Events

CITP Luncheon Speaker Series: Eric Berg – Is This Being Recorded?

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Mr. Berg's talk will provide an insider’s view of the strategies, mechanics, common practices, and likely trends involved in the state of government electronic surveillance. His talk will shed light on a number of widely debated issues in public life, and will feature: the process by which the DOJ authorizes electronic surveillance; establishing probable cause to authorize monitoring communications; fighting a surveillance authorization — typical arguments; and trends: “going dark,” white collar investigations, and international concerns.

Special Event: Jonathan Mayer – Constitutional Malware

Friend Center Convocation Room 35 Olden Street, Princeton, United States

The United States government hacks computer systems, for law enforcement purposes. As encryption becomes more pervasive, and as anonymization tools become easier to use, the government will foreseeably increase its resort to malware. This article provides a comprehensive examination of how federal law regulates law enforcement hacking. The article's first contribution is descriptive. It explains […]

CITP Luncheon Speaker Series: Kiel Brennan-Marquez – Plausible Cause

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

In many cases, plausibility and probability overlap. An inference that accounts for observed facts is often likely to be true, and vice versa. But there is an important sub-set of cases in which the two properties pull apart, raising deep questions about the underpinnings of Fourth Amendment suspicion: inferences generated by predictive algorithms. In this Article, I argue that casting suspicion in terms of plausibility, rather than probability, is both more consistent with established law and crucial to the Fourth Amendment’s normative integrity.

CITP Luncheon Speaker Series: Marshini Chetty – Spiders in the Sky: Investigating User Perceptions of the Privacy and Security Implications of Drones

Sherrerd Hall, 3rd floor open space Princeton, NJ, United States

Drones are increasingly being used for various purposes from recording footage in inaccessible areas to delivering packages. A rise in drone usage introduces privacy and security concerns about flying boundaries, what data drones collect in public and private spaces, and how that data is stored and disseminated. However, commercial and personal drone regulations focusing on privacy and security have been fairly minimal in the United States. To inform privacy and security guidelines for drone design and regulation, we need to understand users’ perceptions about drones, privacy and security. In this talk, I describe a laboratory study with 20 participants who interacted with a real or model drone to elicit user perceptions of privacy and security issues around drones. I present our results, discuss the implications of our work, and make recommendations to improve drone design and regulations that enhance individual privacy and security.