Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (32)
- Privacy Law (28)
- Internet Law (24)
- Constitutional Law (19)
- Science and Technology Law (12)
-
- Fourth Amendment (10)
- Computer Law (9)
- Criminal Law (9)
- Social and Behavioral Sciences (8)
- Human Rights Law (7)
- Arts and Humanities (6)
- Comparative and Foreign Law (6)
- International Law (6)
- Law and Politics (6)
- Law and Society (6)
- President/Executive Department (6)
- Administrative Law (5)
- Communications Law (5)
- Criminal Procedure (5)
- First Amendment (5)
- Legislation (5)
- Military, War, and Peace (5)
- Public Affairs, Public Policy and Public Administration (4)
- Civil Rights and Discrimination (3)
- History (3)
- Jurisprudence (3)
- Law and Economics (3)
- Agency (2)
- American Studies (2)
- Institution
-
- Selected Works (11)
- Roger Williams University (7)
- Schulich School of Law, Dalhousie University (6)
- University of Richmond (3)
- Washington and Lee University School of Law (3)
-
- Brooklyn Law School (2)
- Chicago-Kent College of Law (2)
- Cleveland State University (2)
- Columbia Law School (2)
- Florida A&M University College of Law (2)
- Fordham Law School (2)
- George Washington University Law School (2)
- Georgetown University Law Center (2)
- Maurer School of Law: Indiana University (2)
- Penn State Dickinson Law (2)
- SelectedWorks (2)
- American University Washington College of Law (1)
- BLR (1)
- California Western School of Law (1)
- Case Western Reserve University School of Law (1)
- Pepperdine University (1)
- Seattle University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- U.S. Naval War College (1)
- US Army War College (1)
- Union College (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- University of Oklahoma College of Law (1)
- Publication Year
- Publication
-
- Articles, Book Chapters, & Popular Press (6)
- Law Faculty Scholarship (6)
- Faculty Scholarship (3)
- Brooklyn Law Review (2)
- David Barnhizer (2)
-
- Fordham Law Review (2)
- GW Law Faculty Publications & Other Works (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Indiana Law Journal (2)
- Laurie B. Serafino (2)
- Susan Freiwald (2)
- University of Richmond Law Review (2)
- Washington and Lee Law Review (2)
- All Faculty Scholarship (1)
- American University Business Law Review (1)
- Articles (1)
- Case Western Reserve Journal of International Law (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Dickinson Law Review (2017-Present) (1)
- ExpressO (1)
- Faculty Books and Book Contributions (1)
- Faculty Scholarly Works (1)
- Florida A & M University Law Review (1)
- Honors Theses (1)
- International Law Studies (1)
- Journal of Business & Technology Law (1)
- Law Faculty Publications (1)
- Lawrence J. Trautman Sr. (1)
- Margaret Hu (1)
- Publication Type
- File Type
Articles 1 - 30 of 69
Full-Text Articles in Law
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Articles
In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …
Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue
Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Supreme Court’s 2022 decision in Federal Bureau of Investigation v. Fazaga heralds a worrying trend. Over the past 15 years, as more information about how the government wields its foreign intelligence collection authorities on U.S. soil has become available, it has become clear that the government has repeatedly acted outside its constitutional and statutory limits, and at times, in flagrant disregard for judicial orders. As a result, dozens of cases challenging surveillance have been making their way through the courts. Unlike in prior eras, in certain cases it has become easier for litigants to establish an injury-in-fact in light …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Same As It Ever Was : The Tijuana River Sewage Crisis, Non-State Actors, And The State, James M. Cooper
Same As It Ever Was : The Tijuana River Sewage Crisis, Non-State Actors, And The State, James M. Cooper
Faculty Scholarship
Sewage—a scary mixture of human waste and industrial toxins—flows into the Tijuana River Valley, an environmentally sensitive watershed that straddles the United Mexican States ("Mexico") and the United States of America. Treatment plants, a deteriorating one in Punta Bandera with limited capacity south of the border, and another in San Diego County completed in 1997, are inadequate to process the volume of sewage. So much sewage made its way into the Tijuana River that CBS 60 Minutes broadcast a special report on the binational environmental disaster in 2020.
Border factories and a population spike contribute to the sewage. Maquiladoras, …
It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion
It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion
Faculty Scholarly Works
No abstract provided.
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Catholic University Law Review
Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.
This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …
Cybersurveillance In A Free Society, Russell L. Weaver
Cybersurveillance In A Free Society, Russell L. Weaver
Russell L. Weaver
No abstract provided.
Edward Snowden, National Security Whistleblowing, And Civil Disobedience, David E. Pozen
Edward Snowden, National Security Whistleblowing, And Civil Disobedience, David E. Pozen
Faculty Scholarship
No recent whistleblower has been more lionized or vilified than Edward Snowden. He has been nominated for the Nobel Peace Prize and denounced as a "total traitor" deserving of the death penalty. In these debates, Snowden's defenders tend to portray him as a civil disobedient. Yet for a range of reasons, Snowden's situation does not map neatly onto traditional theories of civil disobedience. The same holds true for most cases of national security whistleblowing.
The contradictory and confused responses that these cases provoke, this essay suggests, are not just the product of polarized politics or insufficient information. Rather, they reflect …
The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim
Indiana Law Journal
On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …
Bulk Biometric Metadata Collection, Margaret Hu
Bulk Biometric Metadata Collection, Margaret Hu
Scholarly Articles
Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …
When Personal Becomes Profitable: Data Collection And The Complex Link Between Corporate And Government Surveillance And The Risk To Civil Liberties, Justin Gump
Honors Theses
Personal data represents a commodity of increasing interest to both the United States government and large corporations. While their reasons differ, the two powerful entities have worked together to radically expand the domestic surveillance activities in the U.S. As the government surreptitiously expanded its domestic surveillance under the guise of its “war on terror,” it quickly realized that the advanced technology and access to personal data held by many large corporations presented a valuable source of surveillance information. These companies, in turn, similarly saw an opportunity for revenue in both the sale of the data and large governmental contracts to …
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks
Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks
University of Richmond Law Review
No abstract provided.
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber
Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber
Brooklyn Law Review
No abstract provided.
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Margaret Hu
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
Spying, Ronald Griffin
Spying, Ronald Griffin
Faculty Books and Book Contributions
Ronald C. Griffin’s paper Spying, which is the third paper in the book Selected Issues in Modern Jurisprudence, edited by David A. Frenkel, begins with the finding in the Church Committee Report in the USA. It spotlights Edward Snowden’s disclosure about the NSA, reviews pertinent laws about spying and parades some suggestions and recommendation to curb government excesses.
Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer
Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer
Richmond Journal of Law & Technology
Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated by these resources are obvious, and have been for years. And because clients expect their counsel to take full advantage, savvy attorneys understand that they must keep up with ever-evolving legal technologies to stay competitive in a crowded marketplace.
A Domestic Consequence Of The Government Spying On Its Citizens: The Guilty Go Free, Mystica M. Alexander, William P. Wiggins
A Domestic Consequence Of The Government Spying On Its Citizens: The Guilty Go Free, Mystica M. Alexander, William P. Wiggins
Brooklyn Law Review
In recent years, a seemingly endless stream of headlines have alerted people to the steady and relentless government encroachment on their civil liberties. Consider, for example, headlines such as “U.S. Directs Agents to Cover Up Program Used to Investigate Americans,” “DEA Admits to Keeping Secret Database of Phone Calls,” or “No Morsel Too Miniscule for All-Consuming N.S.A.” Of concern is not only the U.S. government’s collection of data on its citizens, but also how that information is aggregated, stored, and used. The Fourth Amendment protects citizens from unreasonable searches and seizures by the government. While the drafters of the Fourth …
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …
The Usa Patriot Act And Punctuated Equilibrium, Michael Sanders
The Usa Patriot Act And Punctuated Equilibrium, Michael Sanders
Walden Dissertations and Doctoral Studies
Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law. Proponents of the title advocate the necessity of the act to combat modern terrorism, whereas opponents warn of circumventions of the Fourth Amendment of the U.S. Constitution. Using punctuated equilibrium as the theoretical foundation, the purpose of this case study was to explore the dialogue and legal exchanges between the American Civil Liberties Union and the Department of …
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Washington and Lee Law Review
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
Standing And Covert Surveillance, Christopher Slobogin
Standing And Covert Surveillance, Christopher Slobogin
Pepperdine Law Review
This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Law Faculty Publications
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Cybersurveillance In A Free Society, Russell L. Weaver
Cybersurveillance In A Free Society, Russell L. Weaver
Washington and Lee Law Review
No abstract provided.