Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Fourth Amendment

The Right To Remain Armed, Jeffrey Bellin Oct 2015

The Right To Remain Armed, Jeffrey Bellin

Faculty Publications

The laws governing gun possession are changing rapidly. In the past two years, federal courts have wielded a revitalized Second Amendment to invalidate longstanding gun carrying restrictions in Chicago, the District of Columbia, and throughout California. Invoking similar Second Amendment themes, legislators across the country have steadily deregulated public gun carrying, preempting municipal gun control ordinances in cities like Philadelphia, Atlanta, and Cleveland.

These changes to substantive gun laws reverberate through the constitutional criminal procedure framework. By making it lawful for citizens to carry guns even in crowded urban areas, enhanced Second Amendment rights trigger Fourth Amendment protections that could …


Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff Jul 2015

Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff

All Faculty Scholarship

The Supreme Court’s decision in Scott v. Harris has quickly become a staple in many Civil Procedure courses, and small wonder. The cinematic high-speed car chase complete with dash-cam video and the Court’s controversial treatment of that video evidence seem tailor-made for classroom discussion. As is often true with instant classics, however, splashy first impressions can mask a more complex state of affairs. At the heart of Scott v. Harris lies the potential for a radical doctrinal reformation: a shift in the core summary judgment standard undertaken to justify a massive expansion of interlocutory appellate jurisdiction in qualified immunity cases. …


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


From Fugitives To Ferguson: Repairing Historical And Structural Defects In Legally Sanctioned Use Of Deadly Force, José F. Anderson Jan 2015

From Fugitives To Ferguson: Repairing Historical And Structural Defects In Legally Sanctioned Use Of Deadly Force, José F. Anderson

All Faculty Scholarship

The lawful use of lethal force to subdue suspected wrongdoers has a long tradition in our nation. There is certainly nothing wrong with securing, incapacitating, or even killing violent persons who pose a serious threat to the lives of innocent individuals. One of the important roles of government is to protect people from harm and keep the peace. Recent events in Ferguson, Missouri, have highlighted the tension between the officers on the beat and citizens on the street. These tensions are not likely to subside unless there are major structural changes in the way the police do their job and …


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


Cutting Cops Too Much Slack, Wayne A. Logan Jan 2015

Cutting Cops Too Much Slack, Wayne A. Logan

Scholarly Publications

Police officers can make mistakes, which, for better or worse, the U.S. Supreme Court has often seen fit to forgive. Police, for instance, can make mistakes of fact when assessing whether circumstances justify the seizure of an individual or search of a residence; they can even be mistaken about the identity of those they arrest. This essay examines yet another, arguably more significant context where police mistakes are forgiven: when they seize a person based on their misunderstanding of what a law prohibits.


Government Retention And Use Of Unlawfully Secured Dna Evidence, Wayne A. Logan Jan 2015

Government Retention And Use Of Unlawfully Secured Dna Evidence, Wayne A. Logan

Scholarly Publications

No abstract provided.


Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell Jan 2015

Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell

Scholarly Articles

Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …


The Death Penalty On The Streets: What The Eighth Amendment Can Teach About Regulating Police Use Of Force, Jelani Jefferson Exum Jan 2015

The Death Penalty On The Streets: What The Eighth Amendment Can Teach About Regulating Police Use Of Force, Jelani Jefferson Exum

Faculty Publications

(Excerpt)

The use of force by police officers has traditionally been analyzed through the lens of Fourth Amendment reasonableness. The Supreme Court has decided that the proper question regarding the excessiveness of police force is whether the police officer acted as a reasonable law enforcement officer. When that police force is fatal — what this Article deems the death penalty on the streets — the legal question is the same, leaving us with an analysis that requires a heavy reliance on the officer's version of events and a host of disagreement on what constitutes appropriate police action. Reasonable minds can, …


Substitute Arguments In Constitutional Law, Louis Michael Seidman Jan 2015

Substitute Arguments In Constitutional Law, Louis Michael Seidman

Georgetown Law Faculty Publications and Other Works

In this article, I argue that that substitution is crucial to our practice of constitutional law. Of course, if one wished, one could easily extend the domain of substitution beyond these boundaries. Substitute arguments are an important aspect of law more generally and, indeed, of life. I have nonetheless chosen to limit my discussion to constitutional substitution because, I believe, overt discussion of substitution in this particular area illuminates important aspects of our constitutional regime-–aspects that substitution itself regularly obscures. To put my central point directly, I hope to show that constitutional law amounts to one, giant substitute argument.


Resisting Wholesale Electronic Invasion Of The Fourth Amendment, Michael E. Tigar Jan 2015

Resisting Wholesale Electronic Invasion Of The Fourth Amendment, Michael E. Tigar

Faculty Scholarship

No abstract provided.


Using The Dna Testing Of Arrestees To Reevaluate Fourth Amendment Doctrine, Steven P. Grossman Jan 2015

Using The Dna Testing Of Arrestees To Reevaluate Fourth Amendment Doctrine, Steven P. Grossman

All Faculty Scholarship

With the advent of DNA testing, numerous issues have arisen with regard to obtaining and using evidence developed from such testing. As courts have come to regard DNA testing as a reliable method for linking some people to crimes and for exonerating others, these issues are especially significant. The federal government and most states have enacted statutes that permit or direct the testing of those convicted of at least certain crimes. Courts have almost universally approved such testing, rejecting arguments that obtaining and using such evidence violates the Fourth Amendment.

More recently governments have enacted laws permitting or directing the …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


The Supreme Digital Divide, Mary Graw Leary Jan 2015

The Supreme Digital Divide, Mary Graw Leary

Scholarly Articles

Society has long struggled with the meaning of privacy in a modern world. This struggle is not new. With the advent of modern technology and information sharing, however, the challenges have become more complex. Socially, Americans seek to both protect their private lives, and also to utilize technology to connect with the world. Commercially, industries seek to obtain information from individuals, often without their consent, and sell it to the highest bidder. As technology has advanced, the ability of other individuals, institutions, and governments to encroach upon this privacy has strengthened. Nowhere is this tension between individual privacy rights and …


Beyond The Fourth Amendment: Additional Constitutional Guarantees That Mass Surveillance Violates, Nadine Strossen Jan 2015

Beyond The Fourth Amendment: Additional Constitutional Guarantees That Mass Surveillance Violates, Nadine Strossen

Articles & Chapters

The ongoing dragnet communications surveillance programs raise multiple statutory and constitutional problems. Each problem alone, and even more so the whole combination, provides a serious ground at least for vastly curbing such programs, if not ending them. This Article reviews constitutional challenges to these programs to evaluate the likely success of current and future litigants.


High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue Jan 2015

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.

The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …