Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Fourth Amendment

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Bits And Bytes: The Carnivore Initiative And The Search And Seizure Of Electronic Mail, Sandy D. Hellums Apr 2002

Bits And Bytes: The Carnivore Initiative And The Search And Seizure Of Electronic Mail, Sandy D. Hellums

William & Mary Bill of Rights Journal

This Note examines the application of Fourth Amendment search and seizure doctrines to the interception of electronic mail within the context of the FBI Carnivore initiative. The author argues that the traditional law of electronic surveillance's understanding of communication is outdated and never contemplated new technologies like Carnivore and their far reaching implications. Consequently, the author argues, that to protect our long-understood expectations of privacy, the search and seizure of electronic documents should be analyzed under the traditional papers analysis. To do so, the Supreme Court would afford the interception electronic documents the highest form of constitutional protect available under …