The Fourth Amendment and Technological Exceptionalism After Carpenter: a Case Study on Hash-Value Matching

Total Page:16

File Type:pdf, Size:1020Kb

The Fourth Amendment and Technological Exceptionalism After Carpenter: a Case Study on Hash-Value Matching Fordham Intellectual Property, Media and Entertainment Law Journal Volume 29 XXIX Number 4 Article 6 2019 The Fourth Amendment and Technological Exceptionalism After Carpenter: A Case Study on Hash-Value Matching Denae Kassotis [email protected] Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Constitutional Law Commons, Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Denae Kassotis, The Fourth Amendment and Technological Exceptionalism After Carpenter: A Case Study on Hash-Value Matching, 29 Fordham Intell. Prop. Media & Ent. L.J. 1243 (2019). Available at: https://ir.lawnet.fordham.edu/iplj/vol29/iss4/6 This Note is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. The Fourth Amendment and Technological Exceptionalism After Carpenter: A Case Study on Hash-Value Matching Cover Page Footnote J.D. Candidate, Fordham University School of Law, 2019; B.A., History, University of Delaware, 2016. This Note was prepared with the assistance of Professor Olivier Sylvain who served as my faculty adviser on the project. I would also like to thank John Bradshaw and Elias Wright for their input and edits. Lastly, I would like to thank my father, John Kassotis, for his suggestions and constant mentorship. This note is available in Fordham Intellectual Property, Media and Entertainment Law Journal: https://ir.lawnet.fordham.edu/iplj/vol29/iss4/6 The Fourth Amendment and Technological Exceptionalism After Carpenter: A Case Study on Hash-Value Matching Denae Kassotis* The Fourth Amendment has long served as a barrier between the police and the people; ensuring the government acts reasonably in combating crime. Fourth Amendment jurisprudence is more dynamic than other constitutional guarantees, and has undergone periodic shifts to account for technological and cultural changes. The Supreme Court’s 2018 decision in United States v. Carpenter marks the most recent jurisprudential shift, as the Court departed from the well-settled reasonable expectation of privacy test to account for a new technology (CSLI records). This Note examines Carpenter’s impact on future Fourth Amendment cases, using another novel surveillance technique, hash-value matching, as a case study. Hash-value matching is a binary authentication method that can scan billions of digital communications in seconds for evidence of contraband. * J.D. Candidate, Fordham University School of Law, 2019; B.A., History, University of Delaware, 2016. This Note was prepared with the assistance of Professor Olivier Sylvain who served as my faculty adviser on the project. I would also like to thank John Bradshaw and Elias Wright for their input and edits. Lastly, I would like to thank my father, John Kassotis, for his suggestions and constant mentorship. 1243 1244 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. [Vol. XXIX:1243 INTRODUCTION ............................................................................ 1246 I. OVERVIEW OF HASH-VALUE MATCHING, INTERNET GOVERNANCE, AND INFORMATION PRIVACY .............. 1249 A. Hash-Value Matching ........................................... 1249 1. Detecting Child Pornography ......................... 1250 2. The Reporting Dynamic Between ECSPs and Law Enforcement .................................... 1251 3. The Crucial Role of an ISP in Obtaining Hash Evidence ................................................ 1254 4. Federal Framework Regulating Information Privacy ............................................................ 1257 B. The Fourth Amendment’s Role in Protecting Information Privacy .............................................. 1261 1. Reasonable Expectation of Privacy Test ........ 1263 2. An Objective, Privacy Centric Approach in a “World Without Privacy” ............................ 1265 C. Impact of United States v. Carpenter on the REP Test ....................................................................... 1267 1. The Third-Party Doctrine ............................... 1271 2. Private Search Doctrine .................................. 1274 3. The Private Search Doctrine in Hashing Cases ............................................................... 1276 4. The Binary Search Doctrine ........................... 1279 5. Formalist Approach to the Binary Search Doctrine .......................................................... 1282 II. FOURTH AMENDMENT EXCEPTIONALISM .................... 1286 A. A Dynamic Fourth Amendment ............................. 1288 1. Technological Exceptionalism ....................... 1290 2. Quantifying What Renders a Technology “Exceptional” ................................................. 1292 3. Cost-Centric Structural-Privacy Rights Approach to “Exceptionalism” ....................... 1293 4. Cost Centric Approach to Eroding Privacy Rights.............................................................. 1296 B. Rejecting Conventional Analogies When an Exceptional Technology Is at Issue ....................... 1298 1. Mono-Analogical Reasoning .......................... 1298 2019] THE FOURTH AMENDMENT & HASH-VALUE MATCHING 1245 2. Poly-Analogical Reasoning ............................ 1301 3. Riley, Carpenter, and Poly-Analogical Analysis in Action .......................................... 1302 4. Riley Declines to Extend the Search Incident to Lawful Arrest Doctrine to a Smart Phone on Arrestee’s Person ....................................... 1302 5. Carpenter Declines to Extend the Third- Party Doctrine to CSLI Held by a Private Wireless Carrier .............................................. 1304 III. ASSESSING HASH-VALUE MATCHING AND THE PRIVATE AND BINARY SEARCH DOCTRINES AFTER CARPENTER .................................................................. 1307 A. Surveillance Techniques that Reveal Information in the Binary .......................................................... 1308 1. Canine Sniffs .................................................. 1308 2. Narcotics Colorimetric (Spot) Test ................ 1311 B. Hash-Value Matching is Exceptional ................... 1313 1. Hashing is Non-Targeted................................ 1314 2. Hashing is Less Costly Than Other Binary Authentication Methods ................................. 1315 C. How Will Hashing Be Treated by the Post- Carpenter Framework? ......................................... 1316 1. A Fourth Amendment Inquiry Will Not Be Foreclosed Due to Hashing’s Binary Nature .. 1316 2. A Fourth Amendment Analysis Will Not Be Automatically Foreclosed by an ECSP’s Private Search ................................................. 1317 3. The Court Will Apply the Carpenter Factors to the Class of Information Sought................. 1317 CONCLUSION ................................................................................ 1320 1246 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. [Vol. XXIX:1243 INTRODUCTION Have you ever wondered how your email account verifies that you have entered the correct password when you attempt to log-in? Websites that require a user to log-in with a password keep a repository of hash-values corresponding to passwords that unlock specific user’s accounts.1 When a user first creates their password, the alphanumeric string they enter is run through a hash algorithm, converting it into a shortened output with a fixed length.2 This output, known as the password’s hash-value, is then saved by the website.3 When a user later attempts to log-in with the same input, the input will again be run through the hash-algorithm to create a hash-value.4 If the hash-value for the attempted log-in matches the stored hash-value, corresponding to the password initially entered, the user will be allowed to proceed into the account.5 Moreover, since websites store password’s hash-values, which cannot be converted back to the passwords they correspond to, even if their repository of hashes was hacked, a hacker would not be able to retrieve the desired passwords.6 The process used to verify passwords is called data-exposure.7 Data-exposure refers to a model where an entity keeps a repository of hash-values corresponding to known inputs (such as correct passwords), and compares unknown inputs (such as attempted passwords) against the repository to “expose” a match.8 If an unknown input matches a known hash-value, it is certain that the 1 Understanding Password Authentication & Password Cracking, WORDFENCE, https://www.wordfence.com/learn/how-passwords-work-and- cracking-passwords/ [https://perma.cc/9GUQ-EV9E] (last updated June 25, 2018). 2 Id. 3 Id. 4 Id. 5 Id. 6 See id. 7 Cf. Richard P. Salgado, Fourth Amendment Search and the Power of the Hash, 119 HARV. L. REV. 38, 43 (2005) (defining data exposure as matching an unknown set of hash-values against a known hash list to reveal particular files.); see also infra Introduction. 8 Id. 2019] THE FOURTH AMENDMENT & HASH-VALUE MATCHING 1247 unknown input is the same as the input that created the known hash-value.9 Safe password storage is one of many innocuous uses of data exposure. For example, law enforcement can compare a suspect’s hard-drive against a customized hash-list to look for files stolen during an intrusion, or for pirated software not yet released to the public.10 These examples refer to a targeted
Recommended publications
  • Almost Gone: the Vanishing Fourth Amendment's Allowance Of
    GEE- TO PRINT (DO NOT DELETE) 5/21/2019 4:05 PM ALMOST GONE: THE VANISHING FOURTH AMENDMENT’S ALLOWANCE OF STINGRAY SURVEILLANCE IN A POST-CARPENTER AGE HARVEY GEE* TABLE OF CONTENTS I. FOURTH AMENDMENT JURISPRUDENCE AND THE LACK OF POLICE ACCOUNTABILITY IN TRAFFIC STOPS .......... 412 II. BEYOND TERRY V. OHIO: FROM ONE-ON-ONE ENCOUNTERS TO PROACTIVE LARGE-SCALE STOP AND FRISKS ON THE STREETS WITHIN A POLICE STATE ......................................................................................... 417 III. DIGITAL UPGRADE: SURVEILLANCE STATE TECHNOLOGY AND REFRAMING THE SUPREME COURT’S FOURTH AMENDMENT JURISPRUDENCE ........ 420 A. CARPENTER V. UNITED STATES: POSITIONING A RESILIENT FOURTH AMENDMENT ON A PRO-PRIVACY TRAJECTORY IN THE DIGITAL AGE ............................................................. 423 IV. PRIVACY AND THE FOURTH AMENDMENT AFTER CARPENTER: ARGUING AGAINST THE UNCONSTITUTIONAL USE OF STINGRAY SURVEILLANCE TECHNOLOGY ........................................... 430 * The author is an attorney in San Francisco. He previously served as an Attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colorado State Public Defender. LL.M, The George Washington University Law School; J.D., St. Mary’s School of Law; B.A., Sonoma State University. The author thanks Taylor Francis, Elvira Razzano, Austin Smith, and the Southern California Review of Law and Social Justice for their assistance and hard work in the preparation of this article. 409 410 REVIEW OF LAW AND SOCIAL JUSTICE [Vol. 28:3 A. THE SECRET USE OF STINGRAY SURVEILLANCE TECHNOLOGY BY LAW ENFORCEMENT ................................ 431 B. CALLS FOR A WARRANT REQUIREMENT FOR THE USE OF STINGRAY CELL-SITE SIMULATORS FROM LEGAL SCHOLARS ............................................................................
    [Show full text]
  • Comment Submitted by David Crawley Comment View Document
    Comment Submitted by David Crawley Comment View document: The notion that my social media identifier should have anything to do with entering the country is a shockingly Nazi like rule. The only thing that this could facilitate anyway is trial by association - something that is known to ensnare innocent people, and not work. What is more this type of thing is repugnant to a free society. The fact that it is optional doesn't help - as we know that this "optional" thing will soon become not-optional. If your intent was to keep it optional - why even bother? Most importantly the rules that we adopt will tend to get adopted by other countries and frankly I don't trust China, India, Turkey or even France all countries that I regularly travel to from the US with this information. We instead should be a beacon for freedom - and we fail in our duty when we try this sort of thing. Asking for social media identifier should not be allowed here or anywhere. Comment Submitted by David Cain Comment View document: I am firmly OPPOSED to the inclusion of a request - even a voluntary one - for social media profiles on the I-94 form. The government should NOT be allowed to dip into users' social media activity, absent probable cause to suspect a crime has been committed. Bad actors are not likely to honor the request. Honest citizens are likely to fill it in out of inertia. This means that the pool of data that is built and retained will serve as a fishing pond for a government looking to control and exploit regular citizens.
    [Show full text]
  • Legal Responses and Countermeasures to National Security Letters
    Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D.
    [Show full text]
  • Stingray Cell-Site Simulator Surveillance and the Fourth
    St. John's Law Review Volume 93 Number 2 Volume 93, 2019, Number 2 Article 3 Stingray Cell-Site Simulator Surveillance and the Fourth Amendment in the Twenty-First Century: A Review of The Fourth Amendment in an Age of Surveillance, and Unwarranted Harvey Gee Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. BOOK REVIEW STINGRAY CELL-SITE SIMULATOR SURVEILLANCE AND THE FOURTH AMENDMENT IN THE TWENTY-FIRST CENTURY: A REVIEW OF THE FOURTH AMENDMENT IN AN AGE OF SURVEILLANCE, AND UNWARRANTED BARRY FRIEDMAN, UNWARRANTED: POLICING WITHOUT PERMISSION, NEW YORK: FARRAR, STRAUSS AND GIROUX, 2017. PP. 434. DAVID GRAY, THE FOURTH AMENDMENT IN AN AGE OF SURVEILLANCE, NEW YORK: CAMBRIDGE UNIVERSITY PRESS, 2017. PP. 305. HARVEY GEE† INTRODUCTION The police can secretly track your every physical movement, listen to your private conversations, and collect data from your cell phone—all without first getting a warrant based on probable cause, signed off by a judge. “WTF?!” you text. Indeed, this practice by law enforcement using portable Stingray cell-site simulators as digital surveillance tools has also raised the eyebrows of privacy advocates and state and federal courts across the country in the past few years. † The author is an attorney in San Francisco. He previously served as an attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colorado State Public Defender.
    [Show full text]
  • Last Call for the Third Party Doctrine in the Digital Age After Carpenter?
    GEE_5.16.20_FINAL (DO NOT DELETE) 8/22/2020 12:42 PM ARTICLE LAST CALL FOR THE THIRD-PARTY DOCTRINE IN THE DIGITAL AGE AFTER CARPENTER? HARVEY GEE† INTRODUCTION ............................................................................................... 287 I. FROM MILLER AND SMITH TO CARPENTER: THE ORIGINS AND DEVELOPMENT OF THE THIRD-PARTY DOCTRINE ........................................................ 290 II. DEPARTING FROM SMITH AND MILLER: CARPENTER DIGITIZES THE KATZ REASONABLE EXPECTATION OF PRIVACY TEST .................................. 297 III. AFTER CARPENTER: ARGUING FOR A WARRANT REQUIREMENT FOR HISTORICAL AND REAL-TIME CLSI, THE THIRD-PARTY DOCTRINE IS NOT APPLICABLE TO REAL-TIME CELL PHONE MONITORING, AND THE THREAT OF FACIAL RECOGNITION SURVEILLANCE TECHNOLOGY ..... 300 A. Arguing for a Warrant Requirement for Real-Time CLSI .............. 302 B. The Third-Party Doctrine is Not Applicable to Real-Time Cell phone Monitoring ................................................................................... 310 C. The Threat of Facial Recognition Surveillance Technology and the Need for Regulation ..................................................................... 315 CONCLUSION ................................................................................................... 323 † The author is an attorney in San Francisco. He previously served as an attorney with the Office of the Federal Public Defender in Las Vegas and Pittsburgh, the Federal Defenders of the Middle District of Georgia, and the Office of the Colo-
    [Show full text]
  • 1 June 18, 2014 Majority Leader Harry Reid United States Senate
    June 18, 2014 Majority Leader Harry Reid Republican Leader Mitch McConnell United States Senate United States Senate Washington, DC 20510 Washington, DC 20510 Chairman Patrick J. Leahy Ranking Member Chuck Grassley U.S. Senate Committee on the Judiciary U.S. Senate Committee on the Judiciary Washington, DC 20510 Washington, DC 20510 Chairman Dianne Feinstein Ranking Member Saxby Chambliss U.S. Senate Select Committee on U.S. Senate Select Committee on Intelligence Intelligence Washington, DC 20510 Washington, DC 20510 Dear Majority Leader Reid, Republican Leader McConnell, Chairmen Leahy and Feinstein, and Ranking Members Grassley and Chambliss: The undersigned civil liberties, human rights, and other public interest organizations write about the USA FREEDOM Act (H.R. 3361 and S. 1599), a version of which passed in the House on May 22. All of the undersigned organizations believed the original version of the USA FREEDOM Act introduced in both the House and the Senate was an important step towards comprehensive reform. However, we are deeply concerned about the changes that the House Rules Committee made to the bill prior to passage, which substantially weakened the version of the bill that had passed with unanimous support from both the House Judiciary and Intelligence Committees. As a result of that strong concern, many of the undersigned withdrew their support, as did half of the bill’s sponsors. We are writing today as a community to plainly express our position that, unless the version of the USA FREEDOM Act that the Senate considers contains substantial improvements over the House-passed version, we will be forced to oppose the bill that so many of us previously worked to advance.
    [Show full text]
  • Protecting Personal Data, Electronic Communications, and Individual
    Hastings Constitutional Law Quarterly Volume 42 Article 4 Number 3 Spring 2015 1-1-2015 The ewN Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment Megan Blass Follow this and additional works at: https://repository.uchastings.edu/ hastings_constitutional_law_quaterly Part of the Constitutional Law Commons Recommended Citation Megan Blass, The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance through a Return to a Property-Based Approach to the Fourth Amendment, 42 Hastings Const. L.Q. 577 (2015). Available at: https://repository.uchastings.edu/hastings_constitutional_law_quaterly/vol42/iss3/4 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Constitutional Law Quarterly by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance Through a Return to a Property-Based Approach to the Fourth Amendment by MEGAN BLASS* I. Mass Surveillance in the New Millennium: Edward Snowden Versus The National Security Agency A. Watergate Fears Realized: National Security Agency Programs Exposed in 2013 Edward Snowden is now a household name.' He garnered global attention in 2013 when he claimed responsibility for leaking government documents that revealed unprecedented levels of domestic surveillance conducted by the National Security Agency ("NSA" or "the Agency"). 2 The information leaked by Mr.
    [Show full text]
  • Declaration of Bruce Schneier
    Case 1:17-cv-02016-RC Document 10-4 Filed 10/11/17 Page 1 of 60 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) UNITED TO PROTECT DEMOCRACY et al. ) ) Plaintiffs, ) v. ) Civil No. 17-02016 (RC) ) ) PRESIDENTIAL ADVISORY COMMISSION ) ON ELECTION INTEGRITY et al. ) ) ) Defendants. ) ) DECLARATION OF BRUCE SCHNEIER Laurence M. Schwartztol Danielle Conley (D.C. Bar #503345) (Pro hac vice pending) Lynn Eisenberg (D.C. Bar #1017511) Justin Florence (D.C. Bar #988953) Jason Hirsch ( Pro hac vice forthcoming) THE PROTECT DEMOCRACY PROJECT Michael Posada (Pro hac vice pending) 10 Ware Street WILMER CUTLER PICKERING Cambridge, MA 02138 HALE & DORR LLP (202) 856-9191 1875 Pennsylvania Avenue NW Washington, D.C. 20006 (202) 663 -6000 Case 1:17-cv-02016-RC Document 10-4 Filed 10/11/17 Page 2 of 60 DECLARATION OF BRUCE SCHNEIER I, Bruce Schneier, declare as follows: 1. I am a security technologist with expertise in how complex data systems can be secured against, or vulnerable to, hacking or other security breaches. 2. I have over 30 years of experience studying these issues as a scholar, engineer, consultant, writer, and public commentator. 3. I currently serve as Chief Technology Officer to IBM Resilient in Cambridge, MA. I am also currently a Lecturer at the John F. Kennedy School of Government at Harvard University, a Research Fellow in the Science, Technology, and Public Policy program at the Belfer Center for Science and International Affairs at the Kennedy School, and a Fellow in the Berkman Klein Center for Internet and Society at Harvard University.
    [Show full text]
  • 2018-11-06 HHS DHS NPRM Comment ORR-ICE Data Sharing Final
    Before the Department of Homeland Security Department of Health and Human Services In the Matter of Apprehension, Processing, Care, and DHS Docket No. ICEB–2018–0002 Custody of Alien Minors and Unaccompanied Alien Children COMMENTS OF CENTER ON PRIVACY & TECHNOLOGY AT GEORGETOWN LAW 18MILLIONRISING.ORG BRENNAN CENTER FOR JUSTICE AT NYU SCHOOL OF LAW CENTER FOR DEMOCRACY & TECHNOLOGY COLOR OF CHANGE DEMAND PROGRESS EDUCATION FUND ELECTRONIC PRIVACY INFORMATION CENTER LEGAL AID JUSTICE CENTER OPEN THE GOVERNMENT NAACP NATIONAL HISPANIC MEDIA COALITION NATIONAL IMMIGRATION LAW CENTER NEW AMERICA’S OPEN TECHNOLOGY INSTITUTE RESTORE THE FOURTH Supported by: Harrison Rudolph Laura M. Moy Delia Brennan Gabrielle Rejouis Daniel Chozick Center on Privacy & Technology at Georgetown Law Georgetown Law Students 600 New Jersey Avenue, NW Washington, DC 20001 Filed November 6, 2018 (202) 661-6709 Table of Contents I. Introduction and Summary ............................................................................................ 1 II. The Proposed Expanded Suitability Assessments Will Delay Release of Unaccompanied Children from Custody ...................................................................... 4 III. The Delays Caused by HHS’s Expanded Sponsor Suitability Assessments Violate Federal Law ......................................................................................................... 5 A. The Delays Caused by HHS’s Expanded Sponsor Suitability Assessments Are Unnecessary ........................................................................................................
    [Show full text]
  • The Impact of Online Surveillance on Behavior
    The impact of online surveillance on behavior The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Marthews, Alex & Catherine Tucker. “The impact of online surveillance on behavior.” The Cambridge handbook of surveillance law, part 3 (June 2017): 393-508 © 2017 The Author(s) As Published 10.1017/9781316481127.019 Publisher Cambridge University Press Version Author's final manuscript Citable link https://hdl.handle.net/1721.1/130532 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Detailed Terms http://creativecommons.org/licenses/by-nc-sa/4.0/ 437 18 The Impact of Online Surveillance on Behavior Alex Marthews † & Catherine Tucker ‡ Mass digital surveillance differs from older, analog, and more overt forms of physical surveillance. Nonetheless, empirical research after the Snowden revelations shows that it still has a meaningful chilling effect on online behavior, including Google searches, use of Wikipedia, and expression of controversial opinions. In the courts, these studies may help plaintiffs challenging mass surveillance programs in both the United States and the European Union to demonstrate standing. In the executive and legislative branches, the studies enable the discussion to move on from the question of whether a chilling effect exists from surveillance, to the question of what, if anything, to do about it. I How Online Surveillance May Affect Behavior Differently from Offl ine Surveillance A common trope in surveillance debates claims that subjects of digital surveillance are less affected than subjects of more traditional direct surveillance.
    [Show full text]
  • The Pendulum Effect: Comparisons Between the Snowden Revelations and the Church Committee
    CORE Metadata, citation and similar papers at core.ac.uk Provided by MURAL Information- Maynooth University & Communications Research Archive Library Technology Law, 2014 Vol. 23, No. 3, 192–219, http://dx.doi.org/10.1080/13600834.2014.970375 The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe? Maria Helen Murphy* Law Department, National University of Ireland, Maynooth, Ireland This article considers how the pendulum metaphor can be applied to shifts in popular opinion concerning the right to privacy. At times, the media portrays privacy as an individualistic right, serving at the behest of criminals and terrorists. Every so often, however, an event occurs that starkly reminds the public of the value of privacy. Public opinion drives debate and this debate often leads to legal reform. The Church Committee, formed in response to the Watergate scandal, is a classic example of the effect the exposure of abuse can have on the regulation of privacy. Over time, however, legislative gains in privacy protection have a tendency to erode. In addition, extreme events, such as the terrorist attacks of 9/11, can cause the pendulum to swing back to the opposite position. Following the exposure of mass surveillance practices by Edward Snowden, the world has, once again, been questioning government surveillance activities. This article seeks to consider the transatlantic impact of the National Security Agency revelations. Transparency is highlighted as a crucial regulating force on excessive government interference with privacy rights. Keywords: Snowden; surveillance; privacy; data retention; European Union Introduction The concept of a swinging pendulum frequently serves as a political metaphor, illustrat- ing oscillations from one policy position to another over time.1 The metaphor borrows from the scientific principle that the restoring force of gravity, combined with the mass of a pendulum, will cause it to swing back and forth indefinitely.
    [Show full text]
  • Legal Committee (Legal)
    Legal Committee (Legal) MUNUC 33 1 Legal Committee | MUNUC 33 TABLE OF CONTENTS ______________________________________________________ CHAIR LETTER…………………………….….………………………….……..…3 HISTORY OF COMMITTEE……………..………………………………………..5 TOPIC A: LEGALITY AND ETHICS OF GENETIC ENGINEERING……..…….6 Statement of the Problem……………….……………..…………...…6 History of the Problem………………………………………………….12 Past Actions…………………………………………………………….. 18 Possible Solutions……………………………………………………….22 Bloc Positions……………………………………………………….……23 Glossary…………………………………………………………………..26 Bibliography……………………………………………………………..28 TOPIC B: INFORMATION PRIVACY AND PROTECTION…………..……...34 Statement of the Problem……………….………...………………....34 History of the Problem………………………………………………….40 Past Actions…………………………………………………………….. 46 Possible Solutions……………………………………………………….49 Bloc Positions……………………………………………………….……50 Glossary…………………………………………………………………..54 Bibliography………………………………………………………….....56 2 Legal Committee | MUNUC 33 CHAIR LETTER ____________________________________________________ Dear Delegates, Welcome to the Legal Committee at MUNUC 33! My name is Andy Roselund, and I will be your chair for LEGAL this year. I was born in New York City, but moved to New Jersey after a few years; as of writing this letter, I am now living in Hyde Park, where I hope to be for a while. I am a second year in the College studying law and political science (very fitting for LEGAL). Outside of MUNUC, I spend my free time doing research for a law firm back in New Jersey, practicing cello, running (although my high school cross country days are well behind me), and exploring Chicago with my friends. I led my high school’s Model UN team for two years and served as an Assistant Chair last year at MUNUC 32, and I am psyched to have a wonderful time chairing all of you at MUNUC 33. I anticipate that you all are looking forward to debating, drafting, and passing resolutions in LEGAL this year.
    [Show full text]