Almost Gone: the Vanishing Fourth Amendment's Allowance Of

Total Page:16

File Type:pdf, Size:1020Kb

Almost Gone: the Vanishing Fourth Amendment's Allowance Of GEE- TO PRINT (DO NOT DELETE) 5/21/2019 4:05 PM ALMOST GONE: THE VANISHING FOURTH AMENDMENT’S ALLOWANCE OF STINGRAY SURVEILLANCE IN A POST-CARPENTER AGE HARVEY GEE* TABLE OF CONTENTS I. FOURTH AMENDMENT JURISPRUDENCE AND THE LACK OF POLICE ACCOUNTABILITY IN TRAFFIC STOPS .......... 412 II. BEYOND TERRY V. OHIO: FROM ONE-ON-ONE ENCOUNTERS TO PROACTIVE LARGE-SCALE STOP AND FRISKS ON THE STREETS WITHIN A POLICE STATE ......................................................................................... 417 III. DIGITAL UPGRADE: SURVEILLANCE STATE TECHNOLOGY AND REFRAMING THE SUPREME COURT’S FOURTH AMENDMENT JURISPRUDENCE ........ 420 A. CARPENTER V. UNITED STATES: POSITIONING A RESILIENT FOURTH AMENDMENT ON A PRO-PRIVACY TRAJECTORY IN THE DIGITAL AGE ............................................................. 423 IV. PRIVACY AND THE FOURTH AMENDMENT AFTER CARPENTER: ARGUING AGAINST THE UNCONSTITUTIONAL USE OF STINGRAY SURVEILLANCE TECHNOLOGY ........................................... 430 * The author is an attorney in San Francisco. He previously served as an Attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colorado State Public Defender. LL.M, The George Washington University Law School; J.D., St. Mary’s School of Law; B.A., Sonoma State University. The author thanks Taylor Francis, Elvira Razzano, Austin Smith, and the Southern California Review of Law and Social Justice for their assistance and hard work in the preparation of this article. 409 410 REVIEW OF LAW AND SOCIAL JUSTICE [Vol. 28:3 A. THE SECRET USE OF STINGRAY SURVEILLANCE TECHNOLOGY BY LAW ENFORCEMENT ................................ 431 B. CALLS FOR A WARRANT REQUIREMENT FOR THE USE OF STINGRAY CELL-SITE SIMULATORS FROM LEGAL SCHOLARS ............................................................................. 436 C. LEGAL AUTHORITY FOR A WARRANT REQUIREMENT FOR STINGRAY CELL-SITE SIMULATORS ..................................... 438 V. CONCLUSION .................................................................................. 441 The Fourth Amendment1 continues to erode. You can be pulled over while driving for just about any reason under the pretext that you violated a traffic law.2 You can also be stopped while you are walking down the street in a “high crime area” and checked for an active arrest warrant.3 Cops can also secretly track your location via your smart phone using cell-site simulators, known as Stingrays, that send powerful electronic signals to bait automatic responses from all nearby cell phones.4 This Article examines a Fourth Amendment that is now “vanishing” due to new surveillance technology, and narrowly focuses on how the changing Fourth Amendment jurisprudence implicates the secretive and unfettered use of Stingray technology. This Article is divided into four Parts. The first two Parts provide the necessary groundwork for understanding how much the Fourth Amendment 1 U.S. CONST. amend. IV (“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”). 2 Whren v. United States, 517 U.S. 806, 813 (“Subjective intentions play no role in ordinary, probable-cause Fourth Amendment analysis.”). 3 See Illinois v. Wardlow, 528 U.S. 119, 124 (2000) (“An individual’s presence in an area of expected criminal activity, standing alone, is not enough to support a reasonable, particularized suspicion that the person is committing a crime. But officers are not required to ignore the relevant characteristics of a location in determining whether the circumstances are sufficiently suspicious to warrant further investigation.”) (internal citation omitted). 4 See Howard W. Cox, StingRay Technology and Reasonable Expectations of Privacy in the Internet of Everything, 17 FEDERALIST SOC’Y REV. 29, 30 (2016) (describing how Stingrays mimic cell phone towers, allowing authorities to use them to target devices and establish connectivity with law enforcement); Brian L. Owsley, TriggerFish, StingRays, and Fourth Amendment Fishing Expeditions, 66 HASTINGS L.J. 183, 185 (2014) (“[The Stingray] deceives nearby cell phones into believing that the device is a cell tower so that the cell phone's information is then downloaded into the cell site simulator.”); Stephanie K. Pell & Christopher Soghoian, A Lot More than a Pen Register, and Less than a Wiretap: What the StingRay Teaches Us About How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities, 16 YALE J.L. & TECH. 134, 144–45 (2013); Andy Martino, Black Lives Matter Activists Are Convinced the NYPD Hacked Their Phones, OUTLINE (Apr. 7, 2017, 1:30 PM), https://theoutline.com/post/1360/black-lives-matter-police-surveillance-the-cops-hacked-their- phones?. 2019] ALMOST GONE 411 has weakened in the past fifty years. Part I examines the lack of police accountability that is enabled and exacerbated by a weakened Fourth Amendment and addresses the ability of the police to pull over cars with near impunity. Part II explores the myriad ways in which law enforcement is able to exploit stop and frisks to create what is effectively an occupied police state in communities of color. The last two Parts explore the future of the Fourth Amendment in the digital era. Part III reviews the Court’s Fourth Amendment jurisprudence on surveillance technology leading up to Carpenter v. United States,5 which shuttled the Fourth Amendment into the digital age.6 It proceeds to analyze the Carpenter ruling, which provides much needed protections against technologically enhanced police surveillance powers,7 and its implications for future privacy cases. Part IV investigates the prevalent use of Stingray surveillance technology by law enforcement to spy on people. As much as stop and frisks create and sustain a physical police state, Stingray surveillance facilitates a virtual police state. Lacking guidance on this issue of law enforcement using portable Stingray cell-site simulators as digital surveillance tools, courts must choose to apply, adapt, or reject settled doctrinal rules, and interpret recent Supreme Court decisions, in deciding whether using Stingrays violate the Fourth Amendment. Until the Supreme Court addresses the issue of cell-site simulators by the police, state supreme courts and federal courts, in the interim, can adopt the reasoning of Carpenter and 5 Carpenter v. United States, 138 S. Ct. 2206 (2018). 6 See Orin Kerr, Understanding the Supreme Court’s Carpenter Decision, LAWFARE (June 22, 2018, 1:18 PM) [hereinafter Kerr, Understanding Carpenter], http://www.lawfareblog.com/understanding-supreme-courts-carpenter-decision (reporting that the “Court goes back to ‘the critical issue’ of ‘basic Fourth Amendment concerns about arbitrary government power’ that are ‘wrought by digital technology.’”). While many privacy rights advocates celebrated the Carpenter ruling, there are some scholars who believe the decision does not go far enough. Professor Aziz Huq suggests that given the amount in which the Fourth Amendment has so heavily eroded, Carpenter will not as greatly affect police practices as one may initially think. Huq claims that because the probable cause requirement has been watered down to “fair probability,” “Carpenter’s holding that a warrant is required to acquire cell-site locational data is likely to impose no great burden on the police” and will likely be “ineffectual in practice.” See Aziz Huq, The Latest Supreme Court Decision Is Being Hailed as a Big Victory for Digital Privacy. It’s Not., VOX, www.vox.com/the-big-idea/2018/6/22/17493632/carpenter- supreme-court-privacy-digital-cell-phone-location-fourth-amendment (last updated June 23, 2018, 7:43 AM) (addressing Carpenter’s recognition of “a constitutional right to privacy in the locational records produced by your cellphone use.”). 7 Andrew Guthrie Ferguson, Future-Proofing the Fourth Amendment, HARV. L. REV. BLOG (June 25, 2018), https://blog.harvardlawreview.org/future-proofing-the-fourth-amendment. See also Henry Gass, Cell Signal: What High Court Ruling May Mean for Future of Digital Privacy, CHRISTIAN SCI. MONITOR (June 22, 2018), https://www.csmonitor.com/USA/Justice/2018/0622/Cell-signal-What-high-court-ruling-may- mean-for-future-of-digital-privacy. 412 REVIEW OF LAW AND SOCIAL JUSTICE [Vol. 28:3 state court decisions which have ruled against the warrantless use of Stingrays for the necessary analytical framework. The article concludes by advocating for a warrant requirement for the use of Stingrays. I. FOURTH AMENDMENT JURISPRUDENCE AND THE LACK OF POLICE ACCOUNTABILITY IN TRAFFIC STOPS The Fourth Amendment was designed to be a counterweight to the authority of government agents armed with general warrants and writs of assistance to conduct broad and indiscriminate searches with impunity.8 Because of this, it substantively proscribes violations of “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures . .”9 In addressing the Fourth Amendment’s reach and scope, the Court initially defined “search” and “seizure” solely as physical intrusions.10 In time, Fourth Amendment jurisprudence has evolved with societal changes and technological advances. The Court now uses
Recommended publications
  • Comment Submitted by David Crawley Comment View Document
    Comment Submitted by David Crawley Comment View document: The notion that my social media identifier should have anything to do with entering the country is a shockingly Nazi like rule. The only thing that this could facilitate anyway is trial by association - something that is known to ensnare innocent people, and not work. What is more this type of thing is repugnant to a free society. The fact that it is optional doesn't help - as we know that this "optional" thing will soon become not-optional. If your intent was to keep it optional - why even bother? Most importantly the rules that we adopt will tend to get adopted by other countries and frankly I don't trust China, India, Turkey or even France all countries that I regularly travel to from the US with this information. We instead should be a beacon for freedom - and we fail in our duty when we try this sort of thing. Asking for social media identifier should not be allowed here or anywhere. Comment Submitted by David Cain Comment View document: I am firmly OPPOSED to the inclusion of a request - even a voluntary one - for social media profiles on the I-94 form. The government should NOT be allowed to dip into users' social media activity, absent probable cause to suspect a crime has been committed. Bad actors are not likely to honor the request. Honest citizens are likely to fill it in out of inertia. This means that the pool of data that is built and retained will serve as a fishing pond for a government looking to control and exploit regular citizens.
    [Show full text]
  • Legal Responses and Countermeasures to National Security Letters
    Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D.
    [Show full text]
  • Stingray Cell-Site Simulator Surveillance and the Fourth
    St. John's Law Review Volume 93 Number 2 Volume 93, 2019, Number 2 Article 3 Stingray Cell-Site Simulator Surveillance and the Fourth Amendment in the Twenty-First Century: A Review of The Fourth Amendment in an Age of Surveillance, and Unwarranted Harvey Gee Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. BOOK REVIEW STINGRAY CELL-SITE SIMULATOR SURVEILLANCE AND THE FOURTH AMENDMENT IN THE TWENTY-FIRST CENTURY: A REVIEW OF THE FOURTH AMENDMENT IN AN AGE OF SURVEILLANCE, AND UNWARRANTED BARRY FRIEDMAN, UNWARRANTED: POLICING WITHOUT PERMISSION, NEW YORK: FARRAR, STRAUSS AND GIROUX, 2017. PP. 434. DAVID GRAY, THE FOURTH AMENDMENT IN AN AGE OF SURVEILLANCE, NEW YORK: CAMBRIDGE UNIVERSITY PRESS, 2017. PP. 305. HARVEY GEE† INTRODUCTION The police can secretly track your every physical movement, listen to your private conversations, and collect data from your cell phone—all without first getting a warrant based on probable cause, signed off by a judge. “WTF?!” you text. Indeed, this practice by law enforcement using portable Stingray cell-site simulators as digital surveillance tools has also raised the eyebrows of privacy advocates and state and federal courts across the country in the past few years. † The author is an attorney in San Francisco. He previously served as an attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colorado State Public Defender.
    [Show full text]
  • Last Call for the Third Party Doctrine in the Digital Age After Carpenter?
    GEE_5.16.20_FINAL (DO NOT DELETE) 8/22/2020 12:42 PM ARTICLE LAST CALL FOR THE THIRD-PARTY DOCTRINE IN THE DIGITAL AGE AFTER CARPENTER? HARVEY GEE† INTRODUCTION ............................................................................................... 287 I. FROM MILLER AND SMITH TO CARPENTER: THE ORIGINS AND DEVELOPMENT OF THE THIRD-PARTY DOCTRINE ........................................................ 290 II. DEPARTING FROM SMITH AND MILLER: CARPENTER DIGITIZES THE KATZ REASONABLE EXPECTATION OF PRIVACY TEST .................................. 297 III. AFTER CARPENTER: ARGUING FOR A WARRANT REQUIREMENT FOR HISTORICAL AND REAL-TIME CLSI, THE THIRD-PARTY DOCTRINE IS NOT APPLICABLE TO REAL-TIME CELL PHONE MONITORING, AND THE THREAT OF FACIAL RECOGNITION SURVEILLANCE TECHNOLOGY ..... 300 A. Arguing for a Warrant Requirement for Real-Time CLSI .............. 302 B. The Third-Party Doctrine is Not Applicable to Real-Time Cell phone Monitoring ................................................................................... 310 C. The Threat of Facial Recognition Surveillance Technology and the Need for Regulation ..................................................................... 315 CONCLUSION ................................................................................................... 323 † The author is an attorney in San Francisco. He previously served as an attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colo-
    [Show full text]
  • 1 June 18, 2014 Majority Leader Harry Reid United States Senate
    June 18, 2014 Majority Leader Harry Reid Republican Leader Mitch McConnell United States Senate United States Senate Washington, DC 20510 Washington, DC 20510 Chairman Patrick J. Leahy Ranking Member Chuck Grassley U.S. Senate Committee on the Judiciary U.S. Senate Committee on the Judiciary Washington, DC 20510 Washington, DC 20510 Chairman Dianne Feinstein Ranking Member Saxby Chambliss U.S. Senate Select Committee on U.S. Senate Select Committee on Intelligence Intelligence Washington, DC 20510 Washington, DC 20510 Dear Majority Leader Reid, Republican Leader McConnell, Chairmen Leahy and Feinstein, and Ranking Members Grassley and Chambliss: The undersigned civil liberties, human rights, and other public interest organizations write about the USA FREEDOM Act (H.R. 3361 and S. 1599), a version of which passed in the House on May 22. All of the undersigned organizations believed the original version of the USA FREEDOM Act introduced in both the House and the Senate was an important step towards comprehensive reform. However, we are deeply concerned about the changes that the House Rules Committee made to the bill prior to passage, which substantially weakened the version of the bill that had passed with unanimous support from both the House Judiciary and Intelligence Committees. As a result of that strong concern, many of the undersigned withdrew their support, as did half of the bill’s sponsors. We are writing today as a community to plainly express our position that, unless the version of the USA FREEDOM Act that the Senate considers contains substantial improvements over the House-passed version, we will be forced to oppose the bill that so many of us previously worked to advance.
    [Show full text]
  • Protecting Personal Data, Electronic Communications, and Individual
    Hastings Constitutional Law Quarterly Volume 42 Article 4 Number 3 Spring 2015 1-1-2015 The ewN Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment Megan Blass Follow this and additional works at: https://repository.uchastings.edu/ hastings_constitutional_law_quaterly Part of the Constitutional Law Commons Recommended Citation Megan Blass, The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment, 42 Hastings Const. L.Q. 577 (2015). Available at: https://repository.uchastings.edu/hastings_constitutional_law_quaterly/vol42/iss3/4 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Constitutional Law Quarterly by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance Through a Return to a Property-Based Approach to the Fourth Amendment by MEGAN BLASS* I. Mass Surveillance in the New Millennium: Edward Snowden Versus The National Security Agency A. Watergate Fears Realized: National Security Agency Programs Exposed in 2013 Edward Snowden is now a household name.' He garnered global attention in 2013 when he claimed responsibility for leaking government documents that revealed unprecedented levels of domestic surveillance conducted by the National Security Agency ("NSA" or "the Agency"). 2 The information leaked by Mr.
    [Show full text]
  • Declaration of Bruce Schneier
    Case 1:17-cv-02016-RC Document 10-4 Filed 10/11/17 Page 1 of 60 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) UNITED TO PROTECT DEMOCRACY et al. ) ) Plaintiffs, ) v. ) Civil No. 17-02016 (RC) ) ) PRESIDENTIAL ADVISORY COMMISSION ) ON ELECTION INTEGRITY et al. ) ) ) Defendants. ) ) DECLARATION OF BRUCE SCHNEIER Laurence M. Schwartztol Danielle Conley (D.C. Bar #503345) (Pro hac vice pending) Lynn Eisenberg (D.C. Bar #1017511) Justin Florence (D.C. Bar #988953) Jason Hirsch ( Pro hac vice forthcoming) THE PROTECT DEMOCRACY PROJECT Michael Posada (Pro hac vice pending) 10 Ware Street WILMER CUTLER PICKERING Cambridge, MA 02138 HALE & DORR LLP (202) 856-9191 1875 Pennsylvania Avenue NW Washington, D.C. 20006 (202) 663 -6000 Case 1:17-cv-02016-RC Document 10-4 Filed 10/11/17 Page 2 of 60 DECLARATION OF BRUCE SCHNEIER I, Bruce Schneier, declare as follows: 1. I am a security technologist with expertise in how complex data systems can be secured against, or vulnerable to, hacking or other security breaches. 2. I have over 30 years of experience studying these issues as a scholar, engineer, consultant, writer, and public commentator. 3. I currently serve as Chief Technology Officer to IBM Resilient in Cambridge, MA. I am also currently a Lecturer at the John F. Kennedy School of Government at Harvard University, a Research Fellow in the Science, Technology, and Public Policy program at the Belfer Center for Science and International Affairs at the Kennedy School, and a Fellow in the Berkman Klein Center for Internet and Society at Harvard University.
    [Show full text]
  • 2018-11-06 HHS DHS NPRM Comment ORR-ICE Data Sharing Final
    Before the Department of Homeland Security Department of Health and Human Services In the Matter of Apprehension, Processing, Care, and DHS Docket No. ICEB–2018–0002 Custody of Alien Minors and Unaccompanied Alien Children COMMENTS OF CENTER ON PRIVACY & TECHNOLOGY AT GEORGETOWN LAW 18MILLIONRISING.ORG BRENNAN CENTER FOR JUSTICE AT NYU SCHOOL OF LAW CENTER FOR DEMOCRACY & TECHNOLOGY COLOR OF CHANGE DEMAND PROGRESS EDUCATION FUND ELECTRONIC PRIVACY INFORMATION CENTER LEGAL AID JUSTICE CENTER OPEN THE GOVERNMENT NAACP NATIONAL HISPANIC MEDIA COALITION NATIONAL IMMIGRATION LAW CENTER NEW AMERICA’S OPEN TECHNOLOGY INSTITUTE RESTORE THE FOURTH Supported by: Harrison Rudolph Laura M. Moy Delia Brennan Gabrielle Rejouis Daniel Chozick Center on Privacy & Technology at Georgetown Law Georgetown Law Students 600 New Jersey Avenue, NW Washington, DC 20001 Filed November 6, 2018 (202) 661-6709 Table of Contents I. Introduction and Summary ............................................................................................ 1 II. The Proposed Expanded Suitability Assessments Will Delay Release of Unaccompanied Children from Custody ...................................................................... 4 III. The Delays Caused by HHS’s Expanded Sponsor Suitability Assessments Violate Federal Law ......................................................................................................... 5 A. The Delays Caused by HHS’s Expanded Sponsor Suitability Assessments Are Unnecessary ........................................................................................................
    [Show full text]
  • The Impact of Online Surveillance on Behavior
    The impact of online surveillance on behavior The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Marthews, Alex & Catherine Tucker. “The impact of online surveillance on behavior.” The Cambridge handbook of surveillance law, part 3 (June 2017): 393-508 © 2017 The Author(s) As Published 10.1017/9781316481127.019 Publisher Cambridge University Press Version Author's final manuscript Citable link https://hdl.handle.net/1721.1/130532 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Detailed Terms http://creativecommons.org/licenses/by-nc-sa/4.0/ 437 18 The Impact of Online Surveillance on Behavior Alex Marthews † & Catherine Tucker ‡ Mass digital surveillance differs from older, analog, and more overt forms of physical surveillance. Nonetheless, empirical research after the Snowden revelations shows that it still has a meaningful chilling effect on online behavior, including Google searches, use of Wikipedia, and expression of controversial opinions. In the courts, these studies may help plaintiffs challenging mass surveillance programs in both the United States and the European Union to demonstrate standing. In the executive and legislative branches, the studies enable the discussion to move on from the question of whether a chilling effect exists from surveillance, to the question of what, if anything, to do about it. I How Online Surveillance May Affect Behavior Differently from Offl ine Surveillance A common trope in surveillance debates claims that subjects of digital surveillance are less affected than subjects of more traditional direct surveillance.
    [Show full text]
  • The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee
    CORE Metadata, citation and similar papers at core.ac.uk Provided by MURAL Information- Maynooth University & Communications Research Archive Library Technology Law, 2014 Vol. 23, No. 3, 192–219, http://dx.doi.org/10.1080/13600834.2014.970375 The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe? Maria Helen Murphy* Law Department, National University of Ireland, Maynooth, Ireland This article considers how the pendulum metaphor can be applied to shifts in popular opinion concerning the right to privacy. At times, the media portrays privacy as an individualistic right, serving at the behest of criminals and terrorists. Every so often, however, an event occurs that starkly reminds the public of the value of privacy. Public opinion drives debate and this debate often leads to legal reform. The Church Committee, formed in response to the Watergate scandal, is a classic example of the effect the exposure of abuse can have on the regulation of privacy. Over time, however, legislative gains in privacy protection have a tendency to erode. In addition, extreme events, such as the terrorist attacks of 9/11, can cause the pendulum to swing back to the opposite position. Following the exposure of mass surveillance practices by Edward Snowden, the world has, once again, been questioning government surveillance activities. This article seeks to consider the transatlantic impact of the National Security Agency revelations. Transparency is highlighted as a crucial regulating force on excessive government interference with privacy rights. Keywords: Snowden; surveillance; privacy; data retention; European Union Introduction The concept of a swinging pendulum frequently serves as a political metaphor, illustrat- ing oscillations from one policy position to another over time.1 The metaphor borrows from the scientific principle that the restoring force of gravity, combined with the mass of a pendulum, will cause it to swing back and forth indefinitely.
    [Show full text]
  • Legal Committee (Legal)
    Legal Committee (Legal) MUNUC 33 1 Legal Committee | MUNUC 33 TABLE OF CONTENTS ______________________________________________________ CHAIR LETTER…………………………….….………………………….……..…3 HISTORY OF COMMITTEE……………..………………………………………..5 TOPIC A: LEGALITY AND ETHICS OF GENETIC ENGINEERING……..…….6 Statement of the Problem……………….……………..…………...…6 History of the Problem………………………………………………….12 Past Actions…………………………………………………………….. 18 Possible Solutions……………………………………………………….22 Bloc Positions……………………………………………………….……23 Glossary…………………………………………………………………..26 Bibliography……………………………………………………………..28 TOPIC B: INFORMATION PRIVACY AND PROTECTION…………..……...34 Statement of the Problem……………….………...………………....34 History of the Problem………………………………………………….40 Past Actions…………………………………………………………….. 46 Possible Solutions……………………………………………………….49 Bloc Positions……………………………………………………….……50 Glossary…………………………………………………………………..54 Bibliography………………………………………………………….....56 2 Legal Committee | MUNUC 33 CHAIR LETTER ____________________________________________________ Dear Delegates, Welcome to the Legal Committee at MUNUC 33! My name is Andy Roselund, and I will be your chair for LEGAL this year. I was born in New York City, but moved to New Jersey after a few years; as of writing this letter, I am now living in Hyde Park, where I hope to be for a while. I am a second year in the College studying law and political science (very fitting for LEGAL). Outside of MUNUC, I spend my free time doing research for a law firm back in New Jersey, practicing cello, running (although my high school cross country days are well behind me), and exploring Chicago with my friends. I led my high school’s Model UN team for two years and served as an Assistant Chair last year at MUNUC 32, and I am psyched to have a wonderful time chairing all of you at MUNUC 33. I anticipate that you all are looking forward to debating, drafting, and passing resolutions in LEGAL this year.
    [Show full text]
  • Amicus Curiae Before
    No. 20-1499 In the Supreme Court of the United States ____________ AMERICAN CIVIL LIBERTIES UNION, Petitioner, v. UNITED STATES, Respondent. ____________ ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT OF REVIEW ____________ BRIEF OF AMICI CURIAE THE BRENNAN CENTER FOR JUSTICE AT NYU SCHOOL OF LAW AND AMERICANS FOR PROSPERITY FOUNDATION IN SUPPORT OF PETITIONER ____________ Elizabeth Goitein Laura Handman* THE BRENNAN CENTER FOR Meenakshi Krishnan JUSTICE AT NYU SCHOOL OF *Counsel of Record LAW DAVIS WRIGHT TREMAINE LLP 1140 Connecticut Ave. NW, 1301 K Street NW, Suite 1150 Suite 500 East Washington, DC 20036 Washington, DC 20005 (202) 302-7331 (202) 973-4200 [email protected] [email protected] Counsel for Brennan Center for [email protected] Justice at NYU School of Law Counsel for Amici Curiae Eric R. Bolinder AMERICANS FOR PROSPERITY FOUNDATION 1310 N. Courthouse Rd., Suite 700 Arlington, VA 22201 (571) 329-3324 [email protected] Counsel for Americans for Prosperity Foundation LEGAL PRINTERS LLC ! Washington, DC ! 202-747-2400 ! legalprinters.com i TABLE OF CONTENTS TABLE OF AUTHORITIES ........................................ iii INTERESTS OF AMICI CURIAE ............................... 1 SUMMARY OF ARGUMENT ...................................... 2 ARGUMENT................................................................... 5 I. SECRET LAW, INCLUDING FISC OPINIONS, HARMS DEMOCRATIC ACCOUNTABILITY AND SUBVERTS THE RULE OF LAW.........................................
    [Show full text]