546 research outputs found

    Reviving the Nixon Doctrine: NSA Spying, the Commander-In-Chief, and Excutive Power in the War on Terror

    Get PDF
    When the President does it, that means that it is not illegal. So Richard Nixon infamously defended his approval of a plan to engage in warrantless wiretapping of Americans involved in the antiwar movement in the 1970s. For thirty years Nixon\u27s defense has stood as the apogee of presidential arrogance. But of course Nixon was proved wrong. The wiretapping plan was shelved when FBI Director J. Edgar Hoover, of all people, objected to it. Nixon\u27s approval of the program was listed in the articles of impeachment, and ultimately he was forced to resign. Nixon learned the hard way that presidents are not above the law. In defending the NSA spying program, at least until the recent about-face, as well as in its views on enemy combatants and torture, the Bush administration has essentially revived the Nixon doctrine. This essay argues that the Bush administration\u27s defense of the NSA spying program (and of unchecked presidential authority over enemy combatants and interrogation techniques) is fundamentally flawed, both as a matter of law and as a matter of national security policy. The argument that Congress authorized the program defies the most basic principles of statutory construction. The claim that the Commander in Chief has uncheckable authority with respect to the means and methods of engaging the enemy is contrary to the text of the Constitution, the structure of checks and balances, and a long line of Supreme Court precedent. And no Fourth Amendment precedent supports the notion that the president may wiretap Americans without probable cause or a warrant

    Fourth Amendment Implications of Warrantless Aerial Surveillance

    Get PDF

    Privacy in Public and the contextual conditions of agency

    Get PDF
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous and purposive agents relies on some degree of privacy, perhaps particularly as we act in public and semi-public spaces. I suggest that basic issues concerning action choices have been left largely unexplored, due to a series of problematic theoretical assumptions at the heart of privacy debates. One such assumption has to do with the influential conceptualization of privacy as pertaining to personal intimate facts belonging to a private sphere as opposed to a public sphere of public facts. As Helen Nissenbaum has pointed out, the notion of privacy in public sounds almost like an oxymoron given this traditional private-public dichotomy. I discuss her important attempt to defend privacy in public through her concept of ‘contextual integrity.’ Context is crucial, but Nissenbaum’s descriptive notion of existing norms seems to fall short of a solution. I here agree with Joel Reidenberg’s recent worries regarding any approach that relies on ‘reasonable expectations’ . The problem is that in many current contexts we have no such expectations. Our contexts have already lost their integrity, so to speak. By way of a functional and more biologically inspired account, I analyze the relational and contextual dynamics of both privacy needs and harms. Through an understanding of action choice as situated and options and capabilities as relational, a more consequence-oriented notion of privacy begins to appear. I suggest that privacy needs, harms and protections are relational. Privacy might have less to do with seclusion and absolute transactional control than hitherto thought. It might instead hinge on capacities to limit the social consequences of our actions through knowing and shaping our perceptible agency and social contexts of action. To act with intent we generally need the ability to conceal during exposure. If this analysis is correct then relational privacy is an important condition for autonomic purposive and responsible agency—particularly in public space. Overall, this chapter offers a first stab at a reconceptualization of our privacy needs as relational to contexts of action. In terms of ‘rights to privacy’ this means that we should expand our view from the regulation and protection of the information of individuals to questions of the kind of contexts we are creating. I am here particularly interested in what I call ‘unbounded contexts’, i.e. cases of context collapses, hidden audiences and even unknowable future agents

    Pandemic Influenza: Ethics, Law, and the Public\u27s Health

    Get PDF
    Highly pathogenic Influenza (HPAI) has captured the close attention of policy makers who regard pandemic influenza as a national security threat. Although the prevalence is currently very low, recent evidence that the 1918 pandemic was caused by an avian influenza virus lends credence to the theory that current outbreaks could have pandemic potential. If the threat becomes a reality, massive loss of life and economic disruption would ensue. Therapeutic countermeasures (e.g., vaccines and antiviral medications) and public health interventions (e.g., infection control, social separation, and quarantine) form the two principal strategies for prevention and response, both of which present formidable legal and ethical challenges that have yet to receive sufficient attention. In part II, we examine the major medical countermeasures being being considered as an intervention for an influenza pandemic. In this section, we will evaluate the known effectiveness of these interventions and analyze the ethical claims relating to distributive justice in the allocation of scarce resources. In part III, we will discuss public health interventions, exploring the hard tradeoffs between population health on the one hand and personal (e.g., autonomy, privacy, and liberty) and economic (e.g., trade, tourism, and business) interests on the other. This section will focus on the ethical and human rights issues inherent in population-based interventions. Pandemics can be deeply socially divisive, and the political response to these issues not only impacts public health preparedness, but also reflects profoundly on the kind of society we aspire to be

    The dawn of the age of the drones: an Australian privacy law perspective

    Get PDF
    Examines Australia\u27s privacy laws in relation to unmanned aerial vehicles, to identify deficiencies that may need to be addressed. Introduction Suppose a homeowner habitually enjoys sunbathing in his or her backyard, protected by a high fence from prying eyes, including those of an adolescent neighbour. In times past such homeowners could be assured that they might go about their activities without a threat to their privacy. However, recent years have seen technological advances in the development of unmanned aerial vehicles (‘UAVs’), also known colloquially as drones, that have allowed them to become reduced in size, complexity and price. UAVs today include models retailing to the public for less than $350 and with an ease of operation that enables them to serve as mobile platforms for miniature cameras. These machines now mean that for individuals like the posited homeowner’s adolescent neighbour, barriers such as high fences no longer constitute insuperable obstacles to their voyeuristic endeavours. Moreover, ease of access to the internet and video sharing websites provides a ready means of sharing any recordings made with such cameras with a wide audience. Persons in the homeowner’s position might understandably seek some form of redress for such egregious invasions of their privacy. Other than some form of self-help, what alternative measures may be available? Under Australian law this problem yields no easy answer. In this country, a fractured landscape of common law, Commonwealth and state/territory legislation provides piecemeal protection against invasions of privacy by cameras mounted on UAVs. It is timely, at what may be regarded as the early days of the drone age, to consider these laws and to identify deficiencies that may need to be addressed lest, to quote words that are as apt today as they were when written over 120 years ago, ‘modern enterprise and invention … through invasions upon [their] privacy, [subject victims] to mental pain and distress, far greater than could be inflicted by mere bodily injury.

    Centering Disability in Technology Policy: Issue Landscape and Potential Opportunities for Action (Plain Language Version)

    Get PDF
    Technology has a lot of power. Technology can make the world more inclusive. Technology can make the world more fair.Many people are marginalized in the world. This means they deal with discrimination. Other people treat them badly. Sometimes, laws are unfair to marginalized people. People can be marginalized because of their race or skin color (racism). People can be marginalized because of their gender (sexism or gender-based oppression). People can be marginalized because of their disability (ableism). Technology can help marginalized people be safer. Technology can help marginalized people take control of their lives. Technology can help marginalized people earn money too.But technology doesn't always help marginalized people. Technology often hurts marginalized people instead. Technology can make discrimination worse. This is even worse for people who are marginalized in more than one way, like disabled people of color.This report is about technology and disability issues. Two organizations worked together to write it. Then they got help from another group. Those groups are the American Association of People with Disabilities (AAPD) and the Center for Democracy and Technology (CDT). AAPD and CDT talked to 20 leaders in disability and technology advocacy. Then they wrote this report, with help from the Freedman Consulting company.This report will help other organizations work on disability and technology issues. This report will help other organizations include disabled people. This report says how technology organizations can include disability. It also gives ideas for disability organizations to advocate on technology issues. Some technology issues are related to important disability advocacy issues. This report also talks about challenges for disability and technology organizations working together

    SECURITY AND PRIVACY ISSUES IN MOBILE NETWORKS, DIFFICULTIES AND SOLUTIONS

    Get PDF
    Mobile communication is playing a vital role in the daily life for the last two decades; in turn its fields gained the research attention, which led to the introduction of new technologies, services and applications. These new added facilities aimed to ease the connectivity and reachability; on the other hand, many security and privacy concerns were not taken into consideration. This opened the door for the malicious activities to threaten the deployed systems and caused vulnerabilities for users, translated in the loss of valuable data and major privacy invasions. Recently, many attempts have been carried out to handle these concerns, such as improving systems’ security and implementing different privacy enhancing mechanisms. This research addresses these problems and provides a mean to preserve privacy in particular. In this research, a detailed description and analysis of the current security and privacy situation in the deployed systems is given. As a result, the existing shortages within these systems are pointed out, to be mitigated in development. Finally a privacy preserving prototype model is proposed. This research has been conducted as an extensive literature review about the most relevant references and researches in the field, using the descriptive and evaluative research methodologies. The main security models, parameters, modules and protocols are presented, also a detailed description of privacy and its related arguments, dimensions and factors is given. The findings include that mobile networks’ security along with users are vulnerable due to the weaknesses of the key exchange procedures, the difficulties that face possession, repudiation, standardization, compatibility drawbacks and lack of configurability. It also includes the need to implement new mechanisms to protect security and preserve privacy, which include public key cryptography, HIP servers, IPSec, TLS, NAT and DTLS-SRTP. Last but not least, it shows that privacy is not absolute and it has many conflicts, also privacy requires sophisticated systems, which increase the load and cost of the system.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
    • …
    corecore