Book contents
- Smart Surveillance
- Smart Surveillance
- Copyright page
- Contents
- Acknowledgments
- Introduction
- 1 The Cost–Benefit Analysis Theory
- 2 Measuring the Benefits of Surveillance
- 3 Quantifying Criminal Procedure
- 4 Reactive Surveillance
- 5 Binary Searches and the Potential for 100 Percent Enforcement
- 6 Public Surveillance, Big Data, and Mosaic Searches
- 7 The Third-Party Doctrine Dilemma and the Outsourcing of Our Fourth Amendment Rights
- 8 Hyper-Intrusive Searches
- Conclusion
- Notes
- Index
7 - The Third-Party Doctrine Dilemma and the Outsourcing of Our Fourth Amendment Rights
Published online by Cambridge University Press: 02 August 2019
- Smart Surveillance
- Smart Surveillance
- Copyright page
- Contents
- Acknowledgments
- Introduction
- 1 The Cost–Benefit Analysis Theory
- 2 Measuring the Benefits of Surveillance
- 3 Quantifying Criminal Procedure
- 4 Reactive Surveillance
- 5 Binary Searches and the Potential for 100 Percent Enforcement
- 6 Public Surveillance, Big Data, and Mosaic Searches
- 7 The Third-Party Doctrine Dilemma and the Outsourcing of Our Fourth Amendment Rights
- 8 Hyper-Intrusive Searches
- Conclusion
- Notes
- Index
Summary
Chapter 7 explores a specific aspect of mosaic searches: information that individuals turn over to private companies. Under the controversial third party doctrine, individuals surrender all Fourth Amendment rights when they share information with a third party. Most legal scholars criticize the third-party doctrine as anachronistic and a significant threat to privacy. This chapter will argue that the conventional wisdom is wrong, for two reasons. First, modern information sharing enhances our privacy; thus, some aspects of the third-party doctrine can be classified as reactive surveillance. But more importantly, the cost–benefit analysis theory reveals that this massive private collection of data is a positive-sum shift in surveillance. On the privacy side, corporations themselves can assert their own Fourth Amendment rights to keep this information secret – a phenomenon we are already seeing in many technology companies that store and transfer our data. On the security side, millions of companies are constantly collecting billions of pieces of data, all of which can be available to help solve crimes when the government can meet the appropriate standard to overcome the companies’ Fourth Amendment rights.
- Type
- Chapter
- Information
- Smart SurveillanceHow to Interpret the Fourth Amendment in the Twenty-First Century, pp. 141 - 161Publisher: Cambridge University PressPrint publication year: 2019