Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Freedom From Speech, Mary Anne Franks Jul 2022

Freedom From Speech, Mary Anne Franks

Articles

The importance of freedom of speech in a democratic society is usually taken as a given, but freedom from speech is no less important in safeguarding the values of truth, autonomy, and democracy. Freedom from speech includes both the right of the individual to not be forced to speak and the freedom to avoid the speech of others. This essay attempts to highlight the significance of freedom from speech in order to clarify the importance of the First Amendment right against compelled speech; provide an explanation for when the right of free speech yields to other rights; and offer a …


Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin Jan 2022

Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin

Scholarly Works

As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …


Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety Jan 2022

Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety

Articles by Maurer Faculty

This Article uses a wrongful conviction lens to compare identifications by machines, notably facial recognition software, with identifications by humans. The Article advocates for greater reliability checks on both before use against a criminal defendant. The Article examines the cascading influence of facial recognition software on eyewitness identifications themselves and the related potential for greater errors. As a solution, the Article advocates the inclusion of eyewitness identification in the Organization of Scientific Area Committees' ("OSAC") review of facial recognition software for a more robust examination and consideration of software and its usage. The Article also encourages police departments to adopt …


Special Matters: Filtering Privileged Materials In Federal Prosecutions, Christina Frohock Oct 2021

Special Matters: Filtering Privileged Materials In Federal Prosecutions, Christina Frohock

Articles

This Article reviews the U.S. Department of Justice's toolbox for handling potentially privileged materials, with close attention to the evolution from filter teams to the Special Matters Unit in fraud prosecutions. Significant case opinions from the U.S. Courts of Appeals for the Fourth, Sixth, and Eleventh Circuits reveal the judiciary's diverse views on filter teams. The recent case of United States v. Esformes in the U.S. District Court for the Southern District of Florida, now on appeal to the Eleventh Circuit, illustrates how a filter team can fall short and draw unflattering attention to the Department of Justice. In the …


Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


Fraud Law And Misinfodemics, Wes Henricksen Jan 2021

Fraud Law And Misinfodemics, Wes Henricksen

Faculty Scholarship

No abstract provided.


Structural Sensor Surveillance, Andrew Guthrie Ferguson Nov 2020

Structural Sensor Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

City infrastructure is getting smarter. Embedded smart sensors in roads, lampposts, and electrical grids offer the government a way to regulate municipal resources and the police a new power to monitor citizens. This structural sensor surveillance, however, raises a difficult constitutional question: Does the creation of continuously-recording, aggregated, long-term data collection systems violate the Fourth Amendment? After all, recent Supreme Court cases suggest that technologies that allow police to monitor location, reveal personal patterns, and track personal details for long periods of time are Fourth Amendment searches which require a probable cause warrant. This Article uses the innovation of smart …


How The Covid-19 Pandemic Has And Should Reshape The American Safety Net, Gabriel Scheffler, Andrew Hammond, Ariel Jurow Kleiman Oct 2020

How The Covid-19 Pandemic Has And Should Reshape The American Safety Net, Gabriel Scheffler, Andrew Hammond, Ariel Jurow Kleiman

Articles

No abstract provided.


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott Jul 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott

Articles

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams Jan 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams

Law Student Publications

George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amendments to Rule 41 of the Federal Rules of Criminal Procedure. Rule 41, governing searches and seizures, now permits magistrate judges to authorize agents- under a single warrant- to "remotely access," and simultaneously search, copy and seize information from an infinite number of unknown electronic devices in multiple districts anywhere in the country. The unlimited jurisdiction provision is triggered when a device's location is obscured through "technological means," or if agents are investigating computer crimes in five or more districts- regardless of whether …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill Jan 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill

Law Student Publications

This comment explores how broader shifts in Fourth Amendment doctrine may affect the government's collection of Cell Site Location Information (CSLI) moving forward. It consists of three parts. Part I examines the technological underpinnings of cellular networks. The issue is frequently litigated, but few in the legal community have a real grasp on the technology. A nuanced understanding of the technology is crucial when examining the accuracy of CSLI or how the third-party doctrine ought to apply. This comment consolidates and simplifies the technical workings of cellular networks to enable better and more informed answers. Last, drawing on this understanding, …


The Big Data Jury, Andrew Ferguson Jan 2016

The Big Data Jury, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article addresses the disruptive impact of big data technologies on jury selection.Jury selection requires personal information about potential jurors. Current selection practices, however, collect very little information about citizens, and litigants picking jury panels know even less. This data gap results in a jury selection system that: (1) fails to create a representative cross-section of the community; (2) encourages the discriminatory use of peremptory challenges; (3) results in an unacceptably high juror “no show” rate; and (4) disproportionately advantages those litigants who can afford to hire expensive jury consultants.Big data has the potential to remedy these existing limitations and …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Order, Technology And The Constitutional Meanings Of Criminal Procedure, Thomas P. Crocker Jul 2013

Order, Technology And The Constitutional Meanings Of Criminal Procedure, Thomas P. Crocker

Faculty Publications

No abstract provided.


The Missed Opportunity Of United States V. Jones: Commercial Erosion Of Fourth Amendment Protection In A Post Google Earth World, Mary Graw Leary Jan 2012

The Missed Opportunity Of United States V. Jones: Commercial Erosion Of Fourth Amendment Protection In A Post Google Earth World, Mary Graw Leary

Scholarly Articles

The Fourth Amendment protects people from unreasonable searches and seizures by the government. These protections, therefore, are only triggered when the government engages is a “search” or “seizure.” For decades, the Court defined “search” as a government examination of an area where one has a “reasonable expectation of privacy.” Such an expectation requires both that the individual demonstrate a subjective expectation of privacy and that the expectation is one society finds reasonable. In 1974, Anthony Amsterdam prophesized the unworkability of this test, warning of a day that the government would circumvent it my merely announcing 24 hour surveillance. Similarly, the …


Improving Privacy Protection, But By How Much?, Steve Coughlan Jan 2008

Improving Privacy Protection, But By How Much?, Steve Coughlan

Articles, Book Chapters, & Popular Press

The discussion of reasonable expectation of privacy in R. v. M. (A.) is extremely useful. In the wake of Tessling, many courts had effectively reduced the protection offered by s. 8 based on two arguments: that what was detected was an emanation in the public domain similar to heat coming from a house, and that what was discovered merely related to informational privacy and was not part of the biographical core of such data. Justice Binnie's decision puts paid the notion that either of these arguments is a trump card. He suggests that generalizing about "emanations" is not a useful …


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Mar 1994

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Cornell Law Faculty Publications

No abstract provided.


Electronic Surveillance, Computers, And The Fourth Amendment - The New Telecommunications Environment Calls For Reexamination Of Doctrine, Arthur R. Landever Jan 1984

Electronic Surveillance, Computers, And The Fourth Amendment - The New Telecommunications Environment Calls For Reexamination Of Doctrine, Arthur R. Landever

Law Faculty Articles and Essays

We are in the midst of a revolution in information collection and telecommunications. Computer networking, the unification of the various telecommunications systems, the establishment of central data banks, and government tracking and profiling of vast numbers of Americans present momentous challenges for our constitutional system. Increasingly, in our evolving culture, an individual enters the public setting in order to conduct his personal life. Fourth Amendment doctrine respecting electronic surveillance, as well as Supreme Court notions of "free choice" and "assumption of risk" must come to grips with this new reality. In the main, the author urges judicial intervention, as the …