Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- File Type
Articles 1 - 15 of 15
Full-Text Articles in Law
Random, Suspicionless Searches Of Students' Belongings: A Legal, Empirical, And Normative Analysis, Jason P. Nance
Random, Suspicionless Searches Of Students' Belongings: A Legal, Empirical, And Normative Analysis, Jason P. Nance
Jason P. Nance
This Article provides a legal, empirical, and normative analysis of an intrusive search practice used by schools officials to prevent school crime: random, suspicionless searches of students’ belongings. First, it argues that these searches are not permitted under the Fourth Amendment unless schools have particularized evidence of a weapons or substance problem in their schools. Second, it provides normative considerations against implementing strict security measures in schools, especially when they are applied disproportionately on minority students. Third, drawing on recent restricted data from the U.S. Department of Education’s School Survey on Crime and Safety, it provides empirical findings that raise …
Students, Security, And Race, Jason P. Nance
Students, Security, And Race, Jason P. Nance
Jason P. Nance
In the wake of the terrible shootings in Newtown, Connecticut, our nation has turned its attention to school security. For example, several states have passed or are considering passing legislation that will provide new funding to schools for security equipment and law enforcement officers. Strict security measures in schools are certainly not new. In response to prior acts of school violence, many public schools for years have relied on metal detectors, random sweeps, locked gates, surveillance cameras, and law enforcement officers to promote school safety. Before policymakers and school officials invest more money in strict security measures, this Article provides …
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Martin A. Schwartz
No abstract provided.
Section 1983 Civil Rights Litigation From The October 2006 Term, Martin Schwartz
Section 1983 Civil Rights Litigation From The October 2006 Term, Martin Schwartz
Martin A. Schwartz
No abstract provided.
Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik
Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik
Amanda C Pustilnik
The rapid development of neurotechnologies poses novel constitutional issues for criminal law and criminal procedure. These technologies can identify directly from brain waves whether a person is familiar with a stimulus like a face or a weapon, can model blood flow in the brain to indicate whether a person is lying, and can even interfere with brain processes themselves via high-powered magnets to cause a person to be less likely to lie to an investigator. These technologies implicate the constitutional privilege against compelled, self-incriminating speech under the Fifth Amendment and the right to be free of unreasonable search and seizure …
You Booze, You Bruise, You Lose: Analyzing The Constitutionality Of Florida’S Involuntary Blood Draw Statute In The Wake Of Missouri V. Mcneely, Francisco D. Zornosa
You Booze, You Bruise, You Lose: Analyzing The Constitutionality Of Florida’S Involuntary Blood Draw Statute In The Wake Of Missouri V. Mcneely, Francisco D. Zornosa
Francisco D Zornosa
No abstract provided.
Binary Searches And The Central Meaning Of The Fourth Amendment, Lawrence Rosenthal
Binary Searches And The Central Meaning Of The Fourth Amendment, Lawrence Rosenthal
Lawrence Rosenthal
Fourth Amendment jurisprudence is frequently accused of doctrinal incoherence. A primary reason is the persistence of two competing conceptions of “unreasonable” search and seizure. The first is libertarian in character; it understands the Fourth Amendment’s command of reasonableness as establishing a constitutional boundary on investigative powers. On this view, the prohibition on unreasonable search and seizure keeps society free by limiting the government’s investigative reach. The second conception understands the Fourth Amendment's prohibition as freedom against unjustified government intrusion. This conception of reasonableness is essentially pragmatic in character, balancing liberty and law-enforcement interests.
This article interrogates these competing conceptions by …
Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind
Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind
Tonja Jacobi
It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …
Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening
Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening
Eric J Struening
Leaks have revealed that the use of personal technology such as cell phones and e-mail plays a large part in how the government obtains national security information. However, it is still an open question of how far the protection of the Fourth Amendment provides an individual against government intrusion in that type of technology. This article examines how the Fourth Amendment applies to the real-time tracking of national security targets through technology. I argue that a non-physical, short-term, warrantless, real-time trace of an individual’s location for national security purposes will not infringe the prohibition against unreasonable searches and seizures. As …
Whose Metadata Is It Anyways? Why Riley V. California Illustrates That The National Security Administration's Bulk Data Collection Is A Fourth Amendment Problem, Jesse S. Weinstein
Whose Metadata Is It Anyways? Why Riley V. California Illustrates That The National Security Administration's Bulk Data Collection Is A Fourth Amendment Problem, Jesse S. Weinstein
Jesse S Weinstein
No abstract provided.
Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean
Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean
Adam Lamparello
The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Adam Lamparello
Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Charles E. MacLean
The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”
This article calls upon Congress, and to a lesser extent, state legislatures, to control that …
The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.
The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.
Albert E Poirier Jr.
The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.
The "Not A Search" Game, John F. Stinneford