Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Entire DC Network

Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


Broadcasting Borders: Why Forensic Extraterritorial Electronic Border Searches For Contraband Do Not Require Reasonable Suspicion Under The Fourth Amendment, Rory Mcclain Jan 2020

Broadcasting Borders: Why Forensic Extraterritorial Electronic Border Searches For Contraband Do Not Require Reasonable Suspicion Under The Fourth Amendment, Rory Mcclain

Upper Level Writing Requirement Research Papers

No abstract provided.


Transnational Government Hacking, Jennifer Daskal Jan 2020

Transnational Government Hacking, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Big Data Prosecution And Brady, Andrew Ferguson Jan 2020

Big Data Prosecution And Brady, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Prosecutors are joining the big data revolution, adopting “intelligence-driven” strategies to target crime patterns. Centralized big data systems now track offenders, places, and groups allowing prosecutors to link crimes by time, place, associations, or other connections. Adding to these types of formalized, structured databases are growing sources of raw, unstructured big data from digital surveillance technologies like video cameras, police body cameras, and automated license plate readers. The prosecutors of the future will sit on a wealth of valuable investigative insights – all searchable and potentially relevant for a more aggressive and proactive investigation strategy.But as helpful as these new …


Obvious But Not Clear: The Right To Refuse To Cooperate With The Police During A Terry Stop, Sam Kamin, Zachary Shiffler Jan 2020

Obvious But Not Clear: The Right To Refuse To Cooperate With The Police During A Terry Stop, Sam Kamin, Zachary Shiffler

American University Law Review

No abstract provided.


Insidious Encroachment? Strengthening The "Crown Jewels": The 2018 Reauthorization Of Fisa Section 702, John F. Schifalacqua Jan 2019

Insidious Encroachment? Strengthening The "Crown Jewels": The 2018 Reauthorization Of Fisa Section 702, John F. Schifalacqua

American University National Security Law Brief

No abstract provided.


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


What Matters More: Preserving A Fundamental Right To Privacy Or Tampering With Another's Dignity Through Searches Because Of "Reasonable Suspicion", Darianne De Leon Jan 2019

What Matters More: Preserving A Fundamental Right To Privacy Or Tampering With Another's Dignity Through Searches Because Of "Reasonable Suspicion", Darianne De Leon

American University Journal of Gender, Social Policy & the Law

No abstract provided.


The Reasonable Black Child: Race, Adolescence, And The Fourth Amendment, Kristin N. Henning Jan 2018

The Reasonable Black Child: Race, Adolescence, And The Fourth Amendment, Kristin N. Henning

American University Law Review

No abstract provided.


Hey Alexa: Was It The Butter, In The Foyer, With The Candlestick? Understanding Amazon's Echo And Whether The Government Can Retrieve Its Data, Seth Weintraub Jan 2018

Hey Alexa: Was It The Butter, In The Foyer, With The Candlestick? Understanding Amazon's Echo And Whether The Government Can Retrieve Its Data, Seth Weintraub

American University Business Law Review

No abstract provided.


The Posse Comitatus Act And The Fourth Amendment's Exclusionary Rule, Patrick Walsh, Paul Sullivan Jan 2018

The Posse Comitatus Act And The Fourth Amendment's Exclusionary Rule, Patrick Walsh, Paul Sullivan

American University National Security Law Brief

No abstract provided.


Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh Jan 2017

Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh

American University Law Review

No abstract provided.


Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal Jan 2017

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …


Body Worn Cameras With Facial Recognition Technology: When It Constitutes A Search, Kelly Blount Jan 2017

Body Worn Cameras With Facial Recognition Technology: When It Constitutes A Search, Kelly Blount

Criminal Law Practitioner

No abstract provided.


The 'Smart' Fourth Amendment, Andrew Ferguson Jan 2017

The 'Smart' Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

“Smart” devices radiate data, detailing a continuous, intimate, and revealing pattern of daily life. Billions of sensors will soon collect data from smartphones, smart homes, smart cars, medical devices and an evolving assortment of consumer and commercial products. But, what are these data trails to the Fourth Amendment? Does data emanating from devices on or about our bodies, houses, things, and digital effects fall within the Fourth Amendment’s protection of “persons, homes, papers, or effects”? Does interception of this information violate a “reasonable expectation of privacy?”The “Internet of Things” and the growing proliferation of smart devices create new opportunities for …


Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson Jan 2017

Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …


Policing Predictive Policing, Andrew Ferguson Jan 2017

Policing Predictive Policing, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Predictive policing is sweeping the nation, promising the holy grail of policing – preventing crime before it happens. Police have embraced predictive analytics and data-driven metrics to improve law enforcement tactics, practice, and strategy. Predictive “hot spots” become targets for intensive police surveillance. Targeted “hot people” become suspects. In big cities and small towns, data-based predictions drive police patrol schedules. Risk assessment algorithms target suspicious individuals. Increased data collection fuels a growing feedback loop requiring more robust data crunching systems.All of these predictive innovations share one thing in common: a belief that crime can be understood by identifying and analyzing …


Policing Criminal Justice Data, Wayne Logan, Andrew Ferguson Jan 2016

Policing Criminal Justice Data, Wayne Logan, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article addresses a matter of fundamental importance to the criminal justice system: the presence of erroneous information in government databases and the limited government accountability and legal remedies for the harm that it causes individuals. While a substantial literature exists on the liberty and privacy perils of large multi-source data assemblage, often termed "big data," this article addresses the risks associated with the collection, generation and use of "small data" (i.e., individual-level, discrete data points). Because small data provides the building blocks for all data-driven systems, enhancing its quality will have a significant positive effect on the criminal justice …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson Jan 2016

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …


What's In The Box? Re-Conceptualizing Computers As Containers, Metadata As Contents Of That Container, And Applying Fourth Amendment Protections, Christopher Michels Jan 2016

What's In The Box? Re-Conceptualizing Computers As Containers, Metadata As Contents Of That Container, And Applying Fourth Amendment Protections, Christopher Michels

Criminal Law Practitioner

No abstract provided.


The Internet Of Things And The Fourth Amendment Of Effects, Andrew Ferguson Jan 2016

The Internet Of Things And The Fourth Amendment Of Effects, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

By 2020 there will be billions of “things” connected through the “Internet of Things.” These smart devices built within our homes, cars, smartphones, clothing, and accessories present new possibilities for technological surveillance for law enforcement. This network of smart devices also poses a new challenge for a Fourth Amendment built around “effects.” The constitutional language protecting “persons, houses, papers, and effects” from unreasonable searches and seizures must confront this change. This article addresses how a Fourth Amendment built on old-fashioned “effects” can address a new world when things are no longer just inactive, static objects, but objects that create and …


The Fourth Amendment In The Digital Age Symposium, Braxton Marcela Jan 2015

The Fourth Amendment In The Digital Age Symposium, Braxton Marcela

Criminal Law Practitioner

No abstract provided.


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …


The Un-Territoriality Of Data, Jennifer Daskal Jan 2015

The Un-Territoriality Of Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …


Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson Jan 2014

Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Do citizens have any Fourth Amendment protection from sense-enhancing surveillance technologies in public? This article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces.This article proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Curtilage recognizes a buffer zone beyond the four corners of the home that deserves protection, even in public, even if accessible to public view. Based on …


Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew Ferguson Jan 2014

Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article examines the American Bar Associations’ Standards for Criminal Justice proposed Law Enforcement Access to Third Party Records (LEATPR). The article was written to be part of an Oklahoma Law Review Symposium on the subject of the LEATPR Standards. The article explores how the ABA LEATPR Standards can survive the impact of big data policing. Big data policing, as described here, involves utilizing vast, networked databases to investigate and also predict criminal activity. Big data policing involves the use of not just third party, but "fourth party" commercial aggregators as well as de-identified data sets, that eventually can be …


Constitutional Culpability: Questioning The New Exclusionary Rules, Andrew Ferguson Jan 2014

Constitutional Culpability: Questioning The New Exclusionary Rules, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article addresses the questions left unanswered by the Supreme Court’s recent exclusionary rule cases. The Hudson-Herring-Davis trilogy presents a new and largely unexamined doctrinal landscape for Fourth Amendment suppression hearings. Courts, litigators, and scholars are only now assessing what has changed on the ground in trial practice.Once an automatic remedy for any constitutional violation, the exclusionary rule, now necessitates a separate and more searching analysis. Rights and remedies have been decoupled, such that a clear Fourth Amendment constitutional violation may not lead to the exclusion of evidence. Instead, it now leads to an examination of the conduct of the …


Police Officer's Safety: An Exception Within An Exception Of The Fourth Amendment, Jeffrey T. Wennar Jan 2014

Police Officer's Safety: An Exception Within An Exception Of The Fourth Amendment, Jeffrey T. Wennar

Criminal Law Practitioner

No abstract provided.


From Selfies To Shackles: Why The Government May Be Able To Search Your Cell Phone Without A Warrant, Rochelle Brunot Jan 2013

From Selfies To Shackles: Why The Government May Be Able To Search Your Cell Phone Without A Warrant, Rochelle Brunot

Criminal Law Practitioner

No abstract provided.


Do The Federal Courts Sweep Buie Clean?, Jeffrey T. Wennar Jan 2013

Do The Federal Courts Sweep Buie Clean?, Jeffrey T. Wennar

Criminal Law Practitioner

No abstract provided.