Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu Dec 2017

Orwell's 1984 And A Fourth Amendment Cybersurveillance Nonintrusion Test, Margaret Hu

Scholarly Articles

This Article describes a cybersurveillance nonintrusion test under the Fourth Amendment that is grounded in evolving customary law to replace the reasonable expectation of privacy test formulated in Katz v. United States. To illustrate how customary law norms are shaping modern Fourth Amendment jurisprudence, this Article examines the recurrence of judicial references to George Orwell’s novel, 1984, within the Fourth Amendment context when federal courts have assessed the constitutionality of modern surveillance methods. The Supreme Court has indicated that the Fourth Amendment privacy doctrine must now evolve to impose meaningful limitations on the intrusiveness of new surveillance technologies.

A …


Commodifying Policing: A Recipe For Community-Police Tensions, Nora V. Demleitner Jan 2017

Commodifying Policing: A Recipe For Community-Police Tensions, Nora V. Demleitner

Scholarly Articles

This Article, in Part II, begins with a description of how municipalities, at least since the recession of 2008, have fallen short of fully funding their departments. Part III focuses on four distinct outside funding components and their impact on policing. The first subsection discusses asset forfeitures, under both state and federal law. Subsection two highlights revenue derived from citations, often in the form of traffic tickets. A discussion of fees that are being added to fines, often to fund courts, probation agencies, and police departments, follows. The increasing amounts and types of fees imposed have substantially increased the burden …


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner: Carpenter V. United States, Margaret Hu Jan 2017

Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner: Carpenter V. United States, Margaret Hu

Scholarly Articles

Law enforcement officials wanted to learn where Petitioner Timothy Carpenter was at the time of certain robberies. To figure that out, they obtained records from his cellular service provider showing the movements of his cell phone. Examining those records, they were able to track Carpenter’s whereabouts over a four-month period. Obtaining and examining those records was a “search” in any normal sense of the word—a search of documents and a search for Carpenter and one of his personal effects. It was therefore a “search” within the meaning of the Fourth Amendment. When the Amendment was ratified, to “search” meant to …