Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Loyola Marymount University and Loyola Law School (2)
- New York Law School (2)
- Selected Works (2)
- Washington and Lee University School of Law (2)
- Barry University School of Law (1)
-
- Northwestern Pritzker School of Law (1)
- St. Mary's University (1)
- Texas A&M University School of Law (1)
- University of Denver (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Entire DC Network
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Loyola of Los Angeles Law Review
During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.
Although …
A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland
A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland
Faculty Scholarship
For nearly 200 years, an individual’s personal papers enjoyed near-absolute protection from government search and seizure. That is no longer the case. With the widespread adoption of cloud-based information processing and storage services, the third-party doctrine operates to effectively strip our digital papers of meaningful Fourth Amendment protections.
This Article presents a new approach to reconciling current third-party doctrine with the technological realities of modern personal information processing. Our most sensitive data is now processed and stored on cloud computing systems owned and operated by third parties. Although we may consider these services to be private and generally secure, the …
Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy
Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy
Washington and Lee Law Review Online
In recent years body-worn cameras have been championed by community groups, scholars, and the courts as a potential check on police misconduct. Such has been the enthusiasm for body-worn cameras that, in a relatively short time, they have been rolled out to police departments across the country. Perhaps because of the optimism surrounding these devices there has been little consideration of the Fourth Amendment issues they pose, especially when they are coupled with facial recognition technology (FRT). There is one particular context in which police use of FRT equipped body-worn cameras is especially concerning: public protests. This Comment constitutes the …
Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey
Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey
Faculty Articles
For the first hundred years of the Fourth Amendment's life, gains in the technology of surveillance were modest. With the advent of miniaturization and ever-increasing sophistication and capability of surveillance and detection devices, the Supreme Court has struggled to adapt its understanding of "search" to the constantly evolving devices and methods that challenge contemporary understanding of privacy. In response to surveillance innovations, the Court has taken varying positions, focusing first on property-based intrusions by government, then shifting to privacy expectations, and, more recently, resurrecting the view that a trespass to property can define search.
This article surveys this constitutional odyssey, …
The Futile Fourth Amendment: Understanding Police Excessive Force Doctrine Through An Empirical Assessment Of Graham V. Connor, Osagie K. Obasogie, Zachary Newman
The Futile Fourth Amendment: Understanding Police Excessive Force Doctrine Through An Empirical Assessment Of Graham V. Connor, Osagie K. Obasogie, Zachary Newman
Northwestern University Law Review
Graham v. Connor established the modern constitutional landscape for police excessive force claims. The Supreme Court not only refined an objective reasonableness test to describe the constitutional standard, but also held that the Fourth Amendment is the sole avenue for courts to adjudicate claims that police violated a person’s constitutional rights in using force. In this Essay, we ask: What impact did this decision have on the nature of police excessive force claims in federal courts? To address this, we engaged in a qualitative examination of 500 federal cases (250 in the twenty-six years before Graham and 250 in the …
Hernandez V. Mesa: Preserving The Zone Of Constitutional Uncertainty At The Border, Alexandra A. Botsaris
Hernandez V. Mesa: Preserving The Zone Of Constitutional Uncertainty At The Border, Alexandra A. Botsaris
Maryland Law Review
No abstract provided.
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
County Of Los Angeles V. Mendez: Defending The Constitutionality Of The "Provocation Rule", Layla Bishara
County Of Los Angeles V. Mendez: Defending The Constitutionality Of The "Provocation Rule", Layla Bishara
Loyola of Los Angeles Law Review
No abstract provided.
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Scholarly Articles
To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …
State V. Hill, Nazariy Gavrysh
United States V. Ammons, Rebecca Ruffer
Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff
Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff
Sturm College of Law: Faculty Scholarship
Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?
This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …
Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov
Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov
Faculty Scholarship
No abstract provided.
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Scholarly Works
This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?
The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David Rudovsky, David A. Harris
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David Rudovsky, David A. Harris
All Faculty Scholarship
The investigative detention doctrine first announced in Terry v. Ohio and amplified over the past fifty years has been much analyzed, praised, and criticized from a number of perspectives. Significantly, however, over this time period commentators have only occasionally questioned the Supreme Court’s “common sense” judgments regarding the factors sufficient to establish reasonable suspicion for stops and frisks. For years, the Court has provided no empirical basis for its judgments, due in large part to the lack of reliable data. Now, with the emergence of comprehensive data on these police practices, much can be learned about the predictive power of …
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky
Articles
The investigative detention doctrine first announced in Terry v. Ohio and amplified over the past fifty years has been much analyzed, praised, and criticized from a number of perspectives. Significantly, however, over this time period commentators have only occasionally questioned the Supreme Court’s “common sense” judgments regarding the factors sufficient to establish reasonable suspicion for stops and frisks. For years, the Court has provided no empirical basis for its judgments, due in large part to the lack of reliable data. Now, with the emergence of comprehensive data on these police practices, much can be learned about the predictive power of …
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson