{"id":53382,"date":"2022-10-19T10:58:30","date_gmt":"2022-10-19T15:58:30","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=53382"},"modified":"2022-10-19T10:58:30","modified_gmt":"2022-10-19T15:58:30","slug":"the-conversation-what-is-fog-reveal-a-legal-scholar-explains-the-app-some-police-forces-are-using-to-track-people-without-a-warrant","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=53382","title":{"rendered":"The Conversation: What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant"},"content":{"rendered":"\n<p>The Conversation: <a href=\"https:\/\/theconversation.com\/what-is-fog-reveal-a-legal-scholar-explains-the-app-some-police-forces-are-using-to-track-people-without-a-warrant-189944\">What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant<\/a> by Anne Toomey McKenna (&#8220;Government use of Fog Reveal highlights a problematic difference between data privacy law and electronic surveillance law in the U.S. It is a difference that creates a sort of loophole, permitting enormous quantities of personal data to be collected, aggregated and used in ways that are not transparent to most persons. That difference is far more important in the wake of the Supreme Court\u2019s Dobbs v. Jackson Women\u2019s Health Organization decision, which revoked the constitutional right to an abortion. Dobbs puts the privacy of reproductive health information and related data points, including relevant location data, in significant jeopardy.&#8221;)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Conversation: What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant by Anne Toomey McKenna (&#8220;Government use of Fog Reveal highlights a problematic difference between data privacy law &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=53382\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-53382","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/53382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=53382"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/53382\/revisions"}],"predecessor-version":[{"id":53383,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/53382\/revisions\/53383"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=53382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=53382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=53382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}