Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Certain Certiorari: The Digital Privacy Rights Of Probationers, Daniel Yeager Jan 2017

Certain Certiorari: The Digital Privacy Rights Of Probationers, Daniel Yeager

Faculty Scholarship

In a recent oral argument, a judge on the California Court of Appeal told me they had "at least 50" pending cases on the constitutionality of probation conditions authorizing suspicionless searches of digital devices. As counsel of record in three of those cases, I feel positioned to comment on this hot topic within criminal law. My intention here is less to reconcile California's cases on suspicionless searches of probationers' digital devices than to locate them within the precedents of the United States Supreme Court, which is bound before long to pick up a case for the same purpose.


Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile Jan 2014

Beyond Title Vii: Rethinking Race, Ex-Offender Status, And Employment Discrimination In The Information Age, Kimani Paul-Emile

Faculty Scholarship

More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza Jan 2005

Privacy And The Criminal Arrestee Or Suspect: In Search Of A Right, In Need Of A Rule, Sadiq Reza

Faculty Scholarship

Criminal accusation stigmatizes. Merely having been accused of a crime lasts in the public eye, damaging one's reputation and threatening current and future employment, relationships, social status, and more. But vast numbers of criminal cases are dismissed soon after arrest, and countless accusations are unfounded or unprovable. Nevertheless, police officers and prosecutors routinely name criminal accusees to the public upon arrest or suspicion, with no obligation to publicize a defendant's exoneration, or the dismissal of his case, or a decision not to file charges against him at all. Other individuals caught up in the criminal process enjoy protections against the …