There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
Developed from the casebook Information Privacy Law, this short paperback contains key cases and materials focusing on privacy issues related to government surveillance and national security. It can be used as a supplement to general criminal procedure courses, as it covers electronic surveillance law and national security surveillance extensively, topics that many criminal procedure casebooks¿don’t cover in depth. New to the Third Edition: Carpenter v. United States United States v. Basaaly Saeed Moalin Other topics covered include: Fourth Amendment Third Party Doctrine Metadata, sensory enhancement technology Video surveillance, audio surveillance, location tracking, and GPS Electronic surveillance law and computer searches ECPA, CALEA, USA-PATRIOT Act, FISA Foreign intelligence and NSA surveillance
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy"--Jacket.
This power, by necessity and preference, has become the central congressional tool for participating in national security policy. Inevitably attacks on policy are transformed into attacks on the making and effects of appropriations.
A book about what the Cambridge Analytica scandal shows: That surveillance and data privacy is every citizens’ concern An important look at how 50 years of American privacy law is inadequate for the today's surveillance technology, from acclaimed Ars Technica senior business editor Cyrus Farivar. Until the 21st century, most of our activities were private by default, public only through effort; today anything that touches digital space has the potential (and likelihood) to remain somewhere online forever. That means all of the technologies that have made our lives easier, faster, better, and/or more efficient have also simultaneously made it easier to keep an eye on our activities. Or, as we recently learned from reports about Cambridge Analytica, our data might be turned into a propaganda machine against us. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.
This timely casebook provides a complete exploration of both constitutional and domestic law issues of national security, blended with cases, notes, questions, and original materials. The best-selling casebook in the field, National Security Law, Third Edition, Is both current and comprehensive. Some of the effective features that earned the book its leading position include: a cohesive thematic framework that examines policy And The consequences surrounding American use of force, intelligence operations, and counterterrorism efforts rich primary materials, such as judicial opinions, executive correspondence, statutes, and legislative history penetrating hypothetical questions that prompt analysis of the actual issues faced by national security professionals plentiful descriptive text to supply context and informative historical and background materials Material in the Third Edition is especially important in light of current national security issues: Part III, devoted to terrorism and transnational law enforcement, includes the original Osama bin Laden case, American-Arab Anti-Discrimination Committee v. Reno, and materials on consequence management extensive coverage throughout the book of the terrorist attacks of September 11, 2001 with legal analysis of U.S. And international responses U.S. military involvement in Columbia U.S. And NATO activity in Kosovo
A new textbook exploring selected national security law issues, focusing on the choices between liberty and security and law's role as a tool or constraint on national security policy. Written for students who may not have prior experience studying the various areas of law that comprise national security law such as constitutional, international, and criminal law. This text is deliberately not a "casebook," with extended excerpts of judicial opinions followed by notes and questions, often leaving the reader to wonder "what is the law"? Instead, the authors have clearly explained complicated legal issues inherent in national security, while not ignoring the material's complexity. The text explores a variety of topics within the context of national security, including the constitutional separation of national security powers, constitutionally guaranteed liberties, international law, counterterrorism law, intelligence operations, and homeland security. An instructor manual is forthcoming.
Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.