Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Fourth Amendment

The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue Jan 2021

The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The past eight years have witnessed an explosion in the number of publicly-available opinions and orders issued by the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review. From only six opinions in the public domain 1978–2012, by early 2021, eighty-eight opinions had been released. The sharp departure is even more pronounced in relation to orders: from only one order declassified during 1978–2012, since 2013, 288 have been formally released. These documents highlight how the courts’s roles have evolved since 2004 and reveal four key areas that dominate the courts’ jurisprudence: its position as a specialized, Article III …


Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue Apr 2019

Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, …


Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue Jan 2019

Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue Jan 2015

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.

The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …


Substitute Arguments In Constitutional Law, Louis Michael Seidman Jan 2015

Substitute Arguments In Constitutional Law, Louis Michael Seidman

Georgetown Law Faculty Publications and Other Works

In this article, I argue that that substitution is crucial to our practice of constitutional law. Of course, if one wished, one could easily extend the domain of substitution beyond these boundaries. Substitute arguments are an important aspect of law more generally and, indeed, of life. I have nonetheless chosen to limit my discussion to constitutional substitution because, I believe, overt discussion of substitution in this particular area illuminates important aspects of our constitutional regime-–aspects that substitution itself regularly obscures. To put my central point directly, I hope to show that constitutional law amounts to one, giant substitute argument.


Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue Jan 2014

Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …


Advisory Adjudication, Girardeau A. Spann Jan 2012

Advisory Adjudication, Girardeau A. Spann

Georgetown Law Faculty Publications and Other Works

The Supreme Court decision in Camreta v. Greene is revealing. The Court first issues an opinion authorizing appeals by prevailing parties in qualified immunity cases, even though doing so entails the issuance of an advisory opinion that is not necessary to resolution of the dispute between the parties. And the Court then declines to reach the merits of the underlying constitutional claim in the case, because doing so would entail the issuance of an advisory opinion that was not necessary to the resolution of the dispute between the parties. The Court's decision, therefore, has the paradoxical effect of both honoring …


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …