Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Fourth Amendment

Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell Oct 2021

Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell

St. Mary's Law Journal

Abstract forthcoming.


Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez Apr 2021

Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez

St. Mary's Law Journal

Abstract forthcoming.


Preservation Requests And The Fourth Amendment, Armin Tadayon Oct 2020

Preservation Requests And The Fourth Amendment, Armin Tadayon

Seattle University Law Review

Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell Jan 2017

First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell

St. Mary's Law Journal

Abstract forthcoming.


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii Jan 2016

Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii

Brooklyn Law Review

On April 4, 2015, Walter L. Scott was driving his vehicle when he was stopped by Officer Michael T. Slager of the North Charleston, South Carolina, police department for a broken taillight. A dash cam video from the officer’s vehicle showed the two men engaged in what appeared to be a rather routine verbal exchange. Sometime after Slager returned to his vehicle, Scott exited his car and ran away from Slager, prompting the officer to pursue him on foot. After he caught up with Scott in a grassy field near a muffler establishment, a scuffle between the men ensued, purportedly …


Whren's Flawed Assumptions Regarding Race, History, And Unconscious Bias, William M. Carter Jr. Jan 2016

Whren's Flawed Assumptions Regarding Race, History, And Unconscious Bias, William M. Carter Jr.

Articles

This article is adapted from remarks presented at CWRU Law School's symposium marking the 20th anniversary of Whren v. United States. The article critiques Whren’s constitutional methodology and evident willful blindness to issues of social psychology, unconscious bias, and the lengthy American history of racialized conceptions of crime and criminalized conceptions of race. The article concludes by suggesting a possible path forward: reconceptualizing racially motivated pretextual police encounters as a badge or incident of slavery under the Thirteenth Amendment issue rather than as abstract Fourth or Fourteenth Amendment issues.


Fourth Amendment Implications Of Police-Worn Body Cameras, Erik Nielsen Jan 2016

Fourth Amendment Implications Of Police-Worn Body Cameras, Erik Nielsen

St. Mary's Law Journal

Abstract forthcoming.


Filming The Police: An Interference Or A Public Service, Aracely Rodman Jan 2016

Filming The Police: An Interference Or A Public Service, Aracely Rodman

St. Mary's Law Journal

Abstract forthcoming.


Notes On Borrowing And Convergence, Robert Tsai, Nelson Tebbe Jan 2011

Notes On Borrowing And Convergence, Robert Tsai, Nelson Tebbe

Articles in Law Reviews & Other Academic Journals

his is a response to Jennifer E. Laurin, "Trawling for Herring: Lessons in Doctrinal Borrowing and Convergence," 111 Colum. L. Rev. 670 (2011), which analyzes the Supreme Court's resort to tort-based concepts to limit the reach of the Fourth Amendment's exclusionary rule. We press three points. First, there are differences between a general and specific critique of constitutional borrowing. Second, the idea of convergence as a distinct phenomenon from borrowing has explanatory potential and should be further explored. Third, to the extent convergence occurs, it matters whether concerns of judicial administration or political reconstruction are driving doctrinal changes.


Replacing The Exclusionary Rule: Fourth Amendment Violations As Direct Criminal Contempt, Ronald J. Rychlak Dec 2009

Replacing The Exclusionary Rule: Fourth Amendment Violations As Direct Criminal Contempt, Ronald J. Rychlak

Chicago-Kent Law Review

The exclusionary rule, which bars from admission evidence obtained in violation of the Fourth Amendment's prohibition of unreasonable searches and seizures, is a bedrock of American law. It is highly controversial, but there seems to be no equally effective way to protect citizens' rights. This paper proposes that an admissibility standard be adopted that is in keeping with virtually every jurisdiction around the world other than the United States. Thus, before ruling evidence inadmissible, the court would consider the level of the constitutional violation, the seriousness of the crime, whether the violation casts substantial doubt on the reliability of the …