Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (28)
- Criminal Procedure (23)
- Constitutional Law (20)
- Science and Technology Law (18)
- Law Enforcement and Corrections (7)
-
- Computer Law (5)
- Criminal Law (5)
- National Security Law (5)
- Internet Law (4)
- First Amendment (3)
- Law and Society (3)
- Supreme Court of the United States (3)
- Transportation Law (3)
- Civil Rights and Discrimination (2)
- Evidence (2)
- Legislation (2)
- Public Law and Legal Theory (2)
- Air and Space Law (1)
- Arts and Humanities (1)
- Consumer Protection Law (1)
- Ethics and Political Philosophy (1)
- Fourteenth Amendment (1)
- Judges (1)
- Jurisprudence (1)
- Land Use Law (1)
- Legal Remedies (1)
- Philosophy (1)
- Property Law and Real Estate (1)
- Institution
- Publication Year
- Publication
- Publication Type
- File Type
Articles 1 - 30 of 33
Full-Text Articles in Privacy Law
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango
Catholic University Law Review
Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.
Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …
Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone
St. Mary's Law Journal
Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …
Striking The Balance: Search Warrants And Encryption Protected Smartphones, Nicholas A. Oliva
Striking The Balance: Search Warrants And Encryption Protected Smartphones, Nicholas A. Oliva
Journal of Civil Rights and Economic Development
(Excerpt)
This note’s analysis of searches of encrypted cell phone will be broken down into in three parts. Part I of this note provides context for the balance between individual privacy and law enforcement by reviewing general Fourth Amendment principles and then Supreme Court rulings that apply these principles to cell phones. Part II then details the advancements in cell phone technology, specifically encryption. These new technologies render the data on cell phones inaccessible and lead law enforcement to go beyond search warrants and seek special orders pursuant to the All Writs Act. Part II provides an overview of the …
Katz V. United States: Back To The Future?, Michael Vitiello
Katz V. United States: Back To The Future?, Michael Vitiello
University of Richmond Law Review
No abstract provided.
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Stephen E Henderson
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
Pepperdine Law Review
Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …
Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson
Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
Duty Of Candor In The Digital Age: The Need For Heightened Judicial Supervision Of Stingray Searches, Andrew Hemmer
Duty Of Candor In The Digital Age: The Need For Heightened Judicial Supervision Of Stingray Searches, Andrew Hemmer
Chicago-Kent Law Review
This Note explores the constitutional implications of the use of a device known as the “Stingray” in criminal investigations. This device masquerades as a cell phone tower and forces all cell phones within a considerable range to connect to it, transmitting data and allowing law enforcement to ascertain the location of each cell phone. The use of Stingrays raises important Fourth Amendment concerns that have been brought to light most significantly by the 2008 federal prosecution of Daniel Rigmaiden. This Note argues that Stingray use constitutes a Fourth Amendment search and that a new standard of warrant requirements is needed …
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
What is the constitutional significance of the proverbial "keep off the grass" sign? This question — asked by curmudgeonly neighbors everywhere — has been given new currency in a recent decision by the United States Supreme Court. Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections. By expressing expectations regarding — and control over — access to property, "the people" may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects. This article launches a constitutionally grounded, but lighthearted campaign of citizen education …
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie
Articles, Book Chapters, & Popular Press
Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson
Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson
Stephen E Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson
Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan
Coming To A Car Dealership Near You: Standardizing Event Data Recorder Technology Use In Automobiles, Kara Ryan
Chicago-Kent Law Review
Event Data Recorders are receiving more attention as owners of automobiles have begun to realize that their driving histories are recorded. Event Data Recorders are the “black boxes” in automobiles that are installed in the vast majority of vehicles currently on the road. In the majority of states, the restrictions on what information can be retrieved from Event Data Recorders and used by police officers, advertising firms, and insurance companies remains a gray area. State laws governing Event Data Recorder technology greatly fluctuates by jurisdiction. If Event Data Recorder information falls into the wrong hands, the possession of the data …
Reviving The Privacy Protection Act Of 1980, Elizabeth B. Uzelac
Reviving The Privacy Protection Act Of 1980, Elizabeth B. Uzelac
Northwestern University Law Review
The federal privacy legislative scheme is composed of a fragmented patchwork of aging sector-specific statutes—many enacted prior to the advent of the home computer—that supplement the Fourth Amendment to regulate government access to information. The Privacy Protection Act of 1980 is one such statute, though few understand or utilize its protections. The Act prohibits law enforcement officials from searching for or seizing information from people who disseminate information to the public, such as reporters. Where it applies, the Act requires law enforcement officials to instead rely on compliance with a subpoena or the target’s voluntary cooperation to gain access to …
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Stephen E Henderson
The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale
Faculty Scholarship
Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?
Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Stephen E Henderson
"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …
Reforming The Grand Jury To Protect Privacy In Third Party Records, Stephen E. Henderson, Andrew E. Taslitz
Reforming The Grand Jury To Protect Privacy In Third Party Records, Stephen E. Henderson, Andrew E. Taslitz
Stephen E Henderson
In late 2014, two grand juries returned controversial no bill decisions in police killings, one in Ferguson, Missouri, and one in New York City. These outcomes have renewed calls for grand jury reform, and whatever one thinks of these particular processes and outcomes, such reform is long overdue. One logical source of reform to better respect privacy in records, which would have incidental benefits beyond this privacy focus, would be the newly enacted American Bar Association Standards for Criminal Justice on Law Enforcement Access to Third Party Records (LEATPR).
But LEATPR exempts from its requirements access to records via a …
Survey Of Washington Search And Seizure Law: 2013 Update, Justice Charles W. Johnson, Justice Debra L. Stephens
Survey Of Washington Search And Seizure Law: 2013 Update, Justice Charles W. Johnson, Justice Debra L. Stephens
Seattle University Law Review
This survey is intended to serve as a resource to which Washington lawyers, judges, law enforcement officers, and others can turn as an authoritative starting point for researching Washington search and seizure law. In order to be useful as a research tool, this Survey requires periodic updates to address new cases interpreting the Washington constitution and the U.S. Constitution and to reflect the current state of the law. Many of these cases involve the Washington State Supreme Court’s interpretation of the Washington constitution. Also, as the U.S. Supreme Court has continued to examine Fourth Amendment search and seizure jurisprudence, its …
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
The Davis Good Faith Rule And Getting Answers To The Questions Jones Left Open, Susan Freiwald
Susan Freiwald
The Supreme Court’s decision in United States v. Jones clearly established that use of GPS tracking surveillance constitutes a search under the Fourth Amendment. But the Court left many other questions unanswered about the nature and scope of the constitutional privacy right in location data. A review of lower court decisions in the wake of Jones reveals that, rather than begin to answer the questions that Jones left open, courts are largely avoiding substantive Fourth Amendment analysis of location data privacy. Instead, they are finding that officers who engaged in GPS tracking and related surveillance operated in good faith, based …
American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson
American Bar Association Criminal Justice Standards On Law Enforcement Access To Third Party Records, Stephen E. Henderson
Stephen E Henderson
Search, Seizure, And Immunity: Second-Order Normative Authority And Rights, Stephen E. Henderson, Kelly Sorensen
Search, Seizure, And Immunity: Second-Order Normative Authority And Rights, Stephen E. Henderson, Kelly Sorensen
Stephen E Henderson
A paradigmatic aspect of a paradigmatic kind of right is that the rights holder is the only one who can alienate it. When individuals waive rights, the normative source of that waiving is normally taken to be the individual herself. This moral feature—immunity—is usually in the background of discussions about rights. We bring it into the foreground here, with specific attention to a recent U.S. Supreme Court decision, Kentucky v. King (2011), concerning search and seizure rights. An entailment of the Court’s decision is that, at least in some cases, a right can be removed by the intentional actions of …
Real-Time And Historic Location Surveillance After United States V. Jones: An Administrable, Mildly Mosaic Approach, Stephen E. Henderson
Real-Time And Historic Location Surveillance After United States V. Jones: An Administrable, Mildly Mosaic Approach, Stephen E. Henderson
Stephen E Henderson
In United States v. Jones, the government took an extreme position: so far as the federal Constitution is concerned, law enforcement can surreptitiously electronically track the movements of any American over the course of an entire month without cause or restraint. According to the government, whether the surveillance be for good reason, invidious reason, or no reason, the Fourth Amendment is not implicated. Fortunately, that position was unanimously rejected by the High Court. The Court did not, however, resolve what restriction or restraint the Fourth Amendment places upon location surveillance, reflecting a proper judicial restraint in this nuanced and difficult …
After United States V. Jones, After The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
After United States V. Jones, After The Fourth Amendment Third Party Doctrine, Stephen E. Henderson
Stephen E Henderson
In United States v. Jones, the Supreme Court unanimously rejected the proposition that the Government can surreptitiously electronically track vehicle location for an entire month without Fourth Amendment restraint. While the Court's three opinions leave much uncertain, in one perspective they fit nicely within a long string of cases in which the Court is cautiously developing new standards of Fourth Amendment protection, including a rejection of a strong third party doctrine. This Article develops that perspective and provides a cautiously optimistic view of where search and seizure protections may be headed.
More detail:
United States v. Jones, in which the …
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
Stephen E Henderson
This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …
Electronic Evidence In Canada, Robert Currie, Steve Coughlan
Electronic Evidence In Canada, Robert Currie, Steve Coughlan
Articles, Book Chapters, & Popular Press
This chapter discusses the issues surrounding electronic evidence in Canada. Topics discussed include the best evidence rule, electronic signatures, web-based evidence, and video-tape and security camera evidence. In addition rules around protection of privacy, discovery, and confidentiality are pursued. Finally the chapter also considers the many issues which arise around gathering electronic evidence in the criminal context, including wiretaps, general warrants, and searches of computers and cell phones.