Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Fourth Amendment

Confessions, Criminals, And Community, Sheri Lynn Johnson Dec 2014

Confessions, Criminals, And Community, Sheri Lynn Johnson

Sheri Lynn Johnson

No abstract provided.


Punitive Injunctions, Nirej S. Sekhon Oct 2014

Punitive Injunctions, Nirej S. Sekhon

Nirej Sekhon

No abstract provided.


Impeachment Exception To The Exclusionary Rules: Policies, Principles, And Politics, The , James L. Kainen Aug 2014

Impeachment Exception To The Exclusionary Rules: Policies, Principles, And Politics, The , James L. Kainen

James L. Kainen

The exclusionary evidence rules derived from the Fourth, Fifth, and Sixth Amendments continue to play an important role in constitutional criminal procedure, despite the intense controversy that surrounds them. The primary justification for these rules has shifted from an "imperative of judicial integrity" to the "deterrence of police conduct that violates... [constitutional] rights." Regardless of the justification it uses for the rules' existence, the Supreme Court continues to limit their breadth "at the margin," when "the acknowledged costs to other values vital to a rational system of criminal justice" outweigh the deterrent effects of exclusion. The most notable limitation on …


Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles Maclean Jan 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


The Constitutional Theory Of The Fourth Amendment, Gerard V. Bradley Oct 2013

The Constitutional Theory Of The Fourth Amendment, Gerard V. Bradley

Gerard V. Bradley

No abstract provided.


How The British Gun Control Program Precipitated The American Revolution, David B. Kopel Jan 2012

How The British Gun Control Program Precipitated The American Revolution, David B. Kopel

David B Kopel

Abstract: This Article chronologically reviews the British gun control which precipitated the American Revolution: the 1774 import ban on firearms and gun powder; the 1774-75 confiscations of firearms and gun powder, from individuals and from local governments; and the use of violence to effectuate the confiscations. It was these events which changed a situation of rising political tension into a shooting war. Each of these British abuses provides insights into the scope of the modern Second Amendment.

From the events of 1774-75, we can discern that import restrictions or bans on firearms or ammunition are constitutionally suspect — at least …