Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Fourth amendment (19)
- Search (13)
- Privacy (12)
- Expectation of privacy (6)
- Third party doctrine (6)
-
- Drone (3)
- Information privacy (3)
- Location tracking (3)
- Seizure (3)
- Technology (3)
- Uas (3)
- Uav (3)
- Artificial intelligence (2)
- Automation (2)
- Big data (2)
- Criminal procedure (2)
- First amendment (2)
- Free speech (2)
- Gps tracking (2)
- Location surveillance (2)
- Reasonable expectation of privacy (2)
- Security (2)
- Third party (2)
- Us v. jones (2)
- Adjudication (1)
- Analytics (1)
- Body camera (1)
- Cell site location (1)
- Cell tower (1)
- Computer search (1)
Articles 1 - 22 of 22
Full-Text Articles in Law
Should Robots Prosecute And Defend?, Stephen E. Henderson
Should Robots Prosecute And Defend?, Stephen E. Henderson
Stephen E Henderson
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson
A Few Criminal Justice Big Data Rules, Stephen E. Henderson
A Few Criminal Justice Big Data Rules, Stephen E. Henderson
Stephen E Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
Stephen E Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Stephen E Henderson
The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Stephen E Henderson
"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …
American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson
American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson
Stephen E Henderson
Real-Time And Historic Location Surveillance After United States V. Jones: An Administrable, Mildly Mosaic Approach, Stephen E. Henderson
Real-Time And Historic Location Surveillance After United States V. Jones: An Administrable, Mildly Mosaic Approach, Stephen E. Henderson
Stephen E Henderson
In United States v. Jones, the government took an extreme position: so far as the federal Constitution is concerned, law enforcement can surreptitiously electronically track the movements of any American over the course of an entire month without cause or restraint. According to the government, whether the surveillance be for good reason, invidious reason, or no reason, the Fourth Amendment is not implicated. Fortunately, that position was unanimously rejected by the High Court. The Court did not, however, resolve what restriction or restraint the Fourth Amendment places upon location surveillance, reflecting a proper judicial restraint in this nuanced and difficult …
After United States V. Jones, After The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
After United States V. Jones, After The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
Stephen E Henderson
In United States v. Jones, the Supreme Court unanimously rejected the proposition that the Government can surreptitiously electronically track vehicle location for an entire month without Fourth Amendment restraint. While the Court's three opinions leave much uncertain, in one perspective they fit nicely within a long string of cases in which the Court is cautiously developing new standards of Fourth Amendment protection, including a rejection of a strong third party doctrine. This Article develops that perspective and provides a cautiously optimistic view of where search and seizure protections may be headed.
More detail:
United States v. Jones, in which the …
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
Stephen E Henderson
This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …
Expectations Of Privacy In Social Media, Stephen E. Henderson
Expectations Of Privacy In Social Media, Stephen E. Henderson
Stephen E Henderson
This article, which largely tracks my remarks at Mississippi College’s Social Media Symposium, examines expectations of privacy in social media such as weblogs (blogs), Facebook pages, and Twitter tweets. Social media is diverse and ever-diversifying, and while I address some of that complexity, I focus on the core functionality, which provides the groundwork for further conversation as the technology and related social norms develop. As one would expect, just as with our offline communications and other online communications, in some we have an expectation of privacy that is recognized by current law, in some we have an expectation of privacy …
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
Stephen E Henderson
In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …
‘Move On’ Orders As Fourth Amendment Seizures, Stephen E. Henderson
‘Move On’ Orders As Fourth Amendment Seizures, Stephen E. Henderson
Stephen E Henderson
If a police officer orders one to move on, must the recipient comply? This article analyzes whether there is a federal constitutional right to remain, and in particular whether a police command to move on constitutes a seizure of the person for purposes of the Fourth Amendment. Although it is a close question, I conclude that the Fourth Amendment typically does not restrict a move on (MO) order, and that substantive due process only prohibits the most egregious such orders. It is a question of broad significance given the many legitimate reasons police might order persons to move on, as …
The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson
The Technology Of Surveillance: Will The Supreme Court's Expectations Ever Resemble Society's?, Stephen E. Henderson
Stephen E Henderson
Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson
Beyond The (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, And The Rest Of Us Too, Stephen E. Henderson
Stephen E Henderson
For at least thirty years the Supreme Court has adhered to its third-party doctrine in interpreting the Fourth Amendment, meaning that so far as a disclosing party is concerned, information in the hands of a third party receives no Fourth Amendment protection. The doctrine was controversial when adopted, has been the target of sustained criticism, and is the predominant reason that the Katz revolution has not been the revolution many hoped it would be. Some forty years after Katz the Court's search jurisprudence largely remains tied to property conceptions. As I have demonstrated elsewhere, however, the doctrine is not the …
Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson
Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson
Stephen E Henderson
We are all aware of, and many commentators are critical of, the Supreme Court's third-party doctrine, under which information provided to third parties receives no Fourth Amendment protection. This constitutional void becomes increasingly important as technology and social norms dictate that increasing amounts of disparate information are available to third parties. But we are not solely dependent upon the Federal Constitution. We may have more constitutional protection as citizens of states, each of which has a constitutional cognate or analog to the Federal Fourth Amendment. As Justice Brennan urged in a famous 1977 article, those provisions should be interpreted to …
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Stephen E Henderson
The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …