Policing, databases, and surveillance
https://doi.org/10.21202/1993-047X.13.2019.1.1092-1109
EDN: YZURZR
Abstract
References
1. U.S.C. §§ 2511 & 2518.
2. U.S.C. § 2703(a), (b)(1)(B).
3. U.S.C. § 2711(2).
4. Slobogin C. Privacy at risk: The new government surveillance and the Fourth Amendment, University of Chicago, IL, Chicago Press, 2007.
5. Murphy E. The politics of privacy in the criminal justice system: Information disclosure, the Fourth Amendment, and statutory law enforcement exemptions, Michigan Law Review, 2013, Vol. 111, No. 4, pp. 485-546.
6. Florida v. Jardines, 569 U.S. 1 (2013).
7. Smith v. Maryland, 442 U.S. 735 (1979).
8. United States v. Morton Salt Co., 338 U.S. 632 (1950).
9. United States v. Miller, 425 U.S. 435 (1976).
10. United States v. Warshak, 631 F.3d 266 (6th Cir. 2010).
11. Maryland v. King, 133 S. Ct. 1958 (2013).
12. United States v. Hubbell, 530 U.S. 27 (2000).
13. Wilson v. Collins, 517 F.3d 421 (6th Cir. 2008).
14. Garner v. United States, 424 U.S. 648 (1976).
15. Baltimore Dep’t of Soc. Serv. v. Bouknight, 493 U.S. 549 (1990).
16. Murphy E. DNA in the criminal justice system: A congressional research service report, UCLA Law Review Discourse, 2016, Vol. 64, pp. 340-371.
17. United States v. Knotts, 460 U.S. 276 (1983).
18. Blumenthal J. E., Adya M., Mogle J. The multiple dimensions of privacy: Testing “lay” expectations of privacy, Pennsylvania Journal of Constitutional Law, 2009, Vol. 11, pp. 331-373.
19. Scott-Hayward C. S., Fradella H. F., Fischer R. G. Does privacy require secrecy: Societal expectations of privacy in the digital age, American Journal of Criminal Law, 2015, Vol. 43, pp. 19-60.
20. Lametti D. The Cloud: Boundless digital potential or enclosure 3.0?, Virginia Journal of Law and Technology, 2012, Vol. 17, pp. 190-243.
21. Solove D. J. Privacy and power: Computer databases and metaphors for information privacy, Stanford Law Review, 2001, Vol. 53, pp. 1393-1462.
22. Riley v. California, 134 S. Ct. 2473 (2014).
23. United States v. Jones, 565 U.S. 400 (2012).
24. LaFave W. R., Israel J. H., King N. J., Kerr O. S. Criminal procedure, 3rd ed., Eagan, MN, Thomson/West Group, 2007.
25. Florida v. J. L., 529 U.S. 266 (2000).
26. Illinois v. Gates, 462 U.S. 213 (1983).
27. Terry v. Ohio, 392 U.S. 1 (1968).
28. Kyllo v. United States, 533 U.S. 27 (2001).
29. McCarthy H. J. Decoding the decryption debate: Why legislating to restrict strong encryption will not resolve the “going dark” problem, Journal of Internet Law, 2016, Vol. 20, No. 3, pp. 1/18-39.
30. Slobogin C. Government data mining and the Fourth Amendment, University of Chicago Law Review, 2008, Vol. 75, No. 1, pp. 317-341.
31. ABA Standards for criminal justice: Law enforcement access to third part records, American Bar Association, 2013, available at: https://www.americanbar.org/content/dam/aba/publications/criminal_justice_standards/third_party_access. authcheckdam.pdf
32. Bellovin S. M., Blaze M., Landau S., Pell S. K. It’s too complicated: How the internet upends Katz, Smith, and electronic surveillance law, Harvard Journal of Law and Technology, 2016, Vol. 30, No. 1, pp. 1-101.
33. County of Riverside v. McLaughlin U. S.
34. United States v. Sharpe, 470 U.S. 675 (1985).
35. Kerr O. S. The mosaic theory of the Fourth Amendment, Michigan Law Review, 2011, Vol. 111, No. 3, pp. 311-354.
36. Slobogin C. Making the most of United States v. Jones in a surveillance society: A statutory implementation of mosaic theory, Duke Journal of Constitutional Law and Public Policy, 2012, No. 8, pp. 1-37.
37. Yamamoto E. K. White (house) lies: Why the public must compel the courts to hold the President accountable for national security abuses, Law and Contemporary Problems, 2005, Vol. 68, No. 2, pp. 285-339.
38. Lowenkamp C. T., Whetzel J. The development of an actuarial risk assessment instrument for U.S. pretrial services, Federal Probation, 2009, Vol. 73, No. 3, pp. 33-36.
39. Fagan J. Race and the new policing, Reforming criminal justice: A report of the Academy for Justice on bridging the gap between scholarship and reform, ed. Luna E., Phoenix, AZ, Academy for Justice, 2017, pp. 83-116.
40. Ferguson A. G. Big data and predictive reasonable suspicion, University of Pennsylvania Law Review, 2015, Vol. 163, No. 2, pp. 327-410.
41. Rich M. L. Machine learning, automated algorithms, and the Fourth Amendment, University of Pennsylvania Law Review, 2016, Vol. 164, pp. 871-929.
42. Barocas S., Selbst A. D. Big data’s disparate impact, California Law Review, 2016, Vol. 104, pp. 671-732.
43. Carbado D. W. Race and the Fourth Amendment, Reforming criminal justice: A report of the Academy for Justice on bridging the gap between scholarship and reform, ed. Luna E., Phoenix, AZ, Academy for Justice, 2017, pp. 153-184.
44. Harris D. A. Racial profiling, Reforming criminal justice: A report of the Academy for Justice on bridging the gap between scholarship and reform, ed. Luna E., Phoenix, AZ, Academy for Justice, 2017, pp. 117-152.
45. Selbst A. D., Barocas S. Regulating inscrutable systems (in press), available at: http://www.werobot2017.com/wpcontent/ uploads/2017/03/Selbst-and-Barocas-Regulating-Inscrutable-Systems-1.pdf
46. Kroll J. A., Huey J., Barocas S., Felten E. W., Reidenberg J. R., Robinson D. G., Yu H. Accountable algorithms, University of Pennsylvania Law Review, 2017, Vol. 165, pp. 633-705.
47. Feldman M., Friedler S., Moeller J., Scheidegger C., Venkatasubramanian S. Certifying and removing disparate impact, Proceedings of the 21st ACM SIGKDD International Conference of Knowledge Discover and Data Mining, Sydney, NSW, Australia, The Association for Computing Machinery, 2015, pp. 259-268.
48. Goel S., Perelman. M., Shroff R., Sklansky D. A. Combatting police discrimination in the age of big data, New Criminal Law Review, 2017, Vol. 20, No. 2, pp. 181-232.
49. Jones-Brown D., Stoudt B. G., Johnston B., Moran K. Stop, question, & frisk policing practices in New York City: A primer (revised ed.), 2013, available at: http://www.atlanticphilanthropies.org/app/uploads/2015/09/SQF_Primer_July_013.pdf
50. White M. D., Fradella H. F. Stop and frisk: The use and abuse of a controversial policing tactic, New York, NY, New York University Press, 2016.
51. Reel M. Secret cameras recording Baltimore’s every move from above, Bloomberg Businessweek, 2016, available at: https:// www.bloomberg.com/features/2016-baltimore-secret-surveillance/
52. Bambauer J. Hassle, Michigan Law Review, 2015, Vol. 113, No. 4, pp. 461-511.
53. Illinois v. Lidster, 540 U.S. 419 (2004).
54. Cong. Rec. S1379-02, S1416 (Jan 23, 2003).
55. Greenwald G. ZKeyscore: NSA tool collects “nearly everything a user does on the internet”, The Guardian, 2013, available at: https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
56. Perlroth N., Gelles D. Russian hackers amass over a billion internet passwords, New York Times, 2014, available at: https:// www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-abillion-stolen-internet-credentials.html
57. Sloan R. H., Warner R. The self, the Stasi, and the NSA: Privacy, knowledge, and complicity in the surveillance state, Minnesota Journal of Law, Science, and Technology, 2016, Vol. 17, No. 1, pp. 347-408.
58. Solove D. J. Digital dossiers and the dissipation of Fourth Amendment privacy, Southern California Law Review, 2004, Vol. 75, pp. 1083-1167.
59. USA Freedom Act of 2015. (2015). Pub. L. No. 114-23, § 101, 129 Stat. 268, 269-71 [amending 50 U.S.C. §§ 1861(b) (2) & (c)(2)].
60. Whittaker Z. Freedom Act will kill only one of NSA’s programs (and not even one of its worst), Zero Day, 2014, May 4, available at: http://www.zdnet.com/article/freedom-actmetadata-phone-records-prism/
61. Long C. NYPD, Microsoft create crime-fighting tech system, NBC New York, 2013, February 20, available at: http://www. nbcnewyork.com/news/local/NYPDMicrosoft-Crime-Fighting-Tech-System-192157481.html
62. Blitz M. J., Grimsley J., Henderson S. E., Thai J. Regulating drones under the First and Fourth Amendments, William and Mary Law Review, 2015, Vol. 57, No. 1, pp. 49-142.
63. Sengupta S. Privacy fears grow as cities increase surveillance, New York Times, 2013, October 13, available at: http://www. nytimes.com/2013/10/14/technology/privacy-fears-as-surveillance-grows-incities.html?mcubz=0
64. The Constitution Project. Recommendations for fusion centers: Preserving privacy and civil liberties while protecting against crime and terrorism, 2012, available at: https://constitutionproject.org/wpcontent/uploads/2012/10/fusioncenterreport.pdf
65. Slobogin C. Panvasive surveillance, political process theory, and the nondelegation doctrine, The Georgetown Law Journal, 2014, Vol. 102, pp. 1721-1776.
66. Smith M. L. Regulating law enforcement’s use of drones: The need for state legislation, Harvard Journal on Legislation, 2015, Vol. 52, pp. 423-454.
67. Garry P. M. Judicial review and the “hard look” doctrine, Nevada Law Journal, 2006, Vol. 7, pp. 151-170.
68. Ponomarenko M., Friedman B. Democratic accountability and policing, Reforming criminal justice: A report of the Academy for Justice on bridging the gap between scholarship and reform, ed. Luna E, Phoenix, AZ, Academy for Justice, 2017, pp. 5-26.
69. Slobogin C. Policing as administration, University of Pennsylvania Law Review, 2016, Vol. 165, pp. 91-152.
70. Friedman B., Stein C. B. Redefining what’s “reasonable”: The protections for policing, George Washington Law Review. 2016, Vol. 84, рp. 281-353.
71. Roth A. Maryland v. King and the wonderful, horrible DNA revolution in law enforcement, Ohio State Journal of Criminal Law, 2013, Vol. 11, pp. 295-309.
72. 5 U.S.C. § 552(b)(7)(E).
73. Hoffa v. United States, 385 U.S. 293 (1966).
74. Lewis v. United States, 385 U.S. 206 (1966).
75. Miller v. United States, 425 U.S. 435 (1976).
76. Citizens United v. Fed. Elec. Comm’n, 558 U.S. 310 (2010).
77. Hale v. Henkel, 210 U.S. 43 (1906).
78. Brennan-Marquez K. Fourth Amendment fiduciaries, Fordham Law Review, 2015, Vol. 84, No. 2, pp. 611-659.
79. Ferguson v. City of Charleston, 532 U.S. 67 (2001).
80. 31 U.S.C. § 5313(a).
81. Hoofnagle C. J. Big brother’s little helpers: How ChoicePoint and other commercial data brokers collect and package your data for law enforcement, North Carolina Journal of International Law and Commercial Regulation, 2004, Vol. 29, pp. 595-637.
82. Cover A. Y. Corporate avatars and the erosion of the populist Fourth Amendment, Iowa Law Review, 2015, Vol. 100, pp. 1441-1502.
83. Florida Stat. Ann. § 394.4615(3)(a).
84. Model Rules of Professional Conduct, American Bar Association,1983, available at: https://www.americanbar.org/groups/ professional_responsibility/publications/model_rules_of_professional_conduct/rule_1_6_confidentiality_of_information.html
85. 18 U.S.C. § 2702(c).
86. Total Information Awareness. (n.d.), Wikipedia, July 14, 2017, available at: https://en.wikipedia.org/wiki/Total_Information_ Awareness
87. Slobogin C. Policing, databases, and surveillance, Criminology, Criminal Justice, Law & Society, 2017, Vol. 18, Is. 3, pp. 70-84.
Review
For citations:
Slobogin C. Policing, databases, and surveillance. Actual Problems of Economics and Law. 2019;13(1):1092-1109. (In Russ.) https://doi.org/10.21202/1993-047X.13.2019.1.1092-1109. EDN: YZURZR