The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of Smith v. Maryland, the privacy invasions resulting from the universal use of pen regist...
This paper examines the criminal prosecution of Milberg Weiss, formerly the most successful plaintif...
A central difference between contract and property concerns the freedom to customize legally enfor...
Obtaining and examining cell site location records to find a person is a “search” in any normal sens...
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the el...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
The meaning of the rights enshrined in the Constitution provides a critical baseline for understandi...
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometr...
This is an amicus brief filed in the United States Supreme Court in support of the respondents in Ta...
This is an amicus brief filed in the United States Supreme Court in support of the respondents in Ta...
This is an amicus brief filed in the United States Supreme Court in support of the respondents in Ta...
(Excerpt) Ultimately, this Article concludes that, while Vice Presidents have become embroiled in ev...
The Supreme Court’s recent decisions concerning preclusion doctrine stress the “deep-rooted historic...
Social inclusion is a human right for all people, and it should take into consideration also people ...
University of Minnesota M.A. thesis. May 2015. Major: Mass Communication. Advisor: Amy Sanders. 1 co...
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (App...
This paper examines the criminal prosecution of Milberg Weiss, formerly the most successful plaintif...
A central difference between contract and property concerns the freedom to customize legally enfor...
Obtaining and examining cell site location records to find a person is a “search” in any normal sens...
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the el...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
The meaning of the rights enshrined in the Constitution provides a critical baseline for understandi...
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometr...
This is an amicus brief filed in the United States Supreme Court in support of the respondents in Ta...
This is an amicus brief filed in the United States Supreme Court in support of the respondents in Ta...
This is an amicus brief filed in the United States Supreme Court in support of the respondents in Ta...
(Excerpt) Ultimately, this Article concludes that, while Vice Presidents have become embroiled in ev...
The Supreme Court’s recent decisions concerning preclusion doctrine stress the “deep-rooted historic...
Social inclusion is a human right for all people, and it should take into consideration also people ...
University of Minnesota M.A. thesis. May 2015. Major: Mass Communication. Advisor: Amy Sanders. 1 co...
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (App...
This paper examines the criminal prosecution of Milberg Weiss, formerly the most successful plaintif...
A central difference between contract and property concerns the freedom to customize legally enfor...
Obtaining and examining cell site location records to find a person is a “search” in any normal sens...