Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

2016

Institution
Keyword
Publication
Publication Type

Articles 1 - 28 of 28

Full-Text Articles in Privacy Law

Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes Dec 2016

Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes

Journal of Law and Policy

The Fourth Amendment, which affords individuals protection from unreasonable searches and seizures, was ratified over two hundred years ago. As such, it was impossible for the Amendment’s framers to conceive the technologies that exist today. As technology progresses, courts are often faced with the task of deciding how the Fourth Amendment should apply in the modern world. As Fourth Amendment jurisprudence has developed, the Supreme Court has originated tests and doctrines for courts to use when hearing Fourth Amendment challenges to government action. One such test, the ‘reasonable expectation of privacy’ test, looks to see whether an individual has a …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen Aug 2016

Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen

Pace Law Review

Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


If You Fly A Drone, So Can Police, Stephen E. Henderson May 2016

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton May 2016

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal May 2016

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa May 2016

Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa

Catholic University Journal of Law and Technology

No abstract provided.


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern May 2016

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

Faculty Publications

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Unilateral Invasions Of Privacy, Roger Allan Ford Apr 2016

Unilateral Invasions Of Privacy, Roger Allan Ford

Law Faculty Scholarship

Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …


Show Me The Warrant: Protection Of Stored Electronic Communications In New York State, Kaitlin G. Klamann Mar 2016

Show Me The Warrant: Protection Of Stored Electronic Communications In New York State, Kaitlin G. Klamann

Fordham Urban Law Journal

No abstract provided.


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


Crime, Surveillance, And Communities, Bennett Capers Mar 2016

Crime, Surveillance, And Communities, Bennett Capers

Fordham Urban Law Journal

We have become a surveillance state. Cameras—both those controlled by the state, and those installed by private entities—watch our every move, at least in public. For the most part, courts have deemed this public surveillance to be beyond the purview of the Fourth Amendment, meaning that it goes largely unregulated—a cause for alarm for many civil libertarians. This Article challenges these views and suggests that we must listen to communities in thinking about cameras and other surveillance technologies. For many communities, public surveillance not only has the benefit of deterring crime and aiding in the apprehension of criminals. It can …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Taxonomy Of The Snowden Disclosures, Margaret Hu Feb 2016

Taxonomy Of The Snowden Disclosures, Margaret Hu

Margaret Hu

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Duty Of Candor In The Digital Age: The Need For Heightened Judicial Supervision Of Stingray Searches, Andrew Hemmer Jan 2016

Duty Of Candor In The Digital Age: The Need For Heightened Judicial Supervision Of Stingray Searches, Andrew Hemmer

Chicago-Kent Law Review

This Note explores the constitutional implications of the use of a device known as the “Stingray” in criminal investigations. This device masquerades as a cell phone tower and forces all cell phones within a considerable range to connect to it, transmitting data and allowing law enforcement to ascertain the location of each cell phone. The use of Stingrays raises important Fourth Amendment concerns that have been brought to light most significantly by the 2008 federal prosecution of Daniel Rigmaiden. This Note argues that Stingray use constitutes a Fourth Amendment search and that a new standard of warrant requirements is needed …


Riley V. California And The Stickiness Principle, Steven I. Friedland Jan 2016

Riley V. California And The Stickiness Principle, Steven I. Friedland

Duke Law & Technology Review

In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together by vocabulary and fact, creating a ‘Stickiness Principle.’ In particular, form and function historically were considered indistinguishable, not as separate factors. For example, “containers” carried things, “watches” told time, and “phones” were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle. In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question …


Rfid Implementation: Testing In Prisons And Parolees For The Greater Good, 33 J. Marshall J. Info. Tech. & Privacy L. 22 (2016), Mirko Akrap Jan 2016

Rfid Implementation: Testing In Prisons And Parolees For The Greater Good, 33 J. Marshall J. Info. Tech. & Privacy L. 22 (2016), Mirko Akrap

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin Jan 2016

Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin

University of Baltimore Law Review

In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson Jan 2016

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …


The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios Jan 2016

The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios

Brooklyn Journal of Corporate, Financial & Commercial Law

The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson Dec 2015

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson

Stephen E Henderson

What is the constitutional significance of the proverbial “keep off the grass” sign?  This question—asked by curmudgeonly neighbors everywhere—has been given new currency in a recent decision by the United States Supreme Court.  Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections.  By expressing expectations regarding—and control over—access to property, “the people” may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects.  This article launches a constitutionally grounded, but lighthearted campaign of citizen education and empowerment: Fourth Amendment LAWn signs.  With every …


A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson Dec 2015

A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson

Stephen E Henderson

In Other People’s Papers, Jane Bambauer argues for careful reform of the Fourth Amendment’s third party doctrine, providing an important contribution to an increasingly rich field of scholarship, judicial opinion, statute, and law reform.  Bambauer is especially concerned with access to bodies of third-party data that can be filtered and mined, as they can be privacy invasive but also effective and less subject to traditional investigative prejudices and limitations.  Although her article provocatively overclaims in trying to set itself apart from existing proposals, by analyzing existing constitutional and statutory law—including what I have termed a “limited” third party doctrine—and comparing …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …