{"id":62,"date":"2018-04-13T10:40:17","date_gmt":"2018-04-13T14:40:17","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/?page_id=62"},"modified":"2025-05-12T11:09:03","modified_gmt":"2025-05-12T15:09:03","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Historically, surveillance technology has tracked <\/span><em><span style=\"font-weight: 400\">your <\/span><\/em><span style=\"font-weight: 400\">technology. What happens when surveillance technology tracks <\/span><span style=\"font-weight: 400\">your body<\/span><span style=\"font-weight: 400\">\u2014not your technology? What happens when that surveillance disproportionately impacts people of color, or actually functions differently when analyzing them? What happens when Congress fails to update privacy and civil rights laws for the 21st century? These are the kinds of questions the Center grapples with.<\/span><\/p>\n<ul>\n<li>*NEW* Report: <strong><a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/raiding-the-genome\/\"><i>Raiding the Genome: How the United States Government Is Abusing Its Immigration Powers to Amass DNA for Future Policing<\/i><\/a><\/strong><\/li>\n<li>Interactive digital narrative: <strong><a href=\"https:\/\/copout.tech\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"cx_external_link\"><span class=\"cx_external_hyperlink\"><em>Cop Out: Automation in the Criminal Legal System<\/em><\/span><span class=\"visually_hide\">(This link opens in a new tab)<\/span><span class=\"cx_external_icon\"><\/span><\/a><\/strong><\/li>\n<li>Report: <strong><em><a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/a-forensic-without-the-science-face-recognition-in-u-s-criminal-investigations\/\" rel=\"noopener\">A Forensic Without the Science: Face Recognition in U.S. Criminal Investigations<\/a><\/em><\/strong><\/li>\n<li>Report: <strong><a href=\"https:\/\/www.americandragnet.org\/\"><em>American Dragnet: Data-Driven Deportation in the 21st Century<\/em><\/a><\/strong><\/li>\n<li>Guide: <strong><em><a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/a-seat-at-the-table-creating-inclusive-tech-policy-organizations\/\">A Seat at the Table: Creating Inclusive Tech Policy Organizations<\/a><\/em><\/strong><\/li>\n<li>Report:<strong> <a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/garbage-in-garbage-out-face-recognition-on-flawed-data\/\"><em>Garbage In, Garbage Out: Face Recognition on Flawed Data<\/em><\/a><\/strong><\/li>\n<li>Report: <strong><a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/america-under-watch-face-surveillance-in-the-united-states\/\"><em>America Under Watch: Face Surveillance in the United States<\/em><\/a><\/strong><\/li>\n<li>Report:<strong> <a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/not-ready-for-takeoff\/\"><em>Not Ready for Takeoff: Face Scans at Airport Departure Gates<\/em><\/a><\/strong><\/li>\n<li>Report: <strong><a href=\"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/publications\/the-perpetual-line-up\/\"><em>The Perpetual Line-Up: Unregulated Police Face Recognition in America<\/em><\/a><\/strong><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Historically, surveillance technology has tracked your technology. What happens when surveillance technology tracks your body\u2014not your technology? What happens when that surveillance disproportionately impacts people of color, or actually functions [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-62","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":21,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/62\/revisions"}],"predecessor-version":[{"id":3664,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/62\/revisions\/3664"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/media?parent=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}