References
- Administrative Office of the United States Courts. (2012, December 31). Wiretap report 2012. Washington, DC: Author. Retrieved from http://www.uscourts.gov/statistics-reports/wiretap-report-2012
- Administrative Office of the United States Courts. (2013, December 31). Wiretap report 2013. Washington, DC: Author. Retrieved from http://www.uscourts.gov/statistics-reports/wiretap-report-2013
- Administrative Office of the United States Courts. (2014, December 31). Wiretap report 2014. Washington, DC: Author. Retrieved from http://www.uscourts.gov/statistics-reports/wiretap-report-2014
- Ali, M. D. H., Kurokawa, S., & Shafie, A. A. (2013). Autonomous road surveillance system: A proposed model for vehicle detection and traffic signal control. Procedia Computer Science, 19, 963–970.10.1016/j.procs.2013.06.134
- American Prosecutors Research Institute. (2003). State rape statutes. Alexandria, VA: Author. Retrieved from http://www.arte-sana.com/articles/rape_statutes.pdf
- Bohm, A. (2013, November 7). The year of the drone: An analysis of state legislation passed this year. American Civil Liberties Union Blog. Retrieved from https://www.aclu.org/blog/technology-and-liberty/year-drone-roundup-legislation-passed-year
- Brown, B. (1995). CCTV in town centres: Three case studies (Police Research Group, Crime Detection and Prevention Series, Paper No. 68). London: Home Office Police Department. Retrieved from http://library.npia.police.uk/docs/hopolicers/fcdps68.pdf
- Brown, B. (2014). Community policing in post-September 11 America: A comment on the concept of community-oriented counterterrorism. In D. Lowe, A. Turk, & D. K. Das (Eds.), Examining political violence: Studies of terrorism, counterterrorism, and internal war (pp. 185–206). Boca Raton: CRC Press.
- Bullock, M. L. (2009). The evolution of surveillance technology beyond the panopticon ( Master’s Thesis). The University of California at Santa Cruz, Santa Cruz, CA. Retrieved from http://danm.ucsc.edu/~mbullock/doc/LukeBullock_Thesis.pdf
- Bureau of Justice Statistics. (2014). Property crime. Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. Retrieved from http://www.bjs.gov/index.cfm?ty=tp&tid=32
- Cantor, G., Noferi, M., & Martinez, D. E. (2015, November). Enforcement overdrive: A comprehensive assessment of ICE’s criminal alien program. Washington, DC: American Immigration Council. Retrieved from http://immigrationpolicy.org/sites/default/files/docs/enforcement_overdrive_a_comprehensive_assessment_of_ices_criminal_alien_program_final.pdf
- Casey, T. A. (1996). The advanced intelligent network – A security opportunity. Needham, MA: GTE Government Systems Corporation. Retrieved from http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper023/aincasey.pdf
- Collins, J. P. (2012). The third-party doctrine in the digital age. Justice Action Center Student Capstone Journal, Project No. 11/12-02. Retrieved from http://www.nyls.edu/documents/justice-action-center/student_capstone_journal/cap12collins.pdf
- Computer History Museum. (2010). History of databases. Mountain View, CA: Author. Retrieved from http://www.computerhistory.org/revolution/memory-storage/8/265/2207
- Computer History Museum. (2013). Timeline of computer history. Mountain View, CA: Author. Retrieved from http://www.computerhistory.org/timeline/
- County of Los Angeles. (2012). Cities within the County of Los Angeles. Los Angeles, CA: Author. Retrieved from http://ceo.lacounty.gov/forms/09-10%20Cities%20Alpha.pdf
- Covert, B., & Israel, J. (2016, February 19). Drug testing welfare recipients is a popular new policy that cost states millions. Think Progress. Retrieved from http://thinkprogress.org/economy/2016/02/19/3747139/states-drug-testing-welfare-recipients/
- Cox, R., & Fors, C. (2011). Admitting light detection and ranging (LIDAR) evidence in Texas: A call for statewide judicial notice. St. Mary’s Law Journal, 42, 837–872.
- CTIA. (2013). Wireless quick facts. Washington, DC: Author. Retrieved from http://www.ctia.org/advocacy/research/index.cfm/aid/10323
- Davis, F. (1959). What do we mean by “right to privacy”? South Dakota Law Review, 4, 1–24.
- Dolan, K., & Carr, J. L. (2015). The poor get prison. Washington, DC: Institute for Policy Studies. Retrieved from http://www.ips-dc.org/wp-content/uploads/2015/03/IPS-The-Poor-Get-Prison-Final.pdf
- Domdouzis, K., Kumar, B., & Anumba, C. (2007). Radio-frequency identification (RFID) applications: A brief introduction. Advanced Engineering Informatics, 21, 350–355.10.1016/j.aei.2006.09.001
- Doyle, C. (2012). Privacy: An overview of the electronic communications privacy act. Washington, DC: Congressional Research Service. Retrieved from http://www.fas.org/sgp/crs/misc/R41733.pdf
- Drogin, B., & Skiba, K. (2013, June 10). Analyst admits to cyber-spying leaks; An NSA contractor steps forward and calls U.S. surveillance abilities “horrifying.” Los Angeles Times, p. A1.
- Duggan, M. (2013, September 16). Cell phone activities 2013. Washington, DC: Pew Research Center. Retrieved from http://pewinternet.org/~/media//Files/Reports/2013/PIP_Cell%20Phone%20Activities%20May%202013.pdf
- Engel, R. S., & Johnson, R. (2006). Toward a better understanding of racial and ethnic disparities in search and seizure rates. Journal of Criminal Justice, 34, 605–617.10.1016/j.jcrimjus.2006.09.014
- Federal Bureau of Investigation. (2010). Crime in the United States 2010: Property crime. Washington, DC: U.S. Department of Justice, Federal Bureau of Investigation. Retrieved from http://www.fbi.gov/about-us/cjis/ucr/crime-in-the-u.s/2010/crime-in-the-u.s.-2010/property-crime
- Federal Communications Commission. (2010, September). Trends in telephone service. Washington, DC: Author. Retrieved from http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-301823A1.pdf
- Finn, R. L., & Wright, D. (2012). Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. Computer Law and Security Review, 28, 184–194.10.1016/j.clsr.2012.01.005
- Fischer, C. S. (1988). Gender and the residential telephone, 1890–1940: Technologies of sociability. Sociological Forum, 3, 211–233.10.1007/BF01115291
- Friedersdorf, C. (2014, April 21). Eyes over compton: How police spied on a whole city. The Atlantic. Retrieved from http://www.theatlantic.com/national/archive/2014/04/sheriffs-deputy-compares-drone-surveillance-of-compton-to-big-brother/360954/
- Gershman, B. L. (2010). Privacy revisited: GPS tracking as search and seizure. Pace Law Review, 30, 927–964.
- Gould, J. B., & Mastrofski, S. D. (2004). Suspect searches: Assessing police behavior under the U.S. Constitution. Criminology and Public Policy, 3, 315–362.10.1111/cpp.2004.3.issue-3
- Haggerty, K. D., Wilson, D., & Smith, G. (2011). Theorizing surveillance in crime control. Theoretical Criminology, 15, 231–237.10.1177/1362480610396442
- Haigh, T. (2004). “A veritable bucket of facts”: Origins of the data base management system. Association for Computing Machinery: Special Interest Group on Management of Data. Retrieved from http://www.sigmod.org/publications/sigmod-record/0606/p34-inv-article-haigh.pdf
- Haines, L. (2013, March 1). Spies in the sky: The leaps and bounds from balloons to spook sats. The Register. Retrieved from http://www.theregister.co.uk/2013/03/01/aerial_surveillance/
- Hochheiser, S. (2012a). STARS: Electromechanical telephone switching. IEEE.Org. Retrieved from http://www.ieeeghn.org/wiki/index.php/STARS:Electromechanical_Telephone-Switching
- Hochheiser, S. (2012b). STARS: Telephone transmission. IEEE.Org. Retrieved from http://www.ieeeghn.org/wiki/index.php/STARS:Telephone_Transmission
- Hoots, F. R., Schumacher, P. W., & Glover, R. A. (2004). History of analytical orbit modeling in the U. S. space surveillance system. Journal of Guidance, Control, and Dynamics, 27, 174–185.10.2514/1.9161
- Institute for the Study of Labor and Economic Crisis (1982). The iron fist and the velvet glove: An analysis of the U.S. police. San Francisco: Crime and Social Justice Associates.
- Institute of Electrical and Electronics Engineers (2012). Telephone switching. IEEE.Org. Retrieved from http://www.ieeeghn.org/wiki/index.php/Telephone_switching
- Johnson, K. (2013, September 10). Feds release details of secret spying program. USA Today. Retrieved from http://www.usatoday.com/story/news/nation/2013/09/10/nsa-classified-documents-released-domestic-spying/2795115/
- Kaplan, H. J., Matteo, J. A., & Sillett, R. (2012). The history and law of wiretapping. Paper presented at the annual CLE conference of the American Bar Association section on litigation. Washington, DC. April 18–20, 2012. Retrieved from http://www.americanbar.org/content/dam/aba/administrative/litigation/materials/sac_2012/29-1_history_and_law_of_wiretapping.authcheckdam.pdf
- Kodak. (2013). History of Kodak. Rochester, NY: Author. Retrieved from http://www.kodak.com/ek/US/en/Our_Company/History_of_Kodak/Imaging-_the_basics.htm
- Korody, P. (2004). Satellite surveillance within U.S. borders. Ohio State Law Journal, 65, 1627–1663.
- Langton, L. (2009). Aviation units in large law enforcement agencies, 2007 (NCJ 226672). Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. Retrieved from http://bjs.gov/content/pub/pdf/aullea07.pdf
- Laudon, K. C., Traver, C. G., & Laudon, J. P. (1996). Information technology and systems. Cambridge, MA: Course Technology Inc.
- Los Angeles Police Department. (2013a). History of the air support division. Los Angeles, CA: Author. Retrieved from http://www.lapdonline.org/air_support_division/content_basic_view/1179
- Los Angeles Police Department. (2013b). Air support missions. Los Angeles, CA: Author. Retrieved from http://www.lapdonline.org/air_support_division/content_basic_view/1437
- Luckett, H. P. (1973, March). What’s news: Electronic-mail delivery gets started. Popular Science, 202, 85.
- Martinez, M. B. (2012). Location, location, location: A “private” place and other ailments of Georgia surveillance law curable through alignment with the federal system. Georgia Law Review, 46, 1089–1115.
- Moore, A. D. (2003). Privacy: Its meaning and value. American Philosophical Quarterly, 40, 215–227.
- Murphy, E. (2013). The politics of privacy in the criminal justice system: Information disclosure, the Fourth Amendment, and statutory law enforcement exceptions. Michigan Law Review, 111, 485–546.
- National Academy of Sciences. (1996). The global positioning system: The path from research to human benefit (beyond discovery series). Washington, DC: National Academies Press. Retrieved from http://www.nap.edu/openbook.php?record_id=9479&page=1
- National Conference of State Legislatures. (2014). 2013 Unmanned aircraft systems (UAS) legislation. Washington, DC: Author. Retrieved from http://www.ncsl.org/research/civil-and-criminal-justice/unmanned-aerial-vehicles.aspx
- National Conference of State Legislatures. (2016). Report on 2015 state immigration laws. Washington, DC: Author. Retrieved from http://www.ncsl.org/documents/statefed/ImmigrationReport2015Final_Feb2016.pdf
- National Coordination Office for Space-Based Positioning, Navigation, and Timing. (2013). The global positioning system. Retrieved from http://www.gps.gov/systems/gps/
- National District Attorneys Association. (2009, March). Voyeurism statutes 2009. Retrieved from http://www.ndaa.org/pdf/voyeurism_statutes_mar_09.pdf
- National Institute of Justice. (2003, July). CCTV: Constant cameras track violators. NIJ Journal, 249. Retrieved from https://www.ncjrs.gov/pdffiles1/jr000249d.pdf
- Nieto, M. (1997). Public video surveillance: Is it an effective crime prevention tool? (CRB-97-005). Sacramento, CA: California Research Bureau. Retrieved from http://www.library.ca.gov/crb/97/05/
- Nieto, M., Johnston-Dodds, K., & Simmons, C. W. (2002). Public and private applications of video surveillance and biometric technologies (CRB-02-006). Sacramento, CA: California Research Bureau. Retrieved from http://www.library.ca.gov/crb/02/06/02-006.pdf
- O’Malley, T. A. (2011, November). Using historical cell site analysis evidence in criminal trials. United States Attorneys’ Bulletin, 59, 16–34.
- O’Shea, T. M., & James, D. (2011, November). Admissibility of forensic cell phone evidence. United States Attorneys’ Bulletin, 59, 42–51.
- Oldcomputers.net. (2014a). Apple-II 1977. Retrieved from http://oldcomputers.net/appleii.html
- Oldcomputers.net. (2014b). Commodore VIC-20. Retrieved from http://oldcomputers.net/vic20.html
- Peter, I. (2004). History of the internet. The Internet History Project. Retrieved from http://www.nethistory.info/index.html
- Prosser, W. (1960). Privacy. California Law Review, 48, 338–423.
- Public Broadcasting Service. (2013). Triumph of the nerds: A history of the computer. Arlington, VA: Author. Retrieved from http://www.pbs.org/nerds/timeline/
- Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4, 323–333.
- Ratcliffe, J. (2006). Video surveillance of public places. Washington, DC: Department of Justice, Office of Community Oriented Policing Services. Retrieved from http://www.cops.usdoj.gov/files/ric/Publications/e02061006.pdf
- Reaves, B. A. (2011, July). Census of state and local law enforcement agencies, 2008 (NCJ 233982). Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.
- Reaves, B. A. (2012, June). Federal law enforcement officers, 2008 (NCJ 238250). Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.
- Reid, M. (2013). United States v. Jones: Big brother and the “common good” versus the Fourth Amendment and your right to privacy. Tennessee Journal of Law and Policy, 9, 7–43.
- Rico, D. F., & Sayani, H. H. (2008). History of computers, electronic commerce and agile methods. Advances in Computers, 73, 1–55.10.1016/S0065-2458(08)00401-4
- Roberts, C. M. (2006). Radio frequency identification. Computers & Security, 25, 18–26.10.1016/j.cose.2005.12.003
- Romero, M. (2006). Racial profiling and immigration law enforcement: Rounding up of usual suspects in the Latino community. Critical Sociology, 32, 447–473.10.1163/156916306777835376
- Rosenberg, A. (2000). Privacy as a matter of taste and right. In E. F. Paul, F. D. Miller, & J. Paul (Eds.), The right to privacy(Vol. 17, Part 2, pp. 25–44). Cambridge: Cambridge University Press.
- Rosich, K. J. (2007). Race, ethnicity, and the criminal justice system. Washington, DC: American Sociological Association. Retrieved from http://www.asanet.org/images/press/docs/pdf/ASARaceCrime.pdf
- Roush, C. (2012). Quis custodiet ipsos custodes? Limits on widespread surveillance and intelligence gathering by local law enforcement after 9/11. Marquette Law Review, 96, 315–376.
- Schafer, A. (1980). Privacy: A philosophical overview. In R. D. Gibson (Ed.), Aspects of privacy law (pp. 1–20). Oxford: Butterworth-Heinemann.
- Schindelman, E. R. (2011). Time for the court to become “intimate” with surveillance technology. Boston College Law Review, 52, 1909–1943.
- Short, N. M. (2013). Military intelligence satellites. Washington, DC: Federation of American Scientists. Retrieved from https://www.fas.org/irp/imint/docs/rst/Intro/Part2_26e.html
- Slater, P. (1970). The pursuit of loneliness. Boston, MA: Beacon Press.
- Stanley, J., & Crump, C. (2011, December). Protecting privacy from aerial surveillance: Recommendations for government use of drone aircraft. New York, NY: American Civil Liberties Union. Retrieved from https://www.aclu.org/files/assets/protectingprivacyfromaerialsurveillance.pdf
- Steinberg, D. E. (2004). The original understanding of unreasonable searches and seizures. Florida Law Review, 56, 1051–1096.
- Stray, J. (2013, August 5). FAQ: What you need to know about the NSA’s surveillance programs. ProPublica: Journalism in the Public Interest. Retrieved from http://www.propublica.org/article/nsa-data-collection-faq
- Stroshine, M. S. (2010). Technological innovations in policing at the dawn of the twenty-first century. In R. G. Dunham & G. P. Alpert (Eds.), Critical issues in policing: Contemporary readings (6th ed., pp. 168–180). Long Grove, IL: Waveland Press.
- Thomson, J. J. (1975). The right to privacy. Philosophy and Public Affairs, 4, 295–314.
- Tucker, C., Brick, J. M., & Meekins, B. (2007). Household telephone service and usage patterns in the United states in 2004: Implications for telephone samples. Public Opinion Quarterly, 71, 3–22.10.1093/poq/nfl047
- U.S. Census Bureau. (2009, November 19). Homes with cell phones nearly double in first half of decade (press release: CB09-174). Washington, DC: Author. Retrieved from http://www.census.gov/newsroom/releases/archives/income_wealth/cb09-174.html
- U.S. Census Bureau. (2012a). Banking, finance, & insurance: Payment systems, consumer credit, mortgage debt. Washington, DC: Author. Retrieved from http://www.census.gov/compendia/statab/cats/banking_finance_insurance/payment_systems_consumer_credit_mortgage_debt.html
- U.S. Census Bureau. (2012b). Table 1147. Telephone systems – summary: 1990–2008. Washington, DC: Author. Retrieved from http://www.census.gov/compendia/statab/2012/tables/12s1149.pdf
- U.S. Census Bureau. (2013). Historical census of housing tables. Washington, DC: Author. Retrieved from http://www.census.gov/hhes/www/housing/census/historic/phone.html
- U.S. Census Bureau. (2016). California: Quick facts. Washington, DC: Author. Retrieved from http://www.census.gov/quickfacts/table/PST045215/06
- U.S. Department of Homeland Security. (2013). FY 2013 budget in brief. Washington, DC: Author. Retrieved from http://www.dhs.gov/xlibrary/assets/mgmt/dhs-budget-in-brief-fy2013.pdf
- U.S. Department of Homeland Security. (2014). State and major urban area fusion centers: National network of fusion centers. Washington, DC: Author. Retrieved from http://www.dhs.gov/state-and-major-urban-area-fusion-centers
- U.S. General Accounting Office. (2003, April). Justice Department’s project to interview aliens after September 11, 2001. Washington, DC: Author. Retrieved from http://www.gao.gov/new.items/d03459.pdf
- U.S. Office of the Inspector General. (2003, April). The September 11 detainees: A review of the treatment of aliens held on immigration charges in connection with the investigation of the September 11 attacks. Washington, DC: Author. Retrieved from https://oig.justice.gov/special/0306/full.pdf
- Van Vleck, T. (2001). The history of electronic mail. Retrieved from http://www.multicians.org/thvv/mail-history.html
- Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4, 193–220.10.2307/1321160
- Welsh, B. C., & Farrington, D. P. (2009). Public area CCTV and crime prevention: An updated systematic review and meta‐analysis. Justice Quarterly, 26, 716–745.10.1080/07418820802506206
- Westin, A. (1968). Privacy and freedom. New York, NY: Atheneum.
Court cases
- Arizona v. Gant, 556 U.S. 332 (2009).
- Berger v. New York, 388 U.S. 41 (1967).
- Board of Education v. Earls, 536 U.S. 822 (2002).
- Bond v. United States, 592 U.S. 334 (2000).
- Bowers v. Hardwick, 478 U.S. 186 (1986).
- Carroll v. United States, 267 U.S. 132 (1925).
- Chandler v. Miller, 520 U.S. 305 (1997).
- Chimel v. California, 395 U.S. 752 (1969).
- Delaware v. Prouse, 440 U.S. 648 (1979).
- Florence v. Board of Chosen Freeholders, 566 U.S. _____ (2012).
- Florida v. Jardines, 569 U.S. _____ (2013).
- Florida v. Riley, 488 U.S. 445 (1989).
- Goldman v. United States, 316 U.S. 129 (1942).
- Hester v. United States, 265 U.S. 57 (1924).
- Hoffa v. United States, 385 U.S. 203 (1966).
- Johnson v. United States, 333 U.S. 10 (1948).
- Katz v. United States, 389 U.S. 347 (1967).
- Knowles v. Iowa, 525 U.S. 113 (1998).
- Kyllo v. United States, 533 U.S. 27 (2001).
- Lawrence v. Texas, 539 U.S. 558 (2003).
- Lopez v. United States, 373 U.S. 427 (1963).
- Maryland v. King, 569 U.S. _____ (2013).
- Minnesota v. Olson, 495 U.S. 91 (1990).
- Missouri v. McNeely, 569 U.S. _____ (2013).
- New Jersey v. T.L.O., 469 U.S. 325 (1985).
- New York v. Belton, 453 U.S. 454 (1981).
- Oliver v. United States, 466 U.S. 170 (1984).
- Olmstead v. United States, 277 U.S. 438 (1928).
- Riley v. California, 2014 U.S. LEXIS 4497 (2014).
- Rochin v. California, 342 U.S. 165 (1952).
- Roe v. Wade, 410 U.S. 113 (1973).
- Safford Unified School District v. Redding, 557 U.S. 364 (2009).
- Schmerber v. California, 384 U.S. 757 (1966).
- Silverman v. United States, 365 U.S. 505 (1961).
- Skinner v. Railway Labor Executives Association, 489 U.S. 602 (1989).
- Smith v. Maryland, 442 U.S. 735 (1979).
- State v. Moorer, 959 N.Y.S.2d 868 (N.Y. 2013).
- State v. Weaver, 909 N.E.2d 1195 (N.Y. 2009).
- Terry v. Ohio, 392 U.S. 1 (1968).
- United States v. Dunn, 480 U.S. 294 (1987).
- United States v. Jones. 181 L. Ed. 2d 911 (2012).
- United States v. Knotts, 460 U.S. 276 (1983).
- United States v. Maynard, 615 F. 3d 544 (D.C. Circuit, 2010).
- United States v. Miller, 425 U.S. 435 (1976).
- United States v. Place, 462 U.S. 696 (1983).
- United States v. Robinson, 414 U.S. 218 (1973).
- Vernonia School District 47J v. Acton, 515 U.S. 646 (1995).
- Wyoming v. Houghton, 526 U.S. 295 (1999).
Legislation
- Cable Communications Policy Act of 1984, 47 U.S.C. § 551.
- Driver’s Privacy Protection Act of 1994, 18 U.S.C. § 2721.
- Electronic Communications Privacy Act of 1986, 18 U.S.C. § 2510.
- Health Insurance Portability and Accountability Act of 1996, 29 U.S.C. § 1181.
- Omnibus Crime Control and Safe Streets Act of 1968, 42 U.S.C. § 3711.
- Right to Financial Privacy Act of 1978, 12 U.S.C. § 3408.
- Telephone Records and Privacy Protection Act of 2006, 18 U.S.C. § 1039.
- United and Strengthening America by Providing Appropriate Tools Required for Intercepting and Obstructing Terrorism Act of 2001, 18 USC §2712, 31 USC §5318A, 15 USC §1681v, 8 USC §1226A, 18 USC §1993, 18 USC §2339, 18 USC §175b, 50 USC §403-5b, 51 USC §5103a.
- Video Privacy Protection Act of 1988, 18 U.S.C. § 2710.