Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2003

University of Michigan Law School

Michigan Telecommunications & Technology Law Review

Seizures

Articles 1 - 2 of 2

Full-Text Articles in Law

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young Oct 2003

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young

Michigan Telecommunications & Technology Law Review

This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …