This blog …

... supports Professor William Snyder's sections of National Security Law, Counterterrorism Law, and Prosecuting Terrorists at the Syracuse University College of Law.

Biometrics Reading Made Available by Yale’s “Location and Tracking Biometrics Conference”

Yesterday, Yale Law School hosted “The Location Tracking and Biometrics Conference,” where judges, policymakers, practitioners, academics, and other experts gathered to discuss the future of government surveillance, specifically GPS-tracking vehicles without a warrant, in light of the U.S. Supreme Court’s decision in U.S. v. Jones. Additionally, the conference offered an opportunity for attendants to discuss the various forms of location tracking and the possible negative implications associated with the implementation of biometric identification technology. Importantly, the program published a compilation of resources relevant to the discussions. Such documents include, but are not limited to, the following:

  • “Can You See Me Now? Toward Reasonable Standards for Law Enforcement Access to Location Data That Congress Could Enact,” by Stephanie K. Pell and Christopher Soghoian, an article proposing a statutory model for law enforcement access and surveillance standards as well as privacy protections that attempts to: “(1) articulate clear rules for courts to apply and law enforcement agents and industry to follow; and (2) strike a reasonable balance among the interests of law enforcement, privacy, and industry with the ultimate goal of improving the position of all concerned when measured against the current state of the law.” And,
  • A Wall Street Journal piece, “New Tracking Fronteir: Your License Plates,” discussing recent instances when the local police have gathered the private license plate data of unsuspecting citizens through photographic surveillance methods. The article goes on to explain:

Data about a typical American is collected in more than 20 different ways during everyday activities, according to a Wall Street Journal analysis. Fifteen years ago, more than half of these types of surveillance tools were unavailable or not in widespread use.

You can find the full document list with links to each here.

 

Share this article:

Tags:

Leave a Reply

You must be logged in to post a comment.

Categories