Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Constitutional Law

Selected Works

Criminal Law and Procedure

Robert Bloom

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Accounting For Federalism In State Courts - Exclusion Of Evidence Obtained Lawfully By Federal Agents, Robert M. Bloom, Hillary J. Massey Oct 2013

Accounting For Federalism In State Courts - Exclusion Of Evidence Obtained Lawfully By Federal Agents, Robert M. Bloom, Hillary J. Massey

Robert Bloom

After the terrorist attacks on September 11th, Congress greatly enhanced federal law enforcement powers through enactment of the U.S.A. Patriot Act. The Supreme Court also has provided more leeway to federal officers in the past few decades, for example by limiting the scope of the exclusionary rule. At the same time, many states have interpreted their constitutions to provide greater individual protections to their citizens than provided by the federal constitution. This phenomenon has sometimes created a wide disparity between the investigatory techniques available to federal versus state law enforcement officers. As a result, state courts sometimes must decide whether …


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2013

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …