Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston Mar 2017

The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston

Catholic University Law Review

The advent of new technology has presented courts with unique challenges when analyzing searches and seizures under the Fourth Amendment. Out of necessity, the application of the Fourth Amendment has evolved to address privacy issues stemming from modern technology that could not have been anticipated by the Amendment’s drafters. As part of this evolution, the Supreme Court devised the “private search” doctrine, which upholds the constitutionality of warrantless police searches of items that were previously searched by a private party, so long as the police search does not exceed the scope of the private-party search. However, courts have struggled to …


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Knock And Talk No More, Jamesa J. Drake Feb 2017

Knock And Talk No More, Jamesa J. Drake

Maine Law Review

The Supreme Court has set out a roadmap for challenging one of the most common and insidious police tactics used today: the knock-and-talk. The path is short and clear and it leads to the inescapable conclusion that the knock-and-talk—as it is actually employed in practice—is unconstitutional. Although the Court has yet to squarely consider the issue, some Justices have already taken pains to say, in dictum, that knock-and-talks are lawful. Practitioners should not be dissuaded. What this faction of the Court describes is a highly romanticized—and utterly inaccurate—conception of what a knock-and-talk actually entails. The sort of activity that these …


Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon Jan 2017

Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon

Georgia Law Review

The FourthAmendment's exclusionary rule requires that
criminal courts suppress evidence obtained as a result of
an unconstitutionalsearch or seizure. The Supreme Court
has repeatedly stated that suppression is purely
regulatory, not remedial. Its only purpose is to deter
future police misconduct, not to remedy past privacy or
liberty harms suffered by the defendant. Exclusion, in
other words, is for the benefit of community members who
might, sometime in the future, be subject to police
misconduct like that endured by the defendant.
Exclusion's regulatory purpose would be greatly aided if
criminal courts could identify when a suppression motion
involved Fourth Amendment …


Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen Jan 2017

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen

Touro Law Review

No abstract provided.


First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell Jan 2017

First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell

St. Mary's Law Journal

Abstract forthcoming.


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …