Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Constitutional Law

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 113

Full-Text Articles in Fourth Amendment

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson Apr 2024

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson

Pepperdine Law Review

The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …


The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo May 2023

Asking For It: Gendered Dimensions Of Surveillance Capitalism, Jessica Rizzo

Emancipations: A Journal of Critical Social Analysis

Advertising and privacy were once seen as mutually antagonistic. In the 1950s and 1960s, Americans went to court to fight for their right to be free from the invasion of privacy presented by unwanted advertising, but a strange realignment took place in the 1970s. Radical feminists were among those who were extremely concerned about the collection and computerization of personal data—they worried about private enterprise getting a hold of that data and using it to target women—but liberal feminists went in a different direction, making friends with advertising because they saw it as strategically valuable.

Liberal feminists argued that in …


Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones Apr 2023

Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones

Honors Projects

DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.


Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson Jan 2023

Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson

Seattle University Law Review

Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.


Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf Jan 2022

Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf

Faculty Scholarship

When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?

The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …


Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti Jan 2022

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti

Articles by Maurer Faculty

The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.

Such an approach presupposes that property law is not itself circular. If …


Perils Of The Reverse Silver Platter Under U.S. Border Patrol Operations, D. Anthony Jun 2021

Perils Of The Reverse Silver Platter Under U.S. Border Patrol Operations, D. Anthony

University of Massachusetts Law Review

In the face of expanding U.S. Border Patrol operations across the country, that agency often acquires evidence during its searches that is unrelated to immigration or other federal crimes but may involve state crimes. States are then faced with the question of whether to accept such evidence for state prosecutions when it was lawfully obtained by federal agents consistent with federal law but in violation of the state’s own search and seizure provisions. Sometimes referred to as “reverse silver platter” evidence, states have come to widely varying conclusions as to the admissibility of federally obtained evidence that would clearly have …


Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez Apr 2021

Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez

St. Mary's Law Journal

Abstract forthcoming.


Revising Reasonableness In The Cloud, Ian Walsh Mar 2021

Revising Reasonableness In The Cloud, Ian Walsh

Washington Law Review

Save everything—just in case––and search for it later. This is a modern mantra fueled by the ubiquity of smartphones, laptops, tablets, and free or low-cost data storage that leads users to store massive amounts of data in the cloud. But when users trust third-party cloud storage providers with private communications, they also surrender Fourth Amendment constitutional certainty. Existing statutory safeguards for these communications are lower than Fourth Amendment warrant and probable cause standards; this permits the government to seize large quantities of users’ private communications stored in the cloud with only minimal justification. Due to the revealing nature of such …


The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn Dec 2020

The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn

Arkansas Law Review

Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez Jan 2020

A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez

Touro Law Review

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


United States V. Touset, Katelyn James Jan 2020

United States V. Touset, Katelyn James

NYLS Law Review

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern Sep 2019

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

James Y. Stern

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr Feb 2019

When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr

Seattle University Law Review

This Note will argue that all jurisdictions should follow the Washington State Court of Appeals, Division II in validating makeshift dwellings used by people experiencing homelessness as spaces protected from unwarranted police intrusions by shifting evaluations of “reasonable expectations of privacy” to a more equitable standard that appreciates the realities of economic disparity. This approach to constitutional protections against unreasonable searches and seizures is imperative to protect the rights of people experiencing homelessness, given that such individuals are regularly subjected to invasions of privacy and heightened exposure to the criminal justice system.


Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue Jan 2019

Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …


Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller Nov 2018

Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller

Loyola of Los Angeles Law Review

During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.

Although …


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson Dec 2017

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

Stephen E Henderson

We finally have a federal ‘test case.’  In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age.  The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher.  This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious. 
 
As for ambition, the …


Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez Dec 2017

Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez

Stephen E Henderson

In Birchfield v. North Dakota (2016), the Supreme Court broke new Fourth Amendment ground by establishing that law enforcement’s collection of information can be cause for “anxiety,” meriting constitutional protection, even if subsequent uses of the information are tightly restricted.  This change is significant.  While the Court has long recognized the reality that police cannot always be trusted to follow constitutional rules, Birchfield changes how that concern is implemented in Fourth Amendment law, and importantly, in a manner that acknowledges the new realities of data-driven policing.
 
Beyond offering a careful reading of Birchfield, this Article has two goals. …


Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson Dec 2017

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

William & Mary Bill of Rights Journal

We finally have a federal ‘test case.’ In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age. The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher. This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious.

As for ambition, the Court …


The Fourth Amendment Disclosure Doctrines, Monu Bedi Dec 2017

The Fourth Amendment Disclosure Doctrines, Monu Bedi

William & Mary Bill of Rights Journal

The third party and public disclosure doctrines (together the “disclosure doctrines”) are long-standing hurdles to Fourth Amendment protection. These doctrines have become increasingly relevant to assessing the government’s use of recent technologies such as data mining, drone surveillance, and cell site location data. It is surprising then that both the Supreme Court and scholars, at times, have associated them together as expressing one principle. It turns out that each relies on unique foundational triggers and does not stand or fall with the other. This Article tackles this issue and provides a comprehensive topology for analyzing the respective contours of each …


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu Aug 2017

Brief Of Scholars Of The History And Original Meaning Of The Fourth Amendment As Amici Curiae In Support Of Petitioner, Margaret Hu

Briefs

No abstract provided.


Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman Feb 2017

Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman

Northwestern University Law Review

In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.