Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Law
Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker
Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker
Articles
In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.
Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby
Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby
Michigan Law Review
Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …
Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern
Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern
Michigan Law Review
The Stored Communications Act (“SCA”) arms federal law enforcement agencies with the ability to use a special type of warrant to access users’ electronically stored communications. In some circumstances, SCA warrants can require service providers to bundle and produce a user’s electronically stored communications without ever disclosing the existence of the warrant to the individual user until charges are brought. Users that are charged will ultimately receive notice of the search after the fact through their legal proceedings. Users that are never charged, however, may never know that their communications were obtained and searched. This practice effectively makes the provisions …