Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Privacy Law

Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger Jan 2015

Intelligence Legalism And The National Security Agency’S Civil Liberties Gap, Margo Schlanger

Articles

Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. Some have suggested that what we have learned is that the NSA is running wild, lawlessly flouting legal constraints on its behavior. This assessment is unfair. In fact, the picture that emerges from …


The Fight To Frame Privacy, Woodrow Hartzog Apr 2013

The Fight To Frame Privacy, Woodrow Hartzog

Michigan Law Review

In his important new book, Nothing to Hide: The False Tradeoff Between Privacy and Security, Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that the predetermined abandonment of privacy in security-related disputes means that the structure of the privacy-security debate is inherently flawed. Solove understands that privacy is far too vital to our freedom and democracy to accept its inevitable demise. The central thesis of this Review is that Solove's polemic is a strong and desperately needed collection of frames that counterbalances the "nothing …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Do We Need A New Fourth Amendment?, Orin S. Kerr Apr 2009

Do We Need A New Fourth Amendment?, Orin S. Kerr

Michigan Law Review

Slobogin's book offers a new conceptualization of the Fourth Amendment rooted in what he calls the proportionality principle: An investigative technique should be permitted under the Constitution only if the strength of the government's justification for the technique is roughly proportionate to the level of intrusion it causes . Slobogin roots this principle in Terry v. Ohio and its pragmatic balancing of law-enforcement and privacy interests. To determine how much justification the Fourth Amendment requires, Slobogin argues, courts should assess the intrusiveness of the investigatory technique and then set a proportionate threshold of proof that the government must show. The …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Mar 2004

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Michigan Law Review

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Katz Is Dead. Long Live Katz, Peter P. Swire Mar 2004

Katz Is Dead. Long Live Katz, Peter P. Swire

Michigan Law Review

Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …


The New Privacy, Paul M. Schwartz, William M. Treanor May 2003

The New Privacy, Paul M. Schwartz, William M. Treanor

Michigan Law Review

In 1964, as the welfare state emerged in full force in the United States, Charles Reich published The New Property, one of the most influential articles ever to appear in a law review. Reich argued that in order to protect individual autonomy in an "age of governmental largess," a new property right in governmental benefits had to be recognized. He called this form of property the "new property." In retrospect, Reich, rather than anticipating trends, was swimming against the tide of history. In the past forty years, formal claims to government benefits have become more tenuous rather than more secure. …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Privacy In Confucian And Taoist Thought, Christina B. Whitman Jan 1985

Privacy In Confucian And Taoist Thought, Christina B. Whitman

Book Chapters

Only three aspects of the broad concept "privacy" will be explored in this essay: privacy as providing a sphere for intimate personal relationships with family and friends, privacy as freedom from surveillance for purposes of gathering personal information, and privacy as freedom from interference by government or social controls. These concepts describe quite different concerns. They are often grouped together under the single term "privacy," but not without some strain... A comparison between a modern Western value and its counterpart, if any, in very early Confucian and Taoist belief is inevitably somewhat strained. But it serves a purpose. If nothing …


Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb Apr 1980

Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb

University of Michigan Journal of Law Reform

This article evaluates the constitutionality of CCTV "searches." Part I discusses the present uses being made of closed circuit technology and evaluates the merits of the CCTV surveillance system. The critical policy trade-off is the system's effectiveness in combatting crime against the resulting loss of privacy to individual citizens.

Part II considers the constitutional implications of CCTV use in terms of three major doctrines: the Fourth Amendment prohibition against "unreasonable searches and seizures"; the constitutional right of privacy; and the First Amendment guarantees of free speech and association. This part briefly summarizes the state of the law concerning these constitutional …


Westin: Privacy And Freedom, Stanley K. Laughlin Jr. Mar 1968

Westin: Privacy And Freedom, Stanley K. Laughlin Jr.

Michigan Law Review

A Review of Privacy and Freedom by Alan F. Westin


The Criminal's Right Of Privacy Jun 1929

The Criminal's Right Of Privacy

Michigan Law Review

The dissent of Mr. Justice Brandeis in the famed wire tapping case has been of especial interest to those who are acquainted with his article in the Harvard Law Review in 1890 on "The Right of Privacy." The law has witnessed few more fascinating developments than the engrafting of this latter concept into the formula of justice, few more conspicuous examples of creative juristic effort. Concerning it Dean Pound has said: "What may almost be called the classical example (of creative activity) is the paper on the Right of Privacy in which Mr. Justice Brandeis, then at the bar, was …