2014
DOI: 10.2139/ssrn.2524653
|View full text |Cite
|
Sign up to set email alerts
|

Lawful Illegality: What Snowden Has Taught Us About the Legal Infrastructure of the Surveillance State

Abstract: How to cite TSpace items Always cite the published version, so the author(s) will receive recognition through services that track citation counts, e.g. Scopus. If you need to cite the page number of the author manuscript from TSpace because you cannot access the published version, then cite the TSpace version in addition to the published version using the permanent URI (handle) found on the record page. This article was made openly accessible by U of T Faculty. Please tell us how this access benefits you. Your… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(20 citation statements)
references
References 0 publications
0
18
0
2
Order By: Relevance
“…Specifically, we demonstrate how Fourth Amendment and related procedural laws governing the admissibility of evidence are viewed in two cases examining the use of malware by US police investigating the distribution and viewing of child exploitation material (CEM) on the Playpen dark web site. Our argument extends Austin's (2015) lawful illegality framework, which was originally developed to explain how surveillance by SIGINT agencies becomes legitimized through law and demonstrates how these processes are also becoming normalized in criminal law enforcement.…”
Section: Introductionmentioning
confidence: 59%
See 1 more Smart Citation
“…Specifically, we demonstrate how Fourth Amendment and related procedural laws governing the admissibility of evidence are viewed in two cases examining the use of malware by US police investigating the distribution and viewing of child exploitation material (CEM) on the Playpen dark web site. Our argument extends Austin's (2015) lawful illegality framework, which was originally developed to explain how surveillance by SIGINT agencies becomes legitimized through law and demonstrates how these processes are also becoming normalized in criminal law enforcement.…”
Section: Introductionmentioning
confidence: 59%
“…While the Fourth Amendment to the United States (US) Constitution aims to curtail state intrusions into the private domain (Cuddihy 2009), many post-9/11 surveillance measures aimed at promoting national security lack oversight (Bauman et al 2014). Using Lisa Austin's (2015) lawful illegality framework, we argue that the permissive legal regimes underpinning surveillance by Western signals intelligence (SIGINT) agencies are now filtering into routine forms of policing (Haggerty 2012) and evidence collection by sanctioning "government dragnets" (Slobogin 2010). Specifically, we demonstrate how Fourth Amendment and related procedural laws governing the admissibility of evidence are viewed in two cases examining the use of malware by US police investigating the distribution and viewing of child exploitation material (CEM) on the Playpen dark web site.…”
Section: Introductionmentioning
confidence: 99%
“…Austin (2015a) has termed this development a form of 'lawful illegality', whereby the principles and norms of rule of law are increasingly undermined through what may essentially be 'lawful' practices. The 'lawful' use of surveillance technologies are increasingly understood to open up operational discretion through legal grey holes, or even legal black holes (Austin 2015a;Dyzenhaus 2006). Further, these lawful authorities are then extended through the changing technological environment of counter-law II.…”
Section: Socio-technical-legal Apparatusesmentioning
confidence: 99%
“…As Lisa Austin notes, increased information sharing and the increasingly blurred investigatory roles of law enforcement, border control, and intelligence agencies have made "gaining a clear public understanding of proposed changes to lawful access laws or the full significance of legal cases before the courts […] extremely difficult." 103 Although an extended discussion of the systemic effects of recent Canadian legislative changes lies beyond the scope of this chapter, we highlight some pertinent events, concerns, and controversies below.…”
Section: Recent Controversiesmentioning
confidence: 99%