Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Law

Private Eyes, They're Watching You: Law Enforcement’S Monitoring Of Social Media, Rachel Levinson-Waldman Jan 2019

Private Eyes, They're Watching You: Law Enforcement’S Monitoring Of Social Media, Rachel Levinson-Waldman

Oklahoma Law Review

No abstract provided.


United States V. Lambis: A Good Call For Cellphones, Cell-Site Simulators, And The Fourth Amendment, Kathryn E. Gardner Jan 2018

United States V. Lambis: A Good Call For Cellphones, Cell-Site Simulators, And The Fourth Amendment, Kathryn E. Gardner

Oklahoma Law Review

No abstract provided.


Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin Jan 2014

Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin

Oklahoma Law Review

Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the “mere evidence rule” in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the “object” of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search “might lead to evidence of wrongdoing” triggers a very different inquiry than probable cause to believe that a search “will produce evidence of criminal activity.” The failure to address the constraints that should be imposed on …