Computers, Privacy & the Constitution

View   r2  >  r1  ...
YinHuangFirstPaper 2 - 02 Apr 2012 - Main.YinHuang
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Line: 17 to 17
 

Subsection A

Added:
>
>
The Electronic Communications Privacy Act (“ECPA”) and the Stored Communications Act (“SCA”). There are, of course, major problems with the issue. We are sending copies everywhere to people who don’t have their shit together! There is a danger, however, subpoena

What is the major danger of widespread, unsupervised cooperation between service providers, like Google and Facebook, and the government? There are two major branches to this question. First is what Professor Philip Bobbitt has called the “strategic” dimension. The government has routinely carried out surveillance on foreign nationals. After the Patriot Act, its ability to surveil American citizens has also dramatically broadened. Now, the government is not yet prepared to take some form of preemptive action against perceived “threats” from its won citizens. A plausible form of intimidation may be the use of information gleaned from social networks to fabricate some kind of reasonable suspicion for a search, or probable cause for an arrest, thereby subjecting citizens to harassment based on information they make available on social networks. A safeguard against this may be to amend the Electronic Privacy Communications Act to prohibit such “bootstrapping,” so that no information gleaned from web-crawling of social networks may be a basis for reasonable suspicion or probable cause. To a large extent, however, focusing on the retrospective effects of criminal law obscures the more important issue, which is potential transfer of information from Facebook to the national security apparatus. While it is almost certain that national security apparatuses would take interest in the contents of Facebook, there appears to be no transparency concerning how Facebook interacts with national security agencies.

A related problem, however, may be the reporting of non-public postings by Facebook friends.

 

Subsub 1


YinHuangFirstPaper 1 - 23 Feb 2012 - Main.YinHuang
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

-- By YinHuang - 23 Feb 2012

Introduction

The evolution of technology has complicated the interpretation of the Fourth Amendment. Modern interpretations tend to focus on the portion of the Amendment prohibiting "unreasonable searches and seizures." Crucial as this fragment might be, it must be read in light of the surrounding language. In particular, the concepts of "search" and "seizure" do not exist in a conceptual vacuum. Rather, they are defined with respect to particular physical settings: the people have a right "to be secure in their persons, houses, papers, and effects." This language indicates that the ratifiers were concerned mainly with government intrusion into well-defined private spaces. Given the eighteenth-century backdrop against which the Amendment was drafted, these limitations are not surprising. At that time, "searches" could only be conducted by physical intrusion into a house or the physical detainment of a person. Likewise, "seizures" necessarily referred to the taking of physical objects or papers bearing information. In this historical context, "surveillance"--as that term is presently understood--simply did not exist. In effect, carrying out an act of search and seizure was an all-or-nothing proposition: either the government refrained from attempting to obtain private information, or the government employed physical methods of search and seizure that implicated the plain language of the Fourth Amendment.

Modern technology, however, has blurred the distinction between that which is "private" for the purposes of the Fourth Amendment and that which is "public." Given that a significant portion--if not the majority--of communications are now transmitted by electronic means, it is no longer necessary to detain "persons" or invade "houses" in order to secure "papers" and "effects."

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 2r2 - 02 Apr 2012 - 05:16:26 - YinHuang
Revision 1r1 - 23 Feb 2012 - 21:07:53 - YinHuang
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM