{"title":"National Security, Narcissism, Voyeurism, and Kyllo: How Intelligence Programs and Social Norms are Affecting the Fourth Amendment","authors":"A. R. Pearlman, Erick S. Lee","doi":"10.37419/LR.V2.I4.6","DOIUrl":null,"url":null,"abstract":"This article begins by tracing the development of Fourth Amendment jurisprudence in light of technological advancements from when the Supreme Court first addressed wiretapping in Olmstead in 1928, all the way through Kyllo, decided in 2001, mere months before the 9/11 terrorist attacks. We bifurcate that criminal law history from the national security law developments that led to the enactment of the Foreign Intelligence Surveillance Act, and the \"wall\" between law enforcement and intelligence organs of the federal government.Since the 9/11 attacks, however, traditional law enforcement and national security investigations (and investigatory methods) are more closely linked than when the key Supreme Court cases were decided. Further, surveillance and data collection capabilities are more widely reported and openly discussed than ever before. And, despite those two facts, the ways in which society has been employing technology in everyday use means the formerly private details of peoples' lives are more exposed and vulnerable than ever.We seek to qualify somewhat the growing consensus that, at least as it was known in the twentieth century, \"privacy is dead.\" Although that sentiment seems empirically correct, we argue it is an oversimplification that fails to account for American values and legal policy. We recognize as a morally neutral proposition that privacy is a legal fiction, but argue that it is a fiction best maintained and protected to the extent possible, given the unambiguous willingness of people en masse to sacrifice their privacy for mere convenience and token benefits.","PeriodicalId":224499,"journal":{"name":"ERN: National Security & War (Topic)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ERN: National Security & War (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37419/LR.V2.I4.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This article begins by tracing the development of Fourth Amendment jurisprudence in light of technological advancements from when the Supreme Court first addressed wiretapping in Olmstead in 1928, all the way through Kyllo, decided in 2001, mere months before the 9/11 terrorist attacks. We bifurcate that criminal law history from the national security law developments that led to the enactment of the Foreign Intelligence Surveillance Act, and the "wall" between law enforcement and intelligence organs of the federal government.Since the 9/11 attacks, however, traditional law enforcement and national security investigations (and investigatory methods) are more closely linked than when the key Supreme Court cases were decided. Further, surveillance and data collection capabilities are more widely reported and openly discussed than ever before. And, despite those two facts, the ways in which society has been employing technology in everyday use means the formerly private details of peoples' lives are more exposed and vulnerable than ever.We seek to qualify somewhat the growing consensus that, at least as it was known in the twentieth century, "privacy is dead." Although that sentiment seems empirically correct, we argue it is an oversimplification that fails to account for American values and legal policy. We recognize as a morally neutral proposition that privacy is a legal fiction, but argue that it is a fiction best maintained and protected to the extent possible, given the unambiguous willingness of people en masse to sacrifice their privacy for mere convenience and token benefits.