Technology-Enhanced Surveillance by Law Enforcement Officials
I. IntroductionII. Virtual Surveillance—When is it a Search?A. The
standard B. Applying
to Emerging Technologies1. Satellite Imagery2. “See-Through” DevicesC. Ramifications of the Doctrine for “Binary Surveillance” of Protected AreasD. Unfinished Business: The Dubious Rationale of
Smith v. Maryland
III. Gathering Information--Hyper-Intrusive SearchesA. Title III’s standard B. Covert video surveillance and the “constitutionalization” of Title IIIIII. Collecting and Manipulating DataA. Homing DevicesB. Facial Recognition TechnologyC. CarnivoreIV. Conclusion
Assistant Professor, Moritz College of Law, The Ohio State University.