Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, vascular patterns, hormones, and gait, which, when paired with surveillanc...
All states allow the public to anonymously report suspicions of child abuse or neglect to a toll fre...
Cyber crime is a growing problem, with the impact to both businesses and individuals increasing expo...
ABSTRACT The National Telecommunications and Information Administration have convened a series of me...
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s int...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
University of Minnesota M.A. thesis. May 2015. Major: Journalism. Advisor: Jane Kirtley. 1 computer ...
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the el...
This article suggests that the current public debate that pits security and privacy as dichotomous r...
The meaning of the rights enshrined in the Constitution provides a critical baseline for understandi...
(Excerpt) Ultimately, this Article concludes that, while Vice Presidents have become embroiled in ev...
University of Minnesota M.A. thesis. May 2015. Major: Mass Communication. Advisor: Amy Sanders. 1 co...
Privacy often bears an assumed connection to political freedom, but the nature of that connection is...
The National Telecommunications and Information Administration have convened a series of meetings to...
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to m...
A central difference between contract and property concerns the freedom to customize legally enfor...
All states allow the public to anonymously report suspicions of child abuse or neglect to a toll fre...
Cyber crime is a growing problem, with the impact to both businesses and individuals increasing expo...
ABSTRACT The National Telecommunications and Information Administration have convened a series of me...
The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s int...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
University of Minnesota M.A. thesis. May 2015. Major: Journalism. Advisor: Jane Kirtley. 1 computer ...
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the el...
This article suggests that the current public debate that pits security and privacy as dichotomous r...
The meaning of the rights enshrined in the Constitution provides a critical baseline for understandi...
(Excerpt) Ultimately, this Article concludes that, while Vice Presidents have become embroiled in ev...
University of Minnesota M.A. thesis. May 2015. Major: Mass Communication. Advisor: Amy Sanders. 1 co...
Privacy often bears an assumed connection to political freedom, but the nature of that connection is...
The National Telecommunications and Information Administration have convened a series of meetings to...
The rapid deployment of privacy-destroying technologies by governments and businesses threatens to m...
A central difference between contract and property concerns the freedom to customize legally enfor...
All states allow the public to anonymously report suspicions of child abuse or neglect to a toll fre...
Cyber crime is a growing problem, with the impact to both businesses and individuals increasing expo...
ABSTRACT The National Telecommunications and Information Administration have convened a series of me...