Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Australia (1)
- Bennett (1)
- Bush administration (1)
- Court jurisdiction (1)
- Court supervisory power (1)
-
- Criminal cases (1)
- Due process principles (1)
- Exclusionary remedy (1)
- Extradition Treaty (1)
- Federal criminal justice system (1)
- Fourth Amendenment exclusionary rule (1)
- Governmental conduct (1)
- Judicial integrity (1)
- NSA (1)
- National Security Agency (1)
- New Zealand (1)
- Terrorism (1)
- U.S. v. Alvarez-Machain (1)
- Warrantless electronic surveillance (1)
Articles 1 - 2 of 2
Full-Text Articles in Legislation
Judicial Integrity: A Call For Its Re-Emergence In The Adjudication Of Criminal Cases, Robert M. Bloom
Judicial Integrity: A Call For Its Re-Emergence In The Adjudication Of Criminal Cases, Robert M. Bloom
Robert M. Bloom
A court can invalidate or rectify certain kinds of offensive official action on the grounds of judicial integrity. In the past, it has served as a check on overzealous law enforcement agents whose actions so seriously impaired due process principles that they shocked the bench’s conscience. The principle not only preserves the judiciary as a symbol of lawfulness and justice, but it also insulates the courts from becoming aligned with illegal actors and their bad acts. The 1992 case of U.S. v. Alvarez-Machain, however, may have signaled a departure from past practices. This article reviews current Supreme Court cases and …
The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn
The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn
Robert M. Bloom
In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …