Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- William & Mary Law School (9)
- Selected Works (5)
- Northwestern Pritzker School of Law (4)
- University of Maine School of Law (4)
- Touro University Jacob D. Fuchsberg Law Center (3)
-
- University of Richmond (3)
- Roger Williams University (2)
- St. Mary's University (2)
- UIC School of Law (2)
- University of Massachusetts School of Law (2)
- Washington and Lee University School of Law (2)
- West Virginia University (2)
- Barry University School of Law (1)
- Columbia Law School (1)
- Georgia State University College of Law (1)
- Golden Gate University School of Law (1)
- Notre Dame Law School (1)
- Seton Hall University (1)
- St. John's University School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Cincinnati College of Law (1)
- University of Colorado Law School (1)
- University of New Hampshire (1)
- University of Oklahoma College of Law (1)
- Keyword
-
- Fourth Amendment (14)
- Fourth amendment (10)
- Privacy (9)
- Technology (6)
- United States Constitution 4th Amendment (6)
-
- Law enforcement (4)
- Probable cause (4)
- Civil rights (3)
- Constitution (3)
- Fourteenth amendment (3)
- Katz (3)
- Law (3)
- Police (3)
- Race (3)
- Search and seizure (3)
- 4th Amendment (2)
- Apple (2)
- Big Data (2)
- Blood test (2)
- Cell phone (2)
- Cell phone tracking (2)
- Constitutional law (2)
- Constitutionality (2)
- Criminal law (2)
- Drone (2)
- Drunk driving (2)
- Electronic Communications Privacy Act (2)
- Electronic Surveillance (2)
- Exclusionary rule (2)
- Habeas corpus (2)
- Publication
-
- William & Mary Bill of Rights Journal (7)
- Maine Law Review (4)
- Touro Law Review (3)
- Daniel B. Yeager (2)
- Erwin Chemerinsky (2)
-
- Faculty Publications (2)
- Law Faculty Scholarship (2)
- Law Student Publications (2)
- Northwestern Journal of Law & Social Policy (2)
- Northwestern University Law Review (2)
- Scholarly Articles (2)
- St. Mary's Law Journal (2)
- UIC Law Review (2)
- West Virginia Law Review (2)
- Barry Law Review (1)
- Briefs (1)
- Faculty Articles and Other Publications (1)
- Faculty Scholarship (1)
- GGU Law Review Blog (1)
- Georgia State University Law Review (1)
- Notre Dame Law Review (1)
- Oklahoma Journal of Law and Technology (1)
- Publications (1)
- Roger Williams University Law Review (1)
- Seton Hall Circuit Review (1)
- The Catholic Lawyer (1)
- Timothy C. MacDonnell (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Richmond Law Review (1)
- William & Mary Law Review (1)
- Publication Type
Articles 1 - 30 of 52
Full-Text Articles in Fourth Amendment
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
William & Mary Bill of Rights Journal
We finally have a federal ‘test case.’ In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age. The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher. This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious.
As for ambition, the Court …
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh
William & Mary Bill of Rights Journal
No abstract provided.
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn
William & Mary Bill of Rights Journal
Terry v. Ohio’s “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …
Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison
Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison
William & Mary Bill of Rights Journal
When the government investigates a crime, do citizens have a duty to assist? This question was raised in the struggle between Apple and the FBI over whether the agency could compel Apple to defeat its own password protections on the iPhone of one of the San Bernardino shooters. That case was voluntarily dismissed as moot when the government found a way of accessing the data on the phone, but the issue remains unresolved.
Because of advances in technology, software providers and device makers have been able to develop almost impenetrable protection for their customers’ information, effectively locking law enforcement out …
The Fourth Amendment Disclosure Doctrines, Monu Bedi
The Fourth Amendment Disclosure Doctrines, Monu Bedi
William & Mary Bill of Rights Journal
The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …
Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu
Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu
William & Mary Bill of Rights Journal
This Essay describes emerging big data technologies that facilitate horizontal cybersurveillance. Horizontal cybersurveillance makes possible what has been termed as “sentiment analysis.” Sentiment analysis can be described as opinion mining and social movement forecasting. Through sentiment analysis, mass cybersurveillance technologies can be deployed to detect potential terrorism and state conflict, predict protest and civil unrest, and gauge the mood of populations and subpopulations. Horizontal cybersurveillance through sentiment analysis has the likely result of chilling expressive and associational freedoms, while at the same time risking mass data seizures and searches. These programs, therefore, must be assessed as adversely impacting a combination …
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
William & Mary Bill of Rights Journal
In at least two recent cases, courts have rejected service providers’ capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular third-party litigant could not. In the situations presented by the recent cases, by …
The Fallacy Of A Colorblind Consent Search Doctrine, Beau C. Tremitiere
The Fallacy Of A Colorblind Consent Search Doctrine, Beau C. Tremitiere
Northwestern University Law Review
Most searches conducted by police officers are “consensual” and thus beyond the reach of the Fourth Amendment. However, such searches violate the Fourth Amendment when, under the totality of circumstances, consent appears to be a product of coercion—that is, when the consent was involuntary. In 1980, in Mendenhall v. United States, the Supreme Court identified race as a relevant factor courts should consider but failed to explain precisely why race was relevant. After decades of mistreatment and state-sanctioned violence, distrust of law enforcement was rampant in communities of color, and the Mendenhall Court correctly intuited (but failed to describe) the …
Does The End Justify The Means? The Clumsy And Circuitous Logic Of Blood Test Admissibility In Criminal Prosecutions In State V. Cormier, Kyle T. Macdonald
Does The End Justify The Means? The Clumsy And Circuitous Logic Of Blood Test Admissibility In Criminal Prosecutions In State V. Cormier, Kyle T. Macdonald
Maine Law Review
In State v. Cormier, the Maine Supreme Judicial Court, sitting as the Law Court, was asked to determine whether a Maine statute requiring law enforcement officers to test the blood of all drivers for intoxicants following a fatal motor vehicle collision violates the Fourth Amendment of the United States Constitution when the operation of the statute allows for the admission of those blood test results in a future criminal trial of the driver. In determining that the procedures of title 29-A, section 2522 of the Maine Revised Statutes are not violative of the Fourth Amendment, the Law Court effectively confirmed …
The Supreme Court's Long And Perhaps Unnecessary Struggle To Find A Standard Of Culpability To Regulate The Federal Exclusionary Remedy For Fourth/Fourteenth Amendment Violations, Melvyn H. Zarr
Maine Law Review
On January 14, 2009, the United States Supreme Court decided Herring v. United States. In Herring, the defendant moved to suppress evidence that he alleged was seized as a result of an arrest that violated the Fourth and Fourteenth Amendments to the U.S. Constitution. The Supreme Court approved the decision below to deny suppression of the evidence. The decision set off a flurry of speculation that the Fourth Amendment exclusionary rule would not see its 100th birthday in 2014. A headline in the New York Times of January 31 declared: “Supreme Court Edging Closer to Repeal of Evidence Ruling.” Another …
Reflections On Forty Years Of Private Practice And Sustained Pro Bono Advocacy, Stephen H. Oleskey
Reflections On Forty Years Of Private Practice And Sustained Pro Bono Advocacy, Stephen H. Oleskey
Maine Law Review
I am going to address two topics. The first is the one Judge Coffin asked me to address in October 2009, when I was invited to give the 2010 Coffin Lecture: how to combine the private practice of law with an active pro bono practice. The second topic is the one Dean Peter Pitegoff and I agreed to add: a brief discussion of legal developments in national security law since 9/11. My pro bono involvement in Guantanamo Habeas litigation began in 2004 and led directly to my interest in national security law and to my recognition of how difficult it …
Litigating Police Misconduct: Does The Litigation Process Matter? Does It Work?
Litigating Police Misconduct: Does The Litigation Process Matter? Does It Work?
Northwestern Journal of Law & Social Policy
No abstract provided.
Police In America: Ensuring Accountability And Mitigating Racial Bias Feat. Paul Butler
Police In America: Ensuring Accountability And Mitigating Racial Bias Feat. Paul Butler
Northwestern Journal of Law & Social Policy
No abstract provided.
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Oklahoma Journal of Law and Technology
No abstract provided.
The Quality Of Life: From Roe To Quinlan And Beyond, Joseph Cincotta
The Quality Of Life: From Roe To Quinlan And Beyond, Joseph Cincotta
The Catholic Lawyer
No abstract provided.
Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu
Briefs
No abstract provided.
Federal Habeas Review Of State Court Convictions: Incoherent Law But An Essential Right, Lynn Adelman
Federal Habeas Review Of State Court Convictions: Incoherent Law But An Essential Right, Lynn Adelman
Maine Law Review
I thank the editors of the Maine Law Review for the opportunity to participate in a discussion about the present state of post-conviction review of criminal convictions. This discussion is important and timely both because the quality of the procedures by which state prisoners can obtain post-conviction review varies greatly from state to state and because state prisoners who seek federal court review of their constitutional claims by petitioning for a writ of habeas corpus face many obstacles. As a federal district judge, my experience is primarily with the later problem. Thus, in this article, I will offer a few …
Brief Of The National Association For Public Defense As Amici Curiae Supporting Petitioner, Byrd V. U.S. (U.S. June 12, 2017) (No. 16- 1371)., Janet Moore
Faculty Articles and Other Publications
More than two centuries after it was ratified, the Fourth Amendment continues to protect the “right of the people to be secure” from “unreasonable searches.” U.S. Const. amend. IV. Modern technological advances and social developments do not render our rights “any less worthy of the protection for which the Founders fought.” Riley v. California, 134 S. Ct. 2473, 2494–95 (2014). This Court plays an essential role in ensuring that the Fourth Amendment retains its vitality as an indispensable safeguard of liberty, even as Americans dramatically change the ways they organize their everyday affairs. This case calls for the Court to …
Procedural Due Process Claims, Erwin Chemerinsky
Procedural Due Process Claims, Erwin Chemerinsky
Erwin Chemerinsky
No abstract provided.
Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum
Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum
Erwin Chemerinsky
No abstract provided.
Searching For Federal Judicial Power: Article Iii And The Foreign Intelligence Surveillance Court, Peter Margulies
Searching For Federal Judicial Power: Article Iii And The Foreign Intelligence Surveillance Court, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Find My Criminals: Fourth Amendment Implications Of The Universal Cell Phone "App" That Every Cell Phone User Has But No Criminal Wants, Christopher Joseph
Find My Criminals: Fourth Amendment Implications Of The Universal Cell Phone "App" That Every Cell Phone User Has But No Criminal Wants, Christopher Joseph
Barry Law Review
No abstract provided.
The Prevailing Culture Over Immigration: Centralized Immigration And Policies Between Attrition And Accommodation, Antonios Kouroutakis
The Prevailing Culture Over Immigration: Centralized Immigration And Policies Between Attrition And Accommodation, Antonios Kouroutakis
Seton Hall Circuit Review
No abstract provided.
Rethinking The Fourth Amendment In The Age Of Supercomputers, Artificial Intelligence, And Robots, Melanie Reid
Rethinking The Fourth Amendment In The Age Of Supercomputers, Artificial Intelligence, And Robots, Melanie Reid
West Virginia Law Review
In an era of diminishing privacy, the Internet of Things ("loT") has become a consensual and inadvertent tool that undermines privacy protection. The loT, really systems of networks connected to each other by the Internet or other radio-type device, creates consensual mass self-surveillance in such domains as fitness and the Fitbit, health care and heart monitors, "smart" houses and cars, and even "smart" cities. The multiple networks also have created a degree of interconnectivity that has opened up a fire hose of information for companies and governments alike, as well as making it virtually insuperable to live "off the grid" …
Drinking From The Fire Hose: How Massive Self-Surveillance From The Internet Of Things Is Changing The Face Of Privacy, Steven I. Friedland
Drinking From The Fire Hose: How Massive Self-Surveillance From The Internet Of Things Is Changing The Face Of Privacy, Steven I. Friedland
West Virginia Law Review
No abstract provided.
Supreme Court To Rule On Police Shooting Case: Excessive Force And Qualified Immunity, Natalie Lakosil
Supreme Court To Rule On Police Shooting Case: Excessive Force And Qualified Immunity, Natalie Lakosil
GGU Law Review Blog
Currently, a circuit split exists regarding the Ninth Circuit’s Provocation Rule. The deputies argue that Graham applies and that officers need to be free to make split‑second choices to respond to threats of force without stopping to replay their prior actions and evaluate whether someone might later accuse them of provoking the situation. Although this is true, some argue that officers should also be required to follow the Constitution in the first place and held liable if they cause the force to be used. The holding in Scott supports this type of analysis. While Graham allows for qualified immunity by …
Stubbornness Of Pretexts, Daniel B. Yeager
Stubbornness Of Pretexts, Daniel B. Yeager
Daniel B. Yeager
This Article will reflect on (1) how the Whren v. United States failure to acknowledge what counts as a pretext accounts for the residual confusion as to whether or not Whren really has killed off the pretext argument in constitutional criminal procedure, and (2) the extent to which the Court in Sullivan compounded that failure, which I hope to lightly correct here by distinguishing motives from intentions and then by elaborating the role that each plays, or at least should play, in Fourth Amendment jurisprudence.
Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager
Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager
Daniel B. Yeager
This Article rehearses a response to the problems posed to and by the Supreme Court's attempts to work out the meaning and operation of the word "search." After commencing Part II by meditating on the notion of privacy, I take up its relation to the antecedent suspicion or knowledge that Fourth-Amendment law requires as a justification for all privacy invasions. From there, I look specifically at that uneasy relation in Supreme Court jurisprudence, which has come to privilege privacy over property as a Fourth Amendment value. From there, Part III reviews the sources or bases that can tell us what …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Pricing The Fourth Amendment, Miriam H. Baer
Pricing The Fourth Amendment, Miriam H. Baer
William & Mary Law Review
Critics have long decried the Fourth Amendment’s lack of an adequate remedy to secure its compliance. Neither the exclusionary rule nor the threat of civil liability deters police misconduct, leaving scholars to cast about for alternative measures. The emphasis on penalties, however, overlooks a different problem: detection. Because of policing’s fast-paced nature, even so-called “flagrant” Fourth Amendment violations trigger insufficient liability due to low probabilities of detection.
This Article addresses this problem by drawing on the Pigouvian tax literature. The Pigouvian tax—sometimes referred to as a “corrective tax”—is a pricing instrument imposed by regulators in an amount equal to the …