Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 19 of 19
Full-Text Articles in Privacy Law
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Catholic University Law Review
Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.
This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox
University of Richmond Law Review
No abstract provided.
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook
American University Law Review
No abstract provided.
The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman
The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman
Indiana Law Journal
When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies
Law Faculty Scholarship
No abstract provided.
The Fisa Court And Article Iii, Stephen I. Vladeck
The Fisa Court And Article Iii, Stephen I. Vladeck
Washington and Lee Law Review
No abstract provided.
Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies
Defining "Foreign Affairs" In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies
Washington and Lee Law Review
No abstract provided.
Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi
Clapper V. Amnesty International Usa: Balancing National Security And Individuals' Privacy, Kristen Choi
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover
Corporate Avatars And The Erosion Of The Populist Fourth Amendment, Avidan Cover
Faculty Publications
The current state of Fourth Amendment jurisprudence leaves it to technology corporations to challenge court orders, subpoenas, and requests by the government for individual users’ information. The third-party doctrine denies people a reasonable expectation of privacy in data they transmit through telecommunications and Internet service providers. Third-party corporations become, by default, the people’s corporate avatars. Corporate avatars, however, do a poor job of representing individuals’ interests. Moreover, vesting the Fourth Amendment’s government-oversight functions in corporations fails to cohere with the Bill of Rights’ populist history and the Framers’ distrust of corporations.
This article examines how the third-party doctrine proves unsupportable …
The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies
The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies
Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Of Relevance And Reform Under Section 215, Peter Margulies
Of Relevance And Reform Under Section 215, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies
Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson
Clapper V. Amnesty International And Data Privacy Litigation: Is A Change To The Law “Certainly Impending”?, John L. Jacobus, Benjamin B. Watson
Richmond Journal of Law & Technology
On December 19, 2013, the retailer Target announced that unauthorized third parties had gained access to its customer payment information. While Target originally estimated that the security breach affected 40 million of its customers, a subsequent investigation revealed that anywhere from 70 to 110 million people—almost one in three Americans—may have had their sensitive payment information stolen. In response, the retailer offered free credit monitoring services and assured affected customers that they would not be responsible for fraudulent charges made with their payment information.
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Law Faculty Scholarship
This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton
Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton
The University of New Hampshire Law Review
[Excerpt] “The English poet W.H. Auden once claimed that “Peeping Toms are never praised, like novelists or bird watchers, for the keenness of their observations.” Perhaps Auden would have modified his maxim had he lived in the age of terrorism. A certain degree of government surveillance of even intimate communications is expected, encouraged, and indeed praised when the government’s efforts lead to the prevention of catastrophe. However, it is also expected that the government will minimize these intrusions, will conduct surveillance only on legitimate targets, and will follow the procedural safeguards that the representatives of the people have enacted in …
The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion
The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion
Vanderbilt Law Review
The investigations of the 9/11 terrorist attacks highlighted a series of lapses in intelligence-sharing within the federal government regarding terrorist operations. One area closely examined by Congress,' the judiciary, and many legal and political commentators is the appropriate scope of intelligence collection within the United States "concerning foreign threats to the nation's security" ("foreign intelligence"). Domestic intelligence collection is a particularly complex sphere of national security as gathering intelligence on American soil requires balancing the privacy rights of individuals guaranteed by the Fourth Amendment against the nation's need to protect itself.
The Foreign Intelligence Surveillance Act of 1978 ("FISA") governs …
The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog
The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog
Faculty Scholarship
Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …