara Oct 2017

A Look At The Fourth Amendment Implications Of Drone Surveillance By Law Enforcement Today, Mary Mara

ConLawNOW

This paper will examine the current state of drone technology and its increasing prevalence in private and public settings. As police agencies seek to incorporate this new technology into their crime-fighting arsenal, serious Fourth Amendment privacy considerations arise. Although a national debate rages in this country about the impact of modern technology on privacy rights, Congress, the Federal Aviation Authority (FAA), and the Supreme Court have yet to weigh in on the Fourth Amendment implications of warrantless drone surveillance by law enforcement. Furthermore, while some states have attempted to step into the breach by passing legislation which limits the use …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


Implementing The International Health Regulations (2005) With Search Engine-Based Syndromic Surveillance, Ryan Sullivan Jun 2017

Implementing The International Health Regulations (2005) With Search Engine-Based Syndromic Surveillance, Ryan Sullivan

Georgia Journal of International & Comparative Law

No abstract provided.


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum Jun 2017

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


When Personal Becomes Profitable: Data Collection And The Complex Link Between Corporate And Government Surveillance And The Risk To Civil Liberties, Justin Gump Jun 2017

When Personal Becomes Profitable: Data Collection And The Complex Link Between Corporate And Government Surveillance And The Risk To Civil Liberties, Justin Gump

Honors Theses

Personal data represents a commodity of increasing interest to both the United States government and large corporations. While their reasons differ, the two powerful entities have worked together to radically expand the domestic surveillance activities in the U.S. As the government surreptitiously expanded its domestic surveillance under the guise of its “war on terror,” it quickly realized that the advanced technology and access to personal data held by many large corporations presented a valuable source of surveillance information. These companies, in turn, similarly saw an opportunity for revenue in both the sale of the data and large governmental contracts to …


Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley Apr 2017

Legal Challenges Facing Unmanned Aerial Systems And Commercial Agriculture, Peggy Kirk Hall, Rusty Rumley

University of Arkansas at Little Rock Law Review

No abstract provided.


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque Mar 2017

Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque

University of Richmond Law Review

No abstract provided.


"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


Issue 3: Table Of Contents Mar 2017

Issue 3: Table Of Contents

University of Richmond Law Review

No abstract provided.


Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks Mar 2017

Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks

University of Richmond Law Review

No abstract provided.


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies Feb 2017

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff Jan 2017

Protecting Homeowners' Privacy Rights In The Age Of Drones: The Role Of Community Associations, Hillary B. Farber, Marvin J. Nodiff

Faculty Publications

Homeowners' notions of privacy in their dwellings and surroundings are under attack from the threat of pervasive surveillance by small civilian drones equipped with highly sophisticated visual and data-gathering capabilities. Streamlined rules recently issued by the Federal Aviation Administration ("FAA') have unleashed technological innovation that promises great societal benefits. However, the new rules expose homeowners to unwanted snooping because they lack limits on the distance drones may operate from residential dwellings or time of operations. Indeed, our society should not expect a federal agency to deal effectively with the widely diverse issues of drone technology facing the states, given the …


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Policing Predictive Policing, Andrew Ferguson Jan 2017

Policing Predictive Policing, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Predictive policing is sweeping the nation, promising the holy grail of policing – preventing crime before it happens. Police have embraced predictive analytics and data-driven metrics to improve law enforcement tactics, practice, and strategy. Predictive “hot spots” become targets for intensive police surveillance. Targeted “hot people” become suspects. In big cities and small towns, data-based predictions drive police patrol schedules. Risk assessment algorithms target suspicious individuals. Increased data collection fuels a growing feedback loop requiring more robust data crunching systems.All of these predictive innovations share one thing in common: a belief that crime can be understood by identifying and analyzing …


Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog Jan 2017

Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …


Arkansas Airspace Ownership And The Challenge Of Drones, Lindsey P. Gustafson Jan 2017

Arkansas Airspace Ownership And The Challenge Of Drones, Lindsey P. Gustafson

University of Arkansas at Little Rock Law Review

No abstract provided.


Keeping Up With New Legal Titles, Franklin L. Runge Jan 2017

Keeping Up With New Legal Titles, Franklin L. Runge

Law Faculty Scholarly Articles

In this book review, Franklin L. Runge discusses The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016) by Laura K. Donohue.


Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance Jan 2017

Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance

UF Law Faculty Publications

In the wake of high-profile incidents of school violence, school officials have increased their reliance on a host of surveillance measures to maintain order and control in their schools. Paradoxically, such practices can foster hostile environments that may lead to even more disorder and dysfunction. These practices may also contribute to the so-called “school-to-prison pipeline” by pushing more students out of school and into the juvenile justice system. However, not all students experience the same level of surveillance. This Article presents data on school surveillance practices, including an original empirical analysis of restricted data recently released by the U.S. Department …


Performative Privacy, Scott Skinner-Thompson Jan 2017

Performative Privacy, Scott Skinner-Thompson

Publications

Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.

This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …


Health Information Equity, Craig Konnoth Jan 2017

Health Information Equity, Craig Konnoth

Publications

In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …