surfing while muslim
DESCRIPTION
Surfing While Muslim. Privacy, Freedom of Expression and the Unintended Consequences of Cybercrime Legislation. CoE Convention on Cyber-crime. Feb. 1997 Council of Europe committee tasked to draft “binding legal instrument” to deal with computer-related offences, - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/1.jpg)
Surfing While Muslim
Privacy, Freedom of Expression and the Unintended Consequences of Cybercrime Legislation
![Page 2: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/2.jpg)
2
CoE Convention on Cyber-crime
Feb. 1997 Council of Europe committee tasked to draft “binding legal instrument” to deal with computer-related offences, substantive criminal law, international coercive powers and jurisdiction
April 2000, first public draft (Draft 19)
![Page 3: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/3.jpg)
3
Canada signs
Nov. 2001, Canada and 30 other nations sign the Convention on Cyber-crime
Canada only one of four non-CoE members to sign treaty
![Page 4: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/4.jpg)
4
Ratification
August 2002 - Lawful Access Consultation Document
Proposes amendments to Criminal Code and other statutes
![Page 5: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/5.jpg)
5
Lowering the bar
Most worrisome, new powers to compel records held by third parties, i.e. ISP subscriber records
Under a lower standard than now applied to other types of investigative powers, i.e. wiretaps, search warrants
![Page 6: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/6.jpg)
6
Do police need new legal powers?
Presumption that gov’ts introduce laws to remedy specific problems
new tech. allows criminals to commit crimes that we can’t detect, investigate or prosecute
![Page 7: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/7.jpg)
7
Where’s the evidence?
Public roundtables: no answers freedom-of-info requests to Sol-Gen, DoJ, and
Industry Where’s the evidence that we need to dilute historical
protections? 8 mos. later Sol.-Gen. responds
![Page 8: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/8.jpg)
8
Solicitor-General responds
“Law enforcement and national security agencies are simply asking that the same information that has been available to them when criminals and terrorists used mail and rotary telephones be available to them now.”
![Page 9: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/9.jpg)
9
Dartmouth report
Dartmouth ‘Needs Assessment’ Info often technically difficult to collect Lack of extra-jurisdictional coordination Lack of tech. tools and training
![Page 10: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/10.jpg)
10
If we do sign, what are our obligations?
Art 18: Signatories must adopt ‘production orders’ to compel third parties – individuals or organizations – to produce “specified computer data” = anything on a computer “subscriber info”
Under their custody or control Lawful Access: key amendment required to ratify
![Page 11: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/11.jpg)
11
Lowering the bar
“[I]n light of the lower expectation of privacy in a telephone number or Internet address, as opposed to the content of a communication… [a] specific production order could be created under a lower standard”
Targeted at “traffic data”
![Page 12: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/12.jpg)
12
Traditional thresholds for electronic surveillance
Rigorous legal framework for lawful interception of private communications Strict procedural safeguards in Criminal Code, i.e.
must have ‘reasonable and probable’ grounds on ‘information and belief’ that an offence has been or will be committed
Subject to Charter
![Page 13: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/13.jpg)
13
Justifications for lower thresholds?
More efficient? Production orders less invasive?
“…no entry into and search by law enforcement of the premises of the third party…”
![Page 14: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/14.jpg)
14
4 Criticisms
Overemphasis on physicality “less intrusive” does not mean “more reasonable” Lack of appropriate remedy Public inferences about private activities
![Page 15: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/15.jpg)
15
4 Criticisms: Overemphasis on Physicality
Del Zotto v. Canada (Minister of National Revenue) - that a reasonable expectation of privacy is not founded on the location of the information in which the expectation is held
R. v. Edwards - “an interpretation of the degree of intrusiveness is not a matter of where the information… is located, but to what extent disclosure… would impact the reasonable expectation of the individual’s privacy”
![Page 16: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/16.jpg)
16
4 Criticisms: ‘Less intrusive’ does not mean ‘more reasonable’
Assumes third party search more reasonable because it is less intrusive
U.S. v. Bach, 310 F.3d 1063, 1065 (8th Cir. 2002) Yahoo! Technicians do not selectively choose or
review the contents of a subpoenaed account, but simply hand over entire contents
![Page 17: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/17.jpg)
17
4 Criticisms: Availability of Remedial Measures
How can you challenge a search you don’t know about? Much less likely to know about a third party search
R. v. Rahey, [1995] 4 S.C.R. 588 at para. 111“The question of breach must... be assessed in terms of
the interests protected by the section and such remedy as the court can provide to secure them.”
![Page 18: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/18.jpg)
18
4 Criticisms: Availability of Remedial Measures
Gov’t would foist responsibility for seeking remedies on parties with no standing under s. 24 (Charter) “Anyone whose rights or freedoms, as guaranteed by this
Charter, have been infringed or denied may apply to a court…”
Excludes ISPs and other intermediaries even were they so inclined to take up this role
![Page 19: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/19.jpg)
19
CAIP & Privacy
Can. Assoc. of ISPs (CAIP) has been ambiguous about protecting subscriber privacy Code of Conduct and Privacy Code indicate no
disclosure except as required by law Leave door open w/explanatory language
not every provider is a member
![Page 20: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/20.jpg)
20
4 Criticisms: Public inferences
Ignores capacity of new tech. and new public-private relationships to draw public inferences about private activities
Location becomes less relevant in determining severity of intrusion
![Page 21: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/21.jpg)
21
Gov’t argues there is precedent
proposal suggests that new, specific production orders analogous to ones used under ITA, Competition Act, and for dial number recorders, etc. are precedential
![Page 22: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/22.jpg)
22
No precedent
Not difficult to distinguish these categories Tax info collected for regulatory, not criminal purposes DNRs reveal much less about the ‘biographical core’
![Page 23: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/23.jpg)
23
Regulatory/Administrative vs. Criminal
Inquisitorial and compulsive nature of criminal investigations much higher
Triggers higher safeguards
![Page 24: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/24.jpg)
24
Criminal Investigations Attract Greater Scrutiny
BC Securities Comm. v. Branch, [1995] 2 S.C.R. 3 – biz docs have lesser privacy rts than personal records
R. v. Fitzpatrick, [1995] 4 S.C.R. 154 at para. 49 – records statutorily compelled as a condition of participation have little expectation of privacy (fishing records)
![Page 25: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/25.jpg)
25
Criminal Investigations Attract Greater Scrutiny
Dagg v. Canada (Minister of Finance), [1997] 2 S.C.R. 403 – biz records attract lower expectation not b/c of any label, but because of what these records typically contain
R. v. Plant, [1993] 3 S.C.R. 281 at 293 – hydro billing records did not reveal intimate details because electricity consumption reveals very little about our personal lifestyles
![Page 26: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/26.jpg)
26
Criminal Investigations Attract Greater Scrutiny
Even if you disagree with the result in Plant, the court engaged in the appropriate contextual analysis
Left the door open to properly assess the impact of new tech.
![Page 27: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/27.jpg)
27
Section 8 of the Charter
Everyone has the right to be secure against unreasonable search or seizure.
Leading cases on s. 8 is R. v. Plant, [1993] 3 S.C.R. 281
‘biographical core’ concept
![Page 28: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/28.jpg)
28
The ‘Biographical Core’
“It is fitting that s. 8 of the Charter should seek to protect a biographical core of personal information which individuals in a free and democratic society would wish to maintain and control from dissemination to the state." This "would include information which tends to reveal intimate details of the lifestyle and personal choices of the individual.”
![Page 29: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/29.jpg)
29
The ‘Biographical Core’
Phrase is evocative, but unfortunate ‘core’ implies centrality, permanence and
fundamental quality which belies ease of association/disassociation
Very few categories of data protected by enumeration in statute Such an interpretation would ignore context
![Page 30: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/30.jpg)
30
Context is important in
Digital ‘traffic data’ in the hands of average person may be meaningless
but in possession of others with tech. or legal means, could reveal intimate details
Relates to value represented by data and Relationship of subject to third party
![Page 31: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/31.jpg)
31
What is ‘traffic data’?
What does ‘traffic data’ actually represent? No international consensus on def’n Often analogized to ‘info on outside of envelope’ accurate in the analog environment, it is highly
problematic in the digital environment
![Page 32: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/32.jpg)
32
Figure 1: Traffic data on a plain old telephone system (POTS)
20021021070824178 165 0187611205 6139574222 ----------001------003sth 46 5145281768-----0013 1410260
Date & Time Caller No.
Recipient No.Duration
![Page 33: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/33.jpg)
33
Figure 2: Traffic data from two callers on a wireless network
time GMT=20010810010852 Cell ID=115 MAC ID=00:02:2D:20:47:24 (A)
time GMT=20010810010852 Cell ID=115 MAC ID=00:02:2D:04:29:30 (B)
time GMT=20010810011254 Cell ID=129 MAC ID=00:02:2D:1F:53:C0
time GMT=20010810011254 Cell ID=129 MAC ID=00:02:2D:04:29:30 (B)
time GMT=20010810011254 Cell ID=129 MAC ID=00:02:2D:20:47:24 (A)
time GMT=20010810011256 Cell ID=41 MAC ID=00:02:2D:0A:5C:D0
Location at 1:12:54 AM(Hilton Hotel)
Date & TimeLocation at 1:08:52 AM
(Dorval Airport)
Cell Location
![Page 34: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/34.jpg)
34
Figure 3a: Traffic data from a user connecting to a web server
295.47.63.8 - - [05/Mar/2002:15:19:34 +0000] "GET/cgi-bin/htsearch?config =htdigx&words=startrek HTTP/1.0"20 2225
295.47.63.8 - - [05/Mar/2002:15:19:44 +0000] "GET/cgi-bin/htsearch?config =htdig&words=startrek+avi HTTP/1.0"200x
192.77.63.8 - - [05/Mar/2002:15:20:35 +0000] "GET/cgi-bin/htsearch?config =htdig&words=conflict+war HTTP/1.0"200
211.164.33.3 - - [05/Mar/2002:15:21:32 +0000] "GET/cgi-bin/htsearch?confi g=htdigx&words=STD+clinic+Kingston…
Search queryIP Address
Date & Time
![Page 35: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/35.jpg)
35
‘Traffic data’ in the LA
“telecommunications associated data” to mean “any data, including data pertaining to the telecommunications functions of dialing, routing, addressing or signaling that identifies, or purports to identify, the origin, the direction, the time, the duration or size as appropriate, the destination or termination of a telecommunication transmission generated or received by means of the telecommunications facility owned or operated by a service provider.”
![Page 36: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/36.jpg)
36
‘Traffic data’ in the Convention
“traffic data” means “any computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.”
![Page 37: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/37.jpg)
37
‘Traffic data’ in U.K. RIPA
relatively narrower definition includes subscriber and routing information and
'post-cut-through' data, or digits dialed after a call has been connected (i.e. your bank password if you use telephone banking services), but in relation to Internet communications, would incl. server but not a website or page."
![Page 38: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/38.jpg)
38
‘Traffic data’ in EU Dir. Privacy & Electronic Communications
latitude, longitude and altitude of the sender's or recipient's terminal, direction of travel, identification of the network cell in which the terminal equipment is located at a certain point in time, any naming, numbering or addressing information, volume of a communication, network on which the communication originates or terminates, and the beginning, end or duration of a connection.
![Page 39: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/39.jpg)
39
‘Traffic data’ in CALEA
CALEA uses narrower "call-identifying information", which means "dialing or signaling information that identifies the origin, direction, destination, or termination
excludes entities engaged in providing information services (i.e. ISPs)
![Page 40: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/40.jpg)
40
But along came PATRIOT…
allows ISPs to voluntarily disclose "non-content" information to non-government entities for any purpose and to law enforcement in more limited circumstances.
expands info available with only admin. subpoena
![Page 41: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/41.jpg)
41
‘Traffic data’ should attract R.E.P.
3 reasons Persistence, pervasiveness, permanence changes the
nature of the info. Structural characteristics of the interface(s) affect our
understanding and behaviour Tech. inverts proximity of p.i. to subject to extent that
invasions rarely take place w/o complicity of third parties
![Page 42: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/42.jpg)
42
3 P’s
Persistence, pervasiveness, permanence changes the nature of the info.
![Page 43: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/43.jpg)
43
Law & Code
laws that permit electronic surveillance typically incorporate authority and oversight rarely does surveillance technology contain more than
the first no guarantee that authority will be used lawfully
a misunderstanding of tech. nuances can translate lawful uses of surveillance into immoral if not unconstitutional ones
![Page 44: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/44.jpg)
44
Interface ignorance
Structural characteristics of the Net fool us Most of us have no idea what goes on ‘behind the
screen’
![Page 45: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/45.jpg)
45
United States v. Maxwell, [1995] 42 M.J. 568, 576 - subscriber had an expectation of privacy in his email because only he could access his password-protected account and there was little risk that any messages he sent would be retrieved or read by anyone other than the intended recipients for the same reason
![Page 46: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/46.jpg)
46
Trust is a difficult thing to judge online and we frequently do it blindly.
Do we enjoy more privacy in visiting Playboy.com from a laptop in the physical solitude of our living rooms than if we were to pick up the magazine in the local corner store?
![Page 47: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/47.jpg)
47
Techno-illiteracy/opacity encourages false assumptions
Ignorance of the law is no excuse, but is ignorance of code?
If our actions remain unmitigated, should we suffer less privacy?
![Page 48: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/48.jpg)
48
In re Pharmatrak
Identical fact pattern to Doubleclick and Avenue A cases, but did not have permission to collect p.i.
Accidental collection through, GET method data on Detrol.com
GET data would be considered ‘traffic’ under LA, but was not by Pharmatrak ct.
![Page 49: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/49.jpg)
49
![Page 50: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/50.jpg)
50
![Page 51: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/51.jpg)
51
![Page 52: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/52.jpg)
52
Service providers as guardians
In U.S., no r.e.p. in what a person “knowingly exposes to the public”
Canadian courts more interested in the effect of breach on freedom and dignity of the individual
Kerr has concluded, in some cases, ISPs owe fiduciary responsibility to subscribers
![Page 53: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/53.jpg)
53
Actions speak louder than words
Behaviour of individuals suggests they hold expectation of privacy
May be misplaced, but could still be reasonable Only other conclusion is that people just don’t
care – not supported by polling data
![Page 54: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/54.jpg)
54
Shearing & Law
Every day we engage in private behaviour on the public Internet
R. v. Shearing, 2002 SCC 58 – mundane entries in diary still attract r.e.p. b/c of where they were
R. v. Law, 2002 SCC 10 – r.e.p. derived not from contents, but from fact they locked docs in safe
![Page 55: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/55.jpg)
55
Shearing and Law – if we take steps to preserve privacy, this could trigger s. 8
What if we take ineffective, but bona fide steps?
![Page 56: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/56.jpg)
56
Packet-mode communications liable to massive infringement
![Page 57: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/57.jpg)
57
Packet-mode filters
Packet-mode filters suffer from overbreadth Network neutrality enables innovation, but makes
it difficult to regulate content or even isolate it Carnivore was a miserable failure
![Page 58: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/58.jpg)
58
(In)Accuracy of Packet-Mode Filter with 99.999% accuracy
Assume 1 in 100k is terrorist communicating evidence in packets
Filter has 99.999% chance of identifying terrorist packets
0.001% of ‘innocent’ packets flagged Inaccuracy of 50%
![Page 59: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/59.jpg)
59
Figure 5: Filter with 99.99% Precision
Assume 1 in 100k is terrorist communicating evidence
Filter has 99.99% chance of identifying terrorist packets
0.01% of ‘innocent’ packets flagged Inaccuracy of ~ 91%
![Page 60: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/60.jpg)
60
Massive infringement and constitutionality
Imprecision has legal implications if tech. liable to massively infringe than use
should attract the very highest ex ante scrutiny and not the reverse
s. 8 would have very little value if it only operated ex post facto
![Page 61: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/61.jpg)
61
Subjective Assessment & Discrimination
Diluted judicial standards grant too much subjective discretion to individual law enforcement officers
check against the unfettered discretion Operates as a record of accountability subject to
audit of abuse and defects in the law
![Page 62: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/62.jpg)
62
Driving lessons
Highway Traffic Act standards for search and seizure have been diluted in ways similar to that now proposed in the Lawful Access
dilution of probable cause under the R.I.D.E. program was mitigated, to an extent, by its high-visibility and by its more or less equal application to all motorists transiting stationary checkpoints
![Page 63: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/63.jpg)
63
Discretion & Social Control
R.I.D.E. now replaced by random roving stops Police stop for any reason – must be related to
highway safety, but very hard for courts to ascertain this
Social science data shows us that unfettered discretion becomes a form of social control
![Page 64: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/64.jpg)
64
Discrimination is corollary of discretion
Who gets targeted? Visible minorities mostly Norris, attractive women, people wearing hats,
youth, etc. It’s arbitrary – people different from the operators
![Page 65: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/65.jpg)
65
Surfing While Muslim
Muslims have become the new margins, but it could be anybody
as more of the things we do in our lives become instantiated in technology, we need to consider the consequences
Lawful Access fails to do this on a number of levels
![Page 66: Surfing While Muslim](https://reader035.vdocuments.site/reader035/viewer/2022062519/568152b4550346895dc0d685/html5/thumbnails/66.jpg)
Jason Young, LL.M. (Candidate)[email protected]
Paper at http://www.innovationlaw.org/lawforum/young.doc
Other resourceshttp://www.lexinformatica.org/cybercrime