By Jessica Wilkerson
As society has become increasingly intertwined with and reliant upon the Internet, so have criminal investigations. While this explosion in digital evidence has in many ways been a boon—some commentators speak of a “golden era of surveillance”—the growth and continued evolution of relevant technologies poses significant challenges to the prosecution of criminal acts.
This is especially true in the context of human trafficking investigations, which tend to heavily leverage digital infrastructures like mobile phones and the Internet. This article explores two evolving technologies—device encryption and DNS-over-HTTPS—to provide an explanation of how they work, and the challenges, both practical and legal, that they create for law enforcement efforts to combat human trafficking. In doing so, this article aims to create a deeper understanding of these technologies, dispel myths or confirm theories about their impacts, and explore proposals for ways in which necessary advancements in technology can, should, and must coexist with the needs of law enforcement to prosecute crime.
Continue reading “Caught Between Old Crimes And New Tech: Anti-Human Trafficking Efforts In The Modern Digital Age”
By: Kimberly A. Houser[*] and W. Gregory Voss[**]
Much has been written about the difference in the privacy laws of the European Union and the United States and ideologies behind the two regimes. One risk of the increasing divergence in views on privacy is the potential halting of data transfers from the European Union to the United States by the European Commission (EC). As data is a significant driver of the world economy, special care must be taken both to ensure that data is able to cross borders easily, and individuals’ rights to data protection are respected.
The General Data Protection Regulation (GDPR) prohibits the transfer of personal data outside of the European Economic Area (EEA) to countries without “adequate” privacy protections. As the United States is considered to have insufficient protections, the EC requires that an approved mechanism, such as the Privacy Shield—its agreement with the United States that permits U.S. companies to self-certify that they will meet certain minimum privacy protections—be used for such transfers. Alternative mechanisms include standard contractual clauses (SCCs). Suspension of any one approved mechanism may call into question the legitimacy of the others.
Continue reading “The European Commission on the Privacy Shield: All Bark and No Bite?”
By: Navreet Kaur[+]
This article discusses the unprecedented rate at which data is growing and the various possibilities of privacy infringements. It views the problem in the context of a developing nation, India, because India has formed a committee last year to devise and regulate regulations for data protection. The article also discusses the approaches adopted by various other countries so that India can meet global standard when formulating policies for data protection. The features of the Data Protection Bill that the committee has recently submitted to the Ministry of Electronics and Information Technology, Government of India are also discussed.
Continue reading “Privacy Breaches and Big Data: Solutions and Suggestions in India’s Context”