Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

PDF

Northwestern Pritzker School of Law

Journal

Fourth amendment

Articles 1 - 4 of 4

Full-Text Articles in Law

Policing Suspicion: Qualified Immunity And "Clearly Established" Standards Of Proof, Seth W. Stoughton, Kyle Mclean, Justin Nix, Geoffrey Alpert Jan 2022

Policing Suspicion: Qualified Immunity And "Clearly Established" Standards Of Proof, Seth W. Stoughton, Kyle Mclean, Justin Nix, Geoffrey Alpert

Journal of Criminal Law and Criminology

This Article explores the intersection of Fourth Amendment standards of proof and the “clearly established” prong of qualified immunity. It illustrates how the juxtaposition of the Court’s insistence on a low level of specificity for the development of suspicion and a high degree of specificity for the imposition of liability makes it exceedingly difficult to hold officers accountable for violating constitutional rights. And it offers both a path for future research into the development of suspicion and suggestions for methods that police agencies can use to improve the development and articulation of suspicion. Ultimately, it contends that policing in the …


Don't (Tower) Dump On Freedom Of Association: Protest Surveillance Under The First And Fourth Amendments, Ana Pajar Blinder Jan 2021

Don't (Tower) Dump On Freedom Of Association: Protest Surveillance Under The First And Fourth Amendments, Ana Pajar Blinder

Journal of Criminal Law and Criminology

Government surveillance is ubiquitous in the United States and can range from the seemingly innocuous to intensely intrusive. Recently, the surveillance of protestors—such as those protesting against George Floyd’s murder by a police officer—has received widespread attention in the media and in activist circles, but has yet to be successfully challenged in the courts. Tower dumps, the acquisition of location data of cell phones connected to specific cell towers, are controversial law enforcement tools that can be used to identify demonstrators. This Comment argues that the insufficiency of Fourth Amendment protections for protesters being surveilled by government actors—by tactics such …


The Local-Control Model Of The Fourth Amendment, Michael J. Zydney Mannheimer Jan 2018

The Local-Control Model Of The Fourth Amendment, Michael J. Zydney Mannheimer

Journal of Criminal Law and Criminology

Fourth Amendment doctrine has been home to two competing models: the Warrant Model and the Reasonableness Model. The Warrant Model, emphasizing the Amendment’s Warrant Clause, holds that search and arrest via warrant is the preferred method and the default rule, though allowing for exceptions when obtaining a warrant is impracticable. The Reasonableness Model, which stresses the Amendment’s Reasonableness Clause, holds that the Amendment imposes a generalized reasonableness standard on searches and seizures by which the question is not whether dispensing with a warrant is reasonable but whether the search or seizure itself is reasonable. These polar positions have been replicated …


Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman Feb 2017

Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman

Northwestern University Law Review

In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.