Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (8)
- The Catholic University of America, Columbus School of Law (3)
- Brooklyn Law School (2)
- Fordham Law School (2)
- University of Miami Law School (2)
-
- American University Washington College of Law (1)
- Chicago-Kent College of Law (1)
- Duke Law (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Roger Williams University (1)
- UIC School of Law (1)
- University of Baltimore Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- William & Mary Law School (1)
- Keyword
-
- Privacy (16)
- Fourth amendment (8)
- Fourth Amendment (7)
- Search (7)
- Technology (4)
-
- Seizure (3)
- Bill of rights (2)
- Cell phone records (2)
- Cybersurveillance (2)
- Dataveillance (2)
- Drone (2)
- Enforcement (2)
- Expectation of privacy (2)
- Jardines (2)
- Search and seizure (2)
- Security (2)
- Surveillance (2)
- Uas (2)
- Uav (2)
- AML (1)
- Affirmation (1)
- Amendment (1)
- Anti-Money Laundering Legislation (1)
- Apple (1)
- Avatars (1)
- Big data (1)
- Biographic data (1)
- Biometric data (1)
- Body camera (1)
- CSLI (1)
- Publication
-
- Stephen E Henderson (6)
- Catholic University Journal of Law and Technology (3)
- Fordham Urban Law Journal (2)
- Margaret Hu (2)
- University of Miami Law Review (2)
-
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Chicago-Kent Law Review (1)
- Duke Law & Technology Review (1)
- Faculty Publications (1)
- Journal of Law and Policy (1)
- Law Faculty Scholarship (1)
- Northwestern University Law Review (1)
- Pace Law Review (1)
- School of Law Conferences, Lectures & Events (1)
- UIC John Marshall Journal of Information Technology & Privacy Law (1)
- University of Baltimore Law Review (1)
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Privacy Law
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Knowledge And Fourth Amendment Privacy, Matthew Tokson
Northwestern University Law Review
This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.
This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …
Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes
Cellphones And The Fourth Amendment: Why Cellphone Users Have A Reasonable Expectation Of Privacy In Their Location Information, Paul Cividanes
Journal of Law and Policy
The Fourth Amendment, which affords individuals protection from unreasonable searches and seizures, was ratified over two hundred years ago. As such, it was impossible for the Amendment’s framers to conceive the technologies that exist today. As technology progresses, courts are often faced with the task of deciding how the Fourth Amendment should apply in the modern world. As Fourth Amendment jurisprudence has developed, the Supreme Court has originated tests and doctrines for courts to use when hearing Fourth Amendment challenges to government action. One such test, the ‘reasonable expectation of privacy’ test, looks to see whether an individual has a …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen
Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen
Pace Law Review
Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
University of Miami Law Review
Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
University of Miami Law Review
In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.
If You Fly A Drone, So Can Police, Stephen E. Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
Stephen E Henderson
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
Catholic University Journal of Law and Technology
No abstract provided.
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Catholic University Journal of Law and Technology
No abstract provided.
Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa
Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa
Catholic University Journal of Law and Technology
No abstract provided.
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern
Faculty Publications
For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.
We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Unilateral Invasions Of Privacy, Roger Allan Ford
Unilateral Invasions Of Privacy, Roger Allan Ford
Law Faculty Scholarship
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …
Show Me The Warrant: Protection Of Stored Electronic Communications In New York State, Kaitlin G. Klamann
Show Me The Warrant: Protection Of Stored Electronic Communications In New York State, Kaitlin G. Klamann
Fordham Urban Law Journal
No abstract provided.
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
Crime, Surveillance, And Communities, Bennett Capers
Crime, Surveillance, And Communities, Bennett Capers
Fordham Urban Law Journal
We have become a surveillance state. Cameras—both those controlled by the state, and those installed by private entities—watch our every move, at least in public. For the most part, courts have deemed this public surveillance to be beyond the purview of the Fourth Amendment, meaning that it goes largely unregulated—a cause for alarm for many civil libertarians. This Article challenges these views and suggests that we must listen to communities in thinking about cameras and other surveillance technologies. For many communities, public surveillance not only has the benefit of deterring crime and aiding in the apprehension of criminals. It can …
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Margaret Hu
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Margaret Hu
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
Duty Of Candor In The Digital Age: The Need For Heightened Judicial Supervision Of Stingray Searches, Andrew Hemmer
Duty Of Candor In The Digital Age: The Need For Heightened Judicial Supervision Of Stingray Searches, Andrew Hemmer
Chicago-Kent Law Review
This Note explores the constitutional implications of the use of a device known as the “Stingray” in criminal investigations. This device masquerades as a cell phone tower and forces all cell phones within a considerable range to connect to it, transmitting data and allowing law enforcement to ascertain the location of each cell phone. The use of Stingrays raises important Fourth Amendment concerns that have been brought to light most significantly by the 2008 federal prosecution of Daniel Rigmaiden. This Note argues that Stingray use constitutes a Fourth Amendment search and that a new standard of warrant requirements is needed …
Riley V. California And The Stickiness Principle, Steven I. Friedland
Riley V. California And The Stickiness Principle, Steven I. Friedland
Duke Law & Technology Review
In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together by vocabulary and fact, creating a ‘Stickiness Principle.’ In particular, form and function historically were considered indistinguishable, not as separate factors. For example, “containers” carried things, “watches” told time, and “phones” were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle. In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question …
Rfid Implementation: Testing In Prisons And Parolees For The Greater Good, 33 J. Marshall J. Info. Tech. & Privacy L. 22 (2016), Mirko Akrap
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin
University of Baltimore Law Review
In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …
The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios
The Sixth Pillar Of Anti-Money Laundering Compliance: Balancing Effective Enforcement With Financial Privacy, Maria A. De Dios
Brooklyn Journal of Corporate, Financial & Commercial Law
The U.S. government has responded to the increase of financial crimes, including money laundering and terrorist financing, by requiring that financial institutions implement anti-money laundering compliance programs within their institutions. Most recently, the Financial Crimes Enforcement Network exercised its regulatory powers, as authorized by the Treasury Department, by proposing regulations that now explicitly add customer due diligence to the preexisting anti-money laundering regime. The policy behind the government’s legislative and regulatory measures is clear—financial institutions must ensure that they are protected from and not aiding in the illegal efforts of criminals. The complexity and insidiousness of these financial crimes makes …
Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris
Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris
Articles
In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson
Stephen E Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson