Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Privacy Law

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl May 2020

Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl

Catholic University Law Review

Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.

This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …


"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook Jan 2017

The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook

American University Law Review

No abstract provided.


The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman Jul 2016

The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman

Indiana Law Journal

When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …


Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies Oct 2015

Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Fisa Court And Article Iii, Stephen I. Vladeck Jun 2015

The Fisa Court And Article Iii, Stephen I. Vladeck

Washington and Lee Law Review

No abstract provided.


Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies Jun 2015

Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies

Washington and Lee Law Review

No abstract provided.


Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi May 2015

Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover Jan 2015

Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover

Faculty Publications

The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.

This article examines how the third-party doctrine proves unsupportable …


The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies Jul 2014

The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Of Relevance And Reform Under Section 215, Peter Margulies Feb 2014

Of Relevance And Reform Under Section 215, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies Jan 2014

Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson Jan 2014

Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson

Richmond Journal of Law & Technology

On December 19, 2013, the retailer Target announced that unauthorized third parties had gained access to its customer payment information. While Target originally estimated that the security breach affected 40 million of its customers, a subsequent investigation revealed that anywhere from 70 to 110 million people—almost one in three Americans—may have had their sensitive payment information stolen. In response, the retailer offered free credit monitoring services and assured affected customers that they would not be responsible for fraudulent charges made with their payment information.


Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton Jun 2006

Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton

The University of New Hampshire Law Review

[Excerpt] “The English poet W.H. Auden once claimed that “Peeping Toms are never praised, like novelists or bird watchers, for the keenness of their observations.” Perhaps Auden would have modified his maxim had he lived in the age of terrorism. A certain degree of government surveillance of even intimate communications is expected, encouraged, and indeed praised when the government’s efforts lead to the prevention of catastrophe. However, it is also expected that the government will minimize these intrusions, will conduct surveillance only on legitimate targets, and will follow the procedural safeguards that the representatives of the people have enacted in …


The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion Oct 2005

The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion

Vanderbilt Law Review

The investigations of the 9/11 terrorist attacks highlighted a series of lapses in intelligence-sharing within the federal government regarding terrorist operations. One area closely examined by Congress,' the judiciary, and many legal and political commentators is the appropriate scope of intelligence collection within the United States "concerning foreign threats to the nation's security" ("foreign intelligence"). Domestic intelligence collection is a particularly complex sphere of national security as gathering intelligence on American soil requires balancing the privacy rights of individuals guaranteed by the Fourth Amendment against the nation's need to protect itself.

The Foreign Intelligence Surveillance Act of 1978 ("FISA") governs …


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …