Sextortion: Corruption and Gender-Based Violence

Total Page:16

File Type:pdf, Size:1020Kb

Sextortion: Corruption and Gender-Based Violence 06 2020 SEXTORTION: CORRUPTION AND GENDER-BASED VIOLENCE Åsa Eldén, Dolores Calvo, Elin Bjarnegård, Silje Lundgren and Sofia Jonsson Sextortion: Corruption and Gender-Based Violence Åsa Eldén, Dolores Calvo, Elin Bjarnegård, Silje Lundgren and Sofia Jonsson Rapport 2020:06 till Expertgruppen för biståndsanalys (EBA) Acknowledgements Our first and warmest thanks go to our interviewees in Tanzania and Colombia who generously shared their knowledge, experiences and reflections on sextortion. We would also like to thank Nancy Hendry, Marwa Fatafta, Pilar Avello, Jenny Grönvall, Fredy Mora Gamez, Anna Collins Falk and Verena Knippel, the Embassy of Sweden in Dar es Salaam and Bogotá, and the thematic and geographic experts at Sida and the Ministry for Foreign Affairs whose support and competence have been of great importance for our study. A special thanks also to the participants of two workshops for valuable insights from different contexts. A reference group appointed by the Expert Group for Aid Studies, EBA, has closely followed our work: Johanna Förberg, Jenny Grönvall, Maria Stern and Anders Kompass. Thank you for sharing your expertise and providing thorough and fruitful feedback, from ideas via drafts to final report. Last but not least we want to thank the staff and expert group of EBA – in particular Sara Johansson de Silva, Eva Mineur, Lena Johansson de Chateau, Jan Pettersson, Helena Skagerlind and Nina Solomin - who have been wonderfully encouraging and supportive throughout, or in different stages of, the process. Please refer to the present report as: Eldén, Å., D. Calvo, E. Bjarnegård, S. Lundgren and S. Jonsson (2020), Sextortion: Corruption and Gender-Based Violence, EBA Report 2020:06, the Expert Group for Aid Studies (EBA), Sweden. This report can be downloaded free of charge at www.eba.se This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. ISBN 978-91-88143-60-0 Printed by Elanders Sverige AB Stockholm 2020 Cover design by Julia Demchenko Dr. Åsa Eldén has a PhD in Sociology from Uppsala University (2003). Her work covers a wide range of gender equality issues focusing on gender-based violence, and different arenas within and outside academia in Sweden, Turkey and internationally. She was the Lead/Senior Policy Specialist for Gender Equality at Sida and is the co- author of the EBA study “Swedish Aid in the Era of Shrinking Space – the Case of Turkey” (2018). Dr. Dolores Calvo has a PhD in Sociology from the University of Gothenburg (2013). She has done research on gender and gender mainstreaming, focusing on development policies at the EU level. She has also conducted research on women's collective action, clientelism and social exclusion in Latin America, and on trafficking and violence against women in Sweden. Dr. Elin Bjarnegård has a PhD in Political Science (2010) and is Associate Professor at Uppsala University. Her research focuses on gender, masculinities, violence, corruption and political parties. She is an experienced research project leader and is widely published in academic journals and is the co-author of the EBA study ”Putting Priority into Practice: Sida´s implementation of its Plan for Gender Integration” (2018). Dr. Silje Lundgren has a PhD in Cultural Anthropology from Uppsala University (2011). Her research deals with norms of gender and sexuality, gender-based violence and harassment, and how gendered hierarchies are strengthened in conditions of economic hardship and crisis. Silje Lundgren is currently the director of the Forum for Gender Studies and Equality at Linköping University. Dr. Sofia Jonsson has a PhD in Political Science from the University of Gothenburg (2019). In her post doc at the University of Bergen she explores the role of trust for online police collaboration to tackle human trafficking, and she has studied perpetrators’ incentives to traffic. Together with colleagues, Jonsson has developed a European survey on sex-buying and prostitution attitudes. Table of Contents Foreword by the EBA ................................................ 1 Sammanfattning....................................................... 3 Summary .................................................................. 9 Abbreviations ......................................................... 15 Introduction ........................................................... 16 Section 1: The study ............................................... 18 Overall aim .................................................................................... 18 Defining sextortion ...................................................................... 19 Between development agendas ................................................... 26 Material and method .................................................................... 32 Section 2: Review of existing knowledge, gaps, and dilemmas ................................................... 38 Introduction .................................................................................. 38 Gender, power, and corruption .................................................. 39 Sextortion as gendered corruption ............................................. 41 Focus on the perpetrator of sextortion ..................................... 44 Between legal frameworks: gender-based violence and corruption .............................................................................. 46 Sextortion from a gender-based violence perspective: power and coercion/consent .............................................. 49 Vulnerability, poverty, and coercion/consent .......................... 51 Concluding remarks ..................................................................... 53 Section 3: Case studies ........................................... 57 Introduction .................................................................................. 57 Tanzania ......................................................................................... 59 Colombia ........................................................................................ 87 Tanzania and Colombia: sextortion as concept and practice ................................................................................. 104 Section 4: Conclusions and recommendations ...... 108 Conclusions ................................................................................. 108 Recommendations ...................................................................... 111 References ............................................................ 116 Appendix 1 ............................................................ 126 Interviews, workshops, and consultations .............................. 126 Interview guide ............................................................................ 128 Previous EBA reports ............................................ 131 Foreword by the EBA Corruption and gender-based violence have long been established as two important, though distinct, areas of concern in international development cooperation. During the last few years, increasing international attention to cases of abuse of power and position in exchange for sexual favours in various contexts has highlighted how these phenomena may be interlinked. In 2008, the International Association of Women Judges coined the term ‘sextortion’ in order to recognize and render visible these forms of abuse. Given that sextortion simultaneously constitutes a form of corruption and gender-based violence – but fits neither definition perfectly – this phenomenon risks falling between two stools and remaining unaddressed. Whereas the concept of sextortion has existed for some years now, and Transparency International has picked up the term in its Global Corruption Barometer, it has remained largely absent in anti- corruption work as well as in development cooperation. Moreover, empirical knowledge about sextortion – where, how and to what extent it occurs and how it is perceived and dealt with – is very limited. The combination of conceptual, legal and empirical obscurity, the issue of perceived “consent” and the stigma associated with sextortion render victims vulnerable and often lead to impunity for perpetrators. This report addresses some of the knowledge gaps concerning sextortion by summarizing the existing knowledge, identifying gaps and presenting two case studies of the dynamics of sextortion in Tanzania and Colombia. The report concludes that sextortion is not only a gross violation of human rights in itself, but also hinders victims’ rights in other spheres as well as sustainable development at large. Sextortion deepens poverty and constitutes a greater risk for those living in poverty. In order to better combat sextortion in development cooperation, the authors stress the need to clearly define sextortion; link agendas on anti-corruption and sexual and gender-based violence, exploitation, abuse and harassment; promote awareness, policy and regulation at all levels; and ensure the allocation of adequate resources to this work. 1 I hope that this report will find its intended audience among decision- and policymakers at the Swedish Ministry for Foreign Affairs and Sida as well as actors in international development cooperation more broadly. In addition, the report should be of great value for readers in civil society, the research community and the general public interested in gender equality, gender-based violence and anti-corruption work.
Recommended publications
  • Sexual Aggression and the Civil Response, Annual Review of Civil
    ANNUAL REVIEW OF CIVIL LITIGATION 2018 THE HONOURABLE MR.JUSTICE TODD L. ARCHIBALD SUPERIOR COURT OF JUSTICE (ONTARIO) # 2018 Thomson Reuters Canada NOTICE AND DISCLAIMER: All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher (Thomson Reuters Canada, a division of Thomson Reuters Canada Limited). Thomson Reuters Canada and all persons involved in the preparation and sale of this publication disclaim any warranty as to accuracy or currency of the publication. This publication is provided on the understanding and basis that none of Thomson Reuters Canada, the author/s or other persons involved in the creation of this publication shall be responsible for the accuracy or currency of the contents, or for the results of any action taken on the basis of the information contained in this publication, or for any errors or omissions contained herein. No one involved in this publication is attempting herein to render legal, accounting or other professional advice. If legal advice or other expert assistance is required, the services of a competent professional should be sought. The analysis contained herein should in no way be construed as being either official or unofficial policy of any governmental body. A cataloguing record for this publication is available from Library and Archives Canada. ISBN 978-0-7798-8457-5 Scan the QR code to the right with your smartphone to send your comments regarding our products and services. Free QR Code Readers are available from your mobile device app store.
    [Show full text]
  • Preventing and Fighting the Rise of Online Sextortion and Gender Based Digital Violence
    European Crime Prevention Award (ECPA) Annex I – new version 2014 Please complete the template in English in compliance with the ECPA criteria contained in the RoP (Par.2 §3). General information 1. Please specify your country. Spain 2. Is this your country’s ECPA entry or an additional project? It is Spain’s ECPA entry 3. What is the title of the project? Preventing and fighting the rise of online Sextortion and Gender Based Digital Violence 4. Who is responsible for the project? Contact details. Jorge Flores, Founder and Director of PantallasAmigas. E-mail: [email protected] mobile:+34 605 72 81 21 5. Start date of the project (dd/mm/yyyy)? Is the project still running (Yes/No)? If not, please provide the end date of the project. 07/05/2009. The project is still running and is comprised of several of the following elements: awareness campaigns, interactive games, booklets and guides for teachers and educators, intervention protocols for victims, blogs and complaint forms. 6. Where can we find more information about the project? Please provide links to the project’s website or online reports or publications (preferably in English). A chapter for Harvard and UNICEF’s Digitally Connected ebook was written to explain the work on this ongoing project. The chapter is titled “Sexting: Teens, Sex, Smartphones and the Rise of Sextortion and Gender Based Digital Violence” and is available in the following link: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2585686 The full project is at the moment available only in Spanish
    [Show full text]
  • Digital Blackmail As an Emerging Tactic 2016
    September 9 DIGITAL BLACKMAIL AS AN EMERGING TACTIC 2016 Digital Blackmail (DB) represents a severe and growing threat to individuals, small businesses, corporations, and government Examining entities. The rapid increase in the use of DB such as Strategies ransomware; the proliferation of variants and growth in their ease of use and acquisition by cybercriminals; weak defenses; Public and and the anonymous nature of the money trail will only increase Private Entities the scale of future attacks. Private sector, non-governmental organization (NGO), and government cybersecurity experts Can Pursue to were brought together by the Office of the Director of National Contain Such Intelligence and the Department of Homeland Security to determine emerging tactics and countermeasures associated Attacks with the threat of DB. In this paper, DB is defined as illicitly acquiring or denying access to sensitive data for the purpose of affecting victims’ behaviors. Threats may be made of lost revenue, the release of intellectual property or sensitive personnel/client information, the destruction of critical data, or reputational damage. For clarity, this paper maps DB activities to traditional blackmail behaviors and explores methods and tools, exploits, protection measures, whether to pay or not pay the ransom, and law enforcement (LE) and government points of contact for incident response. The paper also examines the future of the DB threat. Digital Blackmail as an Emerging Tactic Team Members Name Organization Caitlin Bataillon FBI Lynn Choi-Brewer
    [Show full text]
  • Sentencing Guidelines Offense Table (Updated 11/2/20)
    Appendix A Sentencing Guidelines Offense Table (Updated 11/2/20) Appendix A contains a table of guidelines offenses including their CJIS code, statutory source, seriousness category, and penalties. If an offense is not listed in Appendix A and the offense has a maximum penalty of one year or less, the offense should be identified as a category VII offense. If an offense is not listed in Appendix A and the maximum penalty is greater than one year, the individual completing the worksheet should use the seriousness category for the closest analogous offense and the sentencing judge and the parties should be notified. If there are any questions about how to categorize or score an offense, please call the Maryland State Commission on Criminal Sentencing Policy staff at (301) 403-4165. November 2020 121 INDEX OF OFFENSES Abuse & Other Offensive Conduct ......................... 1 Kidnapping & Related Crimes .............................. 33 Accessory After the Fact ......................................... 2 Labor Trafficking ................................................... 33 Alcoholic Beverages ................................................ 2 Lotteries ................................................................. 33 Animals, Crimes Against ......................................... 3 Machine Guns ........................................................ 34 Arson & Burning ...................................................... 3 Malicious Destruction & Related Crimes ............. 34 Assault & Other Bodily Woundings .......................
    [Show full text]
  • Metoo, Discrimination & Backlash
    WOMEN GENDER& NO. 1 2021 RESEARCH #MeToo, Discrimination & Backlash WOMEN GENDER& RESEARCH VOL. 30, NO. 1 2021 WOMEN, GENDER & RESEARCH is an academic, peer-reviewed journal that: • Presents original interdisciplinary research concerning feminist theory, gender, power, and inequality, both globally and locally • Promotes theoretical and methodological debates within gender research • Invites both established and early career scholars within the fi eld to submit articles • Publishes two issue per year. All research articles go through a double-blind peer-review process by two or more peer reviewers WOMEN, GENDER & RESEARCH welcomes: • Research articles and essays from scholars around the globe • Opinion pieces, comments and other relevant material • Book reviews and notices about new PhDs within the fi eld Articles: 5000-7000 words (all included) Essays or opinion pieces: 3900 words (all included) Book reviews: 1200 words (all included) Please contact us for further guidelines. SPECIAL ISSUE EDITORS EDITOR IN CHIEF Lea Skewes Morten Hillgaard Bülow, PhD, Coordination for Gen- Molly Occhino der Research, University of Copenhagen, Denmark Lise Rolandsen Agustín EDITORS Kathrine Bjerg Bennike, PhD-candidate, Depart- Lea Skewes, PhD, Post-Doc, Business and Social ment of Politics and Society, Aalborg University, Sciences, Aarhus University, Denmark Denmark Tobias Skiveren, PhD, Assistant Professor, School Camilla Bruun Eriksen, PhD, Assistant Professor, of Communication and Culture, Aarhus Univer- Department for the Study of Culture, University sity, Denmark of Southern Denmark, Denmark Nanna Bonde Thylstrup, PhD, Associate Professor, Sebastian Mohr, PhD, Senior Lecturer, Centre for Department of Management, Society, and Com- Gender Studies, Karlstad University, Sverige munication, Copenhagen Business School, Sara Louise Muhr, PhD, Professor, Department of Denmark Organization, Copenhagen Business School, Denmark COVER ILLUSTRATION © Rebelicious.
    [Show full text]
  • Handbook for the Judiciary on Effective Criminal Justice
    Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls Cover photo: ©iStock.com/Berezko UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls UNITED NATIONS Vienna, 2019 © United Nations Office on Drugs and Crime, 2019. All rights reserved. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitations of its frontiers or boundaries. Mention of firm names and com- mercial products does not imply the endorsement of the United Nations. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements The Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls has been prepared for the United Nations Office on Drugs and Crime (UNODC) by Eileen Skinnider, Associate, International Centre for Criminal Law Reform and Criminal Justice Policy. A first draft of the handbook was reviewed and discussed during an expert meeting held in Vienna from 26 to 30 November 2018. UNODC wishes to acknowledge the valuable suggestions and contri- butions of the following experts who participated in that meeting: Ms. Khatia Ardazishvili, Ms. Linda Michele Bradford-Morgan, Ms. Aditi Choudhary, Ms. Teresa Doherty, Ms. Ivana Hrdličková, Ms. Vivian Lopez Nuñez, Ms. Sarra Ines Mechria, Ms. Suntariya Muanpawong, Ms.
    [Show full text]
  • Revenge Porn and Tort Remedies for Public Figures
    William & Mary Journal of Race, Gender, and Social Justice Volume 24 (2017-2018) Issue 1 William & Mary Journal of Women and the Law: 2017 Special Issue: Enhancing Article 9 Women's Effect on Law Enforcement in the Age of Police and Protest November 2017 When Fame Takes Away the Right to Privacy in One's Body: Revenge Porn and Tort Remedies for Public Figures Caroline Drinnon Follow this and additional works at: https://scholarship.law.wm.edu/wmjowl Part of the Law and Gender Commons, Privacy Law Commons, and the Torts Commons Repository Citation Caroline Drinnon, When Fame Takes Away the Right to Privacy in One's Body: Revenge Porn and Tort Remedies for Public Figures, 24 Wm. & Mary J. Women & L. 209 (2017), https://scholarship.law.wm.edu/wmjowl/vol24/iss1/9 Copyright c 2017 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmjowl WHEN FAME TAKES AWAY THE RIGHT TO PRIVACY IN ONE’S BODY: REVENGE PORN AND TORT REMEDIES FOR PUBLIC FIGURES INTRODUCTION I. A COMMON PHENOMENON—EXAMPLES OF INVASION OF PRIVACY OF PUBLIC FIGURES A. Harms Suffered by Victims of the Distribution of Nonconsensual Pornography B. Legal Remedies Imposed in the “Celebgate” Hacking and Leak Incident II. CIVIL REMEDIES FOR NON–PUBLIC FIGURE VICTIMS OF REVENGE PORN A. Intentional Infliction of Emotional Distress B. Invasion of Privacy Based on Public Disclosure of Private Facts III. HISTORY OF DENYING PRIVACY REMEDIES FOR PUBLIC FIGURES A. What Is a “Public Figure”? B. Distinction Between Public and Private Figures in Privacy-Related Causes of Actions C.
    [Show full text]
  • Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
    Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section).
    [Show full text]
  • Revenge Pornº: an Evaluation of the Elements That Make an Effective Nonconsensual Pornography Statute
    DECONSTRUCTING THE STATUTORY LANDSCAPE OF ªREVENGE PORNº: AN EVALUATION OF THE ELEMENTS THAT MAKE AN EFFECTIVE NONCONSENSUAL PORNOGRAPHY STATUTE Jonathan S. Sales and Jessica A. Magaldi* INTRODUCTION Changes in social mores and technology have yielded the phenomenon of sext- ing, which includes the capturing and forwarding of intimate images through the Internet.1 Research reveals that nearly ®fty percent of adults in the United States have sent or received intimate digital content. 2 At the same time, the con¯uence of these changes has spawned new violations of privacy and predatory actions when these images are made available on the Internet without the subject's consent.3 The re-distribution or dissemination of these intimate images without the consent of the subject and without a legitimate purpose (such as a law enforcement investigation) is referred to as nonconsensual pornography (ªNCPº). 4 NCP has caused victims to suffer substantial harm.5 In some cases, NCP inci- dents have precipitated a victim's suicide.6 Prior generations might have concluded that a person who allowed such images to be captured and placed in the possession of another person assumed the risk of re-distribution; in essence, a negligence, recklessness, or constructive consent argument. In contrast, in the twenty-®rst cen- tury, capturing or sharing of intimate images is often regarded as an acceptable * Jonathan S. Sales, J.D., Northeastern University School of Law, Lecturer, Bentley University; Jessica A. Magaldi, J.D., New York University School of Law, Associate Professor, Pace University. The authors gratefully acknowledge the research support of Clifton M. Chow, Ph.D., Research Consultant at Bentley University; Peng Zhang and Piotr Kolodzie, Graduate Assistants at Bentley University; and Primrose Zvinavashe, LL.B, LL.M, Graduate Assistant at Pace University.
    [Show full text]
  • Sexual Exploitation Crimes Against Children
    Sexual Exploitation Crimes Against Children In This Issue September 2011 Volume 59 Number 5 Introduction to the Sexual Exploitation Crimes Against Children Issue of the USA Bulletin . .1 United States Department of Justice By Paul R. Almanza Executive Office for United States Attorneys Washington, DC Meeting the Government’s Discovery Obligations in Child Exploitation 20530 Cases . 3 H. Marshall Jarrett Director By Jeffrey Zeeman Contributors' opinions and statements should not be considered an endorsement by Getting Your Evidence into Evidence in a Digital World . 14 EOUSA for any policy, program, or service. By Damon King and Meredith Owen The United States Attorneys' Bulletin is published pursuant to 28 Understanding Probable Cause and Overcoming Staleness Issues in Child CFR § 0.22(b). Pornography Cases . 27 The United States Attorneys' Bulletin is published bimonthly by By Chantel Febus, Jason Claude, and Kimberly Singer the Executive Office for United States Attorneys, Office of Legal Education, 1620 Pendleton Street, Columbia, South Carolina 29201. SORNA: A Primer . 42 By Bonnie Kane Managing Editor Jim Donovan Social Networking Sites: Breeding Grounds for “Sextortion” Prosecutions Law Clerk Carmel Matin . .54 Internet Address By Darcy Katzin, Mi Yung Park, and Keith Becker www.usdoj.gov/usao/ reading_room/foiamanuals. html Emerging Issues in the Extraterritorial Sexual Exploitation of Children . 59 Send article submissions and By Anitha S. Ibrahim, Ed McAndrew, and Wendy Waldron address changes to Managing Editor, United States Attorneys' Bulletin, National Advocacy Center, Units of Prosecution in Child Pornography Cases and Rebutting the Office of Legal Education, 1620 Pendleton Street, Argument that Possession of Child Pornography is a Lesser Included Columbia, SC 29201.
    [Show full text]
  • Fighting Cybercrime After United States V. Jones David Gray
    Journal of Criminal Law and Criminology Volume 103 | Issue 3 Article 4 Summer 2013 Fighting Cybercrime After United States v. Jones David Gray Danielle Keats Citron Liz Clark Rinehart Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons Recommended Citation David Gray, Danielle Keats Citron, and Liz Clark Rinehart, Fighting Cybercrime After United States v. Jones, 103 J. Crim. L. & Criminology 745 (2013). https://scholarlycommons.law.northwestern.edu/jclc/vol103/iss3/4 This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/13/10303-0745 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 103, No. 3 Copyright © 2013 by David Gray, Danielle Keats Citron & Liz Clark Rinehart Printed in U.S.A. FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES DAVID GRAY,* DANIELLE KEATS CITRON** & LIZ CLARK RINEHART*** In a landmark nondecision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible.
    [Show full text]
  • Discussions on Biology Gender Scholars Talk About Bodily Matters
    Discussions on biology Gender scholars talk about bodily matters Tora Holmberg Translated by Karen Williams Crossroads of knowledge Uppsala University Uppsala 2008 Discussions on biology: Gender scholars talk about bodily matters. Tora Holmberg Crossroads of knowledge Skrifter från Centrum för genusvetenskap Uppsala University Uppsala 2008 ISBN: 978-91-975680-5-0 © Tora Holmberg and Centre for Gender Research First published in Swedish in 2007 as Samtal om biologi. Genusforskare talar om kön och kropp Translated by Karen Williams Typeset by Camilla Eriksson Printed in Sweden by University Printers, Uppsala, 2008 Can be ordered from: Centre for Gender Research, Uppsala University Box 634, SE- 751 26 Uppsala, Sweden Telefax: +46 (0)18 471 35 70 E-mail: [email protected] Preface The present report is the result of a project I completed during my one-year tenure as visiting scholar at the Centre for Gender Research, Uppsala Univer- sity (July 2005–June 2006). At the outset, the project was to be comprised of discussions on biology originating in both the cultural and natural sciences, and it was therefore called “Gender Studies and Genetics – Controversies, Convergences and Potential Alliances.” Starting from the encounter between biological theories of sex and feminist theories, my aim was to elucidate the nature/culture dichotomy. This was not how things turned out. One year is not such a long time (although I did apply to various agencies for funding to continue the project a while longer), and I have contented myself with in- vestigating only one side of the dichotomy: gender studies. During the next few years, we will have the opportunity to study what happens in the en- counter between cultural and natural scientific perspectives on gender within the framework of a new research program: Nature/Culture Boundaries and Transgressive Encounters.
    [Show full text]