Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Select Criminal Law And Procedure Cases From The U.S. Supreme Court's 2018-2019 Term, Eve Brensike Primus, Kristin Froehle Dec 2019

Select Criminal Law And Procedure Cases From The U.S. Supreme Court's 2018-2019 Term, Eve Brensike Primus, Kristin Froehle

Articles

Although the 2018-19 Term at the Supreme Court did not include any blockbuster rulings like Carpenter v. United States, the Court issued a number of significant criminal law and procedure rulings. It addressed warrantless blood-alcohol testing, the dual-sovereignty doctrine, the right to trial by jury, ineffective assistance of trial counsel, questions of incorporation, prisoners' competence to be executed, permissible methods of execution, and some important statutory interpretation questions. Looking back on the Term, Justice Gorsuch clearly solidified his position as the libertarian "swing" vote in criminal procedure cases. He joined the liberals to uphold a defendant's right to trial …


Supermajoritarian Criminal Justice, Aliza Plener Cover Jul 2019

Supermajoritarian Criminal Justice, Aliza Plener Cover

Articles

Democracy is often equated with majority rule. But closer analysis reveals that, in theory and by constitutional design, our criminal justice system should be supermajoritarian, not majoritarian. The Constitution guarantees that criminal punishment may be imposed only when backed by the supermajoritarian-historically, unanimous-approval of a jury drawn from the community. And criminal law theorists' expressive and retributive justifications for criminal punishment implicitly rely on the existence of broad community consensus in favor of imposing it. Despite these constitutional and theoretical ideals, the criminal justice system today is majoritarian at best. Both harsh and contested, it has lost the structural mechanisms …


Misunderstanding Judy Norman: Theory As Cause And Consequence, Martha R. Mahoney Jun 2019

Misunderstanding Judy Norman: Theory As Cause And Consequence, Martha R. Mahoney

Articles

Judy Norman shot her abusive husband during a late afternoon nap while he rested before violently trafficking her that night. The sharp contrast between the extreme violence and danger Judy faced and the denial of a self-defense instruction triggered extensive academic debates about justification and the use of deadly force. Norman became one of the most famous cases involving battered women, appearing in many casebooks and hundreds of law review articles. Despite all this work, the facts of the case contradict much of what scholars have said about Norman. Misconceptions about expert evidence, "Battered Woman Syndrome, "and battered women drive …


Custodial Compulsion, Kyron J. Huigens Mar 2019

Custodial Compulsion, Kyron J. Huigens

Articles

In cases that fall under Miranda v Arizona, police interrogators not only give a suspect reasons to confess; they also suggest that the suspect ought to confess. In doing so, interrogators effectively invoke the Wigmorean duty of a citizen to produce any evidence he has in his possession, including his own confession. That is, they invoke the duty against which the Self Incrimination Clause stands, so that the clause is applicable to police interrogations, and is violated where it is not waived. This means that “a Miranda violation” is a violation of the Self Incrimination Clause in the field, just …


Taking Data, Michael C. Pollack Jan 2019

Taking Data, Michael C. Pollack

Articles

Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …