Page 204 - Privacy in a Cyber Age Policy and Practice
P. 204

192  NOTES

            91.  Florida v. Riley (488 U.S. 445, 1989).
            92.  Florida v. Riley (109 S. Ct. 693, 1989).
             93.  For additional discussion of this concept, see Amitai Etzioni, “A Cyber Age
               Privacy Doctrine.”
             94.  Technically, the term “virtual sub-person” would be more appropriate
               because the virtual parts of personhood are still part of the person. The agent
               that acts in cyberspace has one or more names of his or her own, a distinct
               locality and address, manners, and postures that are on the one hand distinct
               from those of the offline person but also linked. Moreover, if the virtual per-
               son commits a crime, the whole person is judged and punished. If the virtual
               agent is exposed, the offline person is as well.
             95.  United Sattes v. Place, 462 U.S. 696 (1983).
            96.  Florida v. Jardines (2013). Internal citations omitted.
             97.  Eve Brensike Primus, “Disentangling Administrative Searches,”  Columbia
               Law Review 111, 254: 257.
               Russell L. Weaver, “Administrative Searches, Technology and Personal Pri-
               vacy,” The William and Mary Bill of Rights Journal 22, 2 (2013): 571.
             98.  “Microsoft and NYPD Announce Partnership Providing Real-Time
               Counterterrorism Solution Globally,” Microsoft, August 8, 2012, http://
               www.microsoft.com/government/en-us/state/brightside/Pages/details.
               aspx?Microsoft-and-NYPD-Announce-Partnership-Providing-Real-Time-
               Counterterrorism-Solution-Globally&blogid=697.
             99.  Craig Timberg, “New Surveillance Technology Can Track Everyone in an
               Area for Hours at a Time,” The Washington Post, February 5, 2014, http://
               www.washingtonpost.com/business/technology/new-surveillance-
               techn ology-can-track-everyone-in-an-area-for-several-hours-at-a-
               time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_story.html.
           100. Ibid.
           101. Ibid.
           102.  Press Release, N.Y.C. Government, Mayor Bloomberg, Police Commis-
               sioner Kelly and Microsoft Unveil New, State-of-the-Art Technology (Aug.
               8, 2012),  available at  http://www.nyc.gov/portal/site/nycgov/menuitem.
               c0935b9a57bb4ef3daf2f1c701c789a0/index.jsp?pageID=mayor_press_
               release&catID=1194&doc_name=http%3A%2F%2Fwww.nyc.gov%2Fhtml
               %2Fom%2Fhtml%2F2012b%2Fpr291-12.html&cc=unused1978&rc=1194&
               ndi=1.
           103.  “Mayor Bloomberg, Police Commissioner Kelly and Microsoft unveil new,
               state-of-the-art technology that aggregates and analyzes existing public
               safety data in real time to provide a comprehensive view of potential threats
               and criminal activity,” New York City Government, August 8, 2012, http://
               www.nyc.gov/portal/site/nycgov/menuitem.c0935b9a57bb4ef3daf2f-
               1c701c789a0/index.jsp?pageID=mayor_press_release&catID=1194&doc_
               name=http%3A%2F%2Fwww.nyc.gov%2Fhtml%2Fom%2Fhtml%2F2012b
               %2Fpr291-12.html&cc=unused1978&rc=1194&ndi=1.
           104.  Martin Kaste, “In ‘Domain Awareness,’ Detractors See Another NSA,”
               National Public Radio, February 21, 2014, http://www.npr.org/blogs/
   199   200   201   202   203   204   205   206   207   208   209