Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

NSA

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 69

Full-Text Articles in Law

Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang Apr 2023

Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang

Articles

In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …


Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue Feb 2023

Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Supreme Court’s 2022 decision in Federal Bureau of Investigation v. Fazaga heralds a worrying trend. Over the past 15 years, as more information about how the government wields its foreign intelligence collection authorities on U.S. soil has become available, it has become clear that the government has repeatedly acted outside its constitutional and statutory limits, and at times, in flagrant disregard for judicial orders. As a result, dozens of cases challenging surveillance have been making their way through the courts. Unlike in prior eras, in certain cases it has become easier for litigants to establish an injury-in-fact in light …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Same As It Ever Was : The Tijuana River Sewage Crisis, Non-State Actors, And The State, James M. Cooper Jan 2022

Same As It Ever Was : The Tijuana River Sewage Crisis, Non-State Actors, And The State, James M. Cooper

Faculty Scholarship

Sewage—a scary mixture of human waste and industrial toxins—flows into the Tijuana River Valley, an environmentally sensitive watershed that straddles the United Mexican States ("Mexico") and the United States of America. Treatment plants, a deteriorating one in Punta Bandera with limited capacity south of the border, and another in San Diego County completed in 1997, are inadequate to process the volume of sewage. So much sewage made its way into the Tijuana River that CBS 60 Minutes broadcast a special report on the binational environmental disaster in 2020.

Border factories and a population spike contribute to the sewage. Maquiladoras, …


It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion Sep 2021

It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion

Faculty Scholarly Works

No abstract provided.


Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl May 2020

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl

Catholic University Law Review

Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.

This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …


Cybersurveillance In A Free Society, Russell L. Weaver Jun 2019

Cybersurveillance In A Free Society, Russell L. Weaver

Russell L. Weaver

No abstract provided.


Edward Snowden, National Security Whistleblowing, And Civil Disobedience, David E. Pozen Jan 2019

Edward Snowden, National Security Whistleblowing, And Civil Disobedience, David E. Pozen

Faculty Scholarship

No recent whistleblower has been more lionized or vilified than Edward Snowden. He has been nominated for the Nobel Peace Prize and denounced as a "total traitor" deserving of the death penalty. In these debates, Snowden's defenders tend to portray him as a civil disobedient. Yet for a range of reasons, Snowden's situation does not map neatly onto traditional theories of civil disobedience. The same holds true for most cases of national security whistleblowing.

The contradictory and confused responses that these cases provoke, this essay suggests, are not just the product of polarized politics or insufficient information. Rather, they reflect …


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


When Personal Becomes Profitable: Data Collection And The Complex Link Between Corporate And Government Surveillance And The Risk To Civil Liberties, Justin Gump Jun 2017

When Personal Becomes Profitable: Data Collection And The Complex Link Between Corporate And Government Surveillance And The Risk To Civil Liberties, Justin Gump

Honors Theses

Personal data represents a commodity of increasing interest to both the United States government and large corporations. While their reasons differ, the two powerful entities have worked together to radically expand the domestic surveillance activities in the U.S. As the government surreptitiously expanded its domestic surveillance under the guise of its “war on terror,” it quickly realized that the advanced technology and access to personal data held by many large corporations presented a valuable source of surveillance information. These companies, in turn, similarly saw an opportunity for revenue in both the sale of the data and large governmental contracts to …


"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks Mar 2017

Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks

University of Richmond Law Review

No abstract provided.


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber Dec 2016

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


Taxonomy Of The Snowden Disclosures, Margaret Hu Feb 2016

Taxonomy Of The Snowden Disclosures, Margaret Hu

Margaret Hu

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Spying, Ronald Griffin Jan 2016

Spying, Ronald Griffin

Faculty Books and Book Contributions

Ronald C. Griffin’s paper Spying, which is the third paper in the book Selected Issues in Modern Jurisprudence, edited by David A. Frenkel, begins with the finding in the Church Committee Report in the USA. It spotlights Edward Snowden’s disclosure about the NSA, reviews pertinent laws about spying and parades some suggestions and recommendation to curb government excesses.


Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer Jan 2016

Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer

Richmond Journal of Law & Technology

Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated by these resources are obvious, and have been for years. And because clients expect their counsel to take full advantage, savvy attorneys understand that they must keep up with ever-evolving legal technologies to stay competitive in a crowded marketplace.


A Domestic Consequence Of The Government Spying On Its Citizens: The Guilty Go Free, Mystica M. Alexander, William P. Wiggins Jan 2016

A Domestic Consequence Of The Government Spying On Its Citizens: The Guilty Go Free, Mystica M. Alexander, William P. Wiggins

Brooklyn Law Review

In recent years, a seemingly endless stream of headlines have alerted people to the steady and relentless government encroachment on their civil liberties. Consider, for example, headlines such as “U.S. Directs Agents to Cover Up Program Used to Investigate Americans,” “DEA Admits to Keeping Secret Database of Phone Calls,” or “No Morsel Too Miniscule for All-Consuming N.S.A.” Of concern is not only the U.S. government’s collection of data on its citizens, but also how that information is aggregated, stored, and used. The Fourth Amendment protects citizens from unreasonable searches and seizures by the government. While the drafters of the Fourth …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


The Usa Patriot Act And Punctuated Equilibrium, Michael Sanders Jan 2016

The Usa Patriot Act And Punctuated Equilibrium, Michael Sanders

Walden Dissertations and Doctoral Studies

Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law. Proponents of the title advocate the necessity of the act to combat modern terrorism, whereas opponents warn of circumventions of the Fourth Amendment of the U.S. Constitution. Using punctuated equilibrium as the theoretical foundation, the purpose of this case study was to explore the dialogue and legal exchanges between the American Civil Liberties Union and the Department of …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law Oct 2015

Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies Oct 2015

Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Taxonomy Of The Snowden Disclosures, Margaret Hu Sep 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Washington and Lee Law Review

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Standing And Covert Surveillance, Christopher Slobogin Jul 2015

Standing And Covert Surveillance, Christopher Slobogin

Pepperdine Law Review

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini Jul 2015

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman Jul 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Cybersurveillance In A Free Society, Russell L. Weaver Jun 2015

Cybersurveillance In A Free Society, Russell L. Weaver

Washington and Lee Law Review

No abstract provided.