Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

Journal

2014

Articles 1 - 17 of 17

Full-Text Articles in Entire DC Network

A Critique Of The Second Circuit’S Analysis In Nicholas V. Goord, John Dorsett Niles Dec 2014

A Critique Of The Second Circuit’S Analysis In Nicholas V. Goord, John Dorsett Niles

University of Massachusetts Law Review

The Case Note proceeds as follows. Part I traces the historical and procedural facts underlying Nicholas. Part II describes the legal backdrop against which the United States Court of Appeals for the Second Circuit decided the case. Part III steps through the Second Circuit’s majority opinion, and Part IV critiques the opinion. Part V concludes the Case Note by discussing the ramifications of Nicholas for future DNA-indexing cases.


Search And Seizures: Constitutionally Protected Or Discretionary Police Work?, Jaren Fernan Nov 2014

Search And Seizures: Constitutionally Protected Or Discretionary Police Work?, Jaren Fernan

Touro Law Review

No abstract provided.


Swearing By New Technology: Strengthening The Fourth Amendment By Utilizing Modern Warrant Technology While Satisfying The Oath Or Affirmation Clause, Andrew H. Bean Oct 2014

Swearing By New Technology: Strengthening The Fourth Amendment By Utilizing Modern Warrant Technology While Satisfying The Oath Or Affirmation Clause, Andrew H. Bean

BYU Law Review

No abstract provided.


Minding Your Meds: Balancing The Needs For Patient Privacy And Law Enforcement In Prescription Drug Monitoring Programs, Devon T. Unger Sep 2014

Minding Your Meds: Balancing The Needs For Patient Privacy And Law Enforcement In Prescription Drug Monitoring Programs, Devon T. Unger

West Virginia Law Review

No abstract provided.


Spying On Americans: At What Point Does The Nsa's Collection And Searching Of Metadata Violate The Fourth Amendment?, Elizabeth Atkins Jul 2014

Spying On Americans: At What Point Does The Nsa's Collection And Searching Of Metadata Violate The Fourth Amendment?, Elizabeth Atkins

Washington Journal of Law, Technology & Arts

Edward Snowden became a household name on June 5, 2013, when he leaked highly classified documents revealing that the American Government was spying on its citizens. The information exposed that the National Security Agency (NSA) collected millions of American’s metadata through forced cooperation with telephone-service providers. Metadata contains sensitive and private information about a person’s life. When collected and searched, metadata can reveal a portrait of a person’s intimate activities amounting to a violation of one’s reasonable expectation of privacy. This Article suggests changing the current standard allowing the NSA to collect and search metadata under Section 215 of the …


The Conversational Consent Search: How “Quick Look” And Other Similar Searches Have Eroded Our Constitutional Rights, Alexander A. Mikhalevsky Jun 2014

The Conversational Consent Search: How “Quick Look” And Other Similar Searches Have Eroded Our Constitutional Rights, Alexander A. Mikhalevsky

Georgia State University Law Review

One area in which law enforcement agencies have stretched constitutional limits concerns the scope of a suspect’s consent to search his or her vehicle. Police forces across the country have tested the limits of consent by asking vague, conversational questions to suspects with the goal of obtaining a suspect’s consent to search, even though that individual may not want to allow the search or may not know that he or she has the right to deny consent.

Conversational phrases like “Can I take a quick look?” or “Can I take a quick look around?” have “emerg[ed] as . . . …


Policing By Numbers: Big Data And The Fourth Amendment, Elizabeth E. Joh Mar 2014

Policing By Numbers: Big Data And The Fourth Amendment, Elizabeth E. Joh

Washington Law Review

This article identifies three uses of big data that hint at the future of policing and the questions these tools raise about conventional Fourth Amendment analysis. Two of these examples, predictive policing and mass surveillance systems, have already been adopted by a small number of police departments around the country. A third example—the potential use of DNA databank samples—presents an untapped source of big data analysis. Whether any of these three examples of big data policing attract more widespread adoption by the police is yet unknown, but it likely that the prospect of being able to analyze large amounts of …


The Danger Of Nonrandom Case Assignment: How The Southern District Of New York's "Related Cases" Rule Shaped Stop-And-Frisk Rulings, Katherine A. Macfarlane Jan 2014

The Danger Of Nonrandom Case Assignment: How The Southern District Of New York's "Related Cases" Rule Shaped Stop-And-Frisk Rulings, Katherine A. Macfarlane

Michigan Journal of Race and Law

The Southern District of New York’s local rules are clear: “[A]ll active judges . . . shall be assigned substantially an equal share of the categories of cases of the court over a period of time.” Yet for the past fourteen years, Southern District Judge Shira Scheindlin has been granted near-exclusive jurisdiction over one category of case: those involving wide-sweeping constitutional challenges to the New York Police Department’s (NYPD) stop-and-frisk policies. In 1999, Judge Scheindlin was randomly assigned Daniels v. City of New York, the first in a series of high-profile and high-impact stop-and-frisk cases. Since then, she has overseen …


Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew G. Ferguson Jan 2014

Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew G. Ferguson

Oklahoma Law Review

Before moving on to my contribution about how the growing reliance on big data analytics may necessitate a slight modification to the ABA Standards on Law Enforcement Access to Third Party Records (LEATPR Standards), I would like first to pay a few compliments to the drafters of the LEATPR Standards for producing such a systematic, thoughtful, and elegant framework for considering Fourth Amendment freedoms. As anyone who writes about or teaches the Fourth Amendment knows, the doctrine remains a theoretical muddle. Yet, despite a minefield of conflicting precedent, the drafters of the LEATPR Standards have managed to construct a defensible …


The Aba Standards For Criminal Justice: Law Enforcement Access To Third Party Records: Critical Perspectives From A Technology-Centered Approach To Quantitative Privacy, David C. Gray Jan 2014

The Aba Standards For Criminal Justice: Law Enforcement Access To Third Party Records: Critical Perspectives From A Technology-Centered Approach To Quantitative Privacy, David C. Gray

Oklahoma Law Review

No abstract provided.


The Purpose Of The Fourth Amendment And Crafting Rules To Implement That Purpose, Thomas K. Clancy Jan 2014

The Purpose Of The Fourth Amendment And Crafting Rules To Implement That Purpose, Thomas K. Clancy

University of Richmond Law Review

No abstract provided.


Maryland V. King: Sacrificing The Fourth Amendment To Build Up The Dna Database, Stephanie B. Noronha Jan 2014

Maryland V. King: Sacrificing The Fourth Amendment To Build Up The Dna Database, Stephanie B. Noronha

Maryland Law Review

No abstract provided.


Third Party Records Protection On The Model Of Heightened Scrutiny, Marc J. Blitz Jan 2014

Third Party Records Protection On The Model Of Heightened Scrutiny, Marc J. Blitz

Oklahoma Law Review

No abstract provided.


The Exclusionary Rule As A Symbol Of The Rule Of Law, Jenia I. Turner Jan 2014

The Exclusionary Rule As A Symbol Of The Rule Of Law, Jenia I. Turner

SMU Law Review

Throughout South America, Southern and Eastern Europe, and East Asia, more than two dozen countries have transitioned to democracy since the 1980s. A remarkable number of these have adopted an exclusionary rule (mandating that evidence obtained unlawfully by the government is generally inadmissible in criminal trials) as part of broader legal reforms. Democratizing countries have adopted exclusionary rules even though they are not required to do so by any international treaty and there is no indication that there is widespread popular demand for such rules. This has occurred at a time when the rule has been weakened in the United …


Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin Jan 2014

Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin

Oklahoma Law Review

Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the “mere evidence rule” in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the “object” of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search “might lead to evidence of wrongdoing” triggers a very different inquiry than probable cause to believe that a search “will produce evidence of criminal activity.” The failure to address the constraints that should be imposed on …


Ubiquitous Privacy, Thomas P. Crocker Jan 2014

Ubiquitous Privacy, Thomas P. Crocker

Oklahoma Law Review

No abstract provided.


Light In The Darkness: How The Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald Jan 2014

Light In The Darkness: How The Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald

Oklahoma Law Review

No abstract provided.