Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Border Searches In The Age Of Terrorism, Robert M. Bloom Oct 2013

Border Searches In The Age Of Terrorism, Robert M. Bloom

Robert Bloom

This article will first explore the history of border searches. It will look to the reorganization of the border enforcement apparatus resulting from 9/11 as well as the intersection of the Fourth Amendment and border searches generally. Then, it will analyze the Supreme Court's last statement on border searches in the Flores-Montano27 decision, including what impact this decision has had on the lower courts. Finally, the article will focus on Fourth Amendment cases involving terrorism concerns after 9/11, as a means of drawing some conclusions about the effect the emerging emphasis on terrorism and national security concerns will likely have …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

David C. Gray

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Danielle Keats Citron

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jul 2013

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

Fletcher N. Baldwin

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier Apr 2013

Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier

Jason Forcier

The right to privacy has and will remain a hotly contested debate about American liberties. In 2012, a 3-0 decision by the Sixth Circuit Court of Appeals, in United States v. Melvin Skinner, the court held that there is no “reasonable expectation of privacy in the data given off by. . . cellphone[s].” Given today’s explosion of cellular technology and use of smart phones, is it unreasonable to believe a person should remain secure in their "person" and “effects," as guaranteed under the Fourth Amendment, from unreasonable searches and seizures? Furthermore, with police requiring only a subpoena to a obtain …


The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman Apr 2013

The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman

Brett A Bauman

Police deception tactics are utilized throughout the United States as a way to catch unsuspecting criminals. Although criticized in many respects, most deceptive police techniques are not only legal, but are actually encouraged. DNA collection and analysis is no exception—techniques are frequently used by law enforcement officers in an attempt to collect a suspect’s genetic specimen in the interest of solving crimes. While law enforcement officers typically have the best interests of society in mind, the current practices employed by officers to collect suspects’ DNA violate the Fourth Amendment. The Fourth Amendment provides protection against unreasonable searches and seizures, and …


Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Bowman Mar 2013

Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Bowman

Mary N. Bowman

Full Disclosure: Cognitive Science, Informants, and Search Warrant Scrutiny

By Mary Nicol Bowman

This article posits that cognitive biases play a significant role in the gap between the rhetoric regarding Fourth Amendment protection and actual practices regarding search warrant scrutiny, particularly for search warrants based on informants’ tips. Specifically, this article examines the ways in which implicit bias, tunnel vision, priming, and hindsight bias can affect search warrants. These biases can affect each stage of the search warrant process, including targeting decisions, the drafting process, the magistrate’s decision whether to grant the warrant, and post-search review by trial and appellate …


The Right To Quantitative Privacy, David Gray, Danielle Citron Dec 2012

The Right To Quantitative Privacy, David Gray, Danielle Citron

David C. Gray

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron Dec 2012

The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …