Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello Oct 2014

The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello

Adam Lamparello

Technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world. The original purposes of the First Amendment, which from time immemorial have protected civil liberties and preserved the free, open, and robust exchange of information, support net neutrality. After all, laws or practices that violate cherished freedoms in the physical world also violate those freedoms in the virtual world. The battle over net neutrality is “is absolutely the First Amendment issue of our time,” just as warrantless searches of cell phones were …


The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland Sep 2014

The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland

Steven I. Friedland

In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together in judicial decisions, creating a Stickiness Principle. In particular, form and function historically were viewed as an identity, not a dichotomy. For example, containers carried things, watches told time, and telephones were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle.

In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question …


Hall V. Florida: The Death Of Georgia’S Beyond A Reasonable Doubt Standard, Adam Lamparello Sep 2014

Hall V. Florida: The Death Of Georgia’S Beyond A Reasonable Doubt Standard, Adam Lamparello

Adam Lamparello

No abstract provided.


Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean Jul 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in digital devices no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking exclusively about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello Jul 2014

Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Reflections On An Extraordinary Career: Thoughts About Jerry Caplan's Retirement, Michael Vitiello Mar 2014

Reflections On An Extraordinary Career: Thoughts About Jerry Caplan's Retirement, Michael Vitiello

Michael Vitiello

Reflections on an Extraordinary Career: Thoughts about Gerald Caplan’s Retirement Abstract: The occasion for this essay is the retirement of my colleague Gerald Caplan. But this is not a sentimental account of a friend’s career. Instead, I take the opportunity of Jerry’s retirement to reflect on the role of a thoughtful principled conservative as a Washington insider and as an academic. The essay explores three areas of Jerry’s distinguished career: the first is a discussion of his role in saving the Legal Services Corporation when it was under attack from the right wing, within and without the Reagan Administration. The …


Unreasonable Doubt: Warren Hill, Aedpa, And Georgia’S Unconstitutional Burden Of Proof, Adam Lamparello Mar 2014

Unreasonable Doubt: Warren Hill, Aedpa, And Georgia’S Unconstitutional Burden Of Proof, Adam Lamparello

Adam Lamparello

No abstract provided.


The Scarlet Letter: Why Courts’ Reliance On Recidivist Statutes During Sentence Enhancement Hearings May Create Fifth And Eighth Amendment Violations, Jesse S. Weinstein Mar 2014

The Scarlet Letter: Why Courts’ Reliance On Recidivist Statutes During Sentence Enhancement Hearings May Create Fifth And Eighth Amendment Violations, Jesse S. Weinstein

Jesse Weinstein

No abstract provided.


Solving Batson, Tania Tetlow Mar 2014

Solving Batson, Tania Tetlow

Tania Tetlow

The Supreme Court faced an important ideological choice when it banned the racial use of peremptory challenges in Batson v. Kentucky. It could either ground the rule in equality rights designed to protect potential jurors from stereotyping, or it could base the rule on the defendant’s Sixth Amendment right to an “impartial jury” drawn from a fair cross-section of the community. By choosing Equal Protection analysis, the Court turned away from the defendant and the fair functioning of the criminal justice system and instead focused on protecting potential jurors. The Court thus built fatal error into the Batson rule, a …


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind Feb 2014

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening Jan 2014

Checked In: Real-Time Geolocation Surveillance And The Fourth Amendment, Eric J. Struening

Eric J Struening

Leaks have revealed that the use of personal technology such as cell phones and e-mail plays a large part in how the government obtains national security information. However, it is still an open question of how far the protection of the Fourth Amendment provides an individual against government intrusion in that type of technology. This article examines how the Fourth Amendment applies to the real-time tracking of national security targets through technology. I argue that a non-physical, short-term, warrantless, real-time trace of an individual’s location for national security purposes will not infringe the prohibition against unreasonable searches and seizures. As …


Paroline, Restitution, And Transferred Scienter: Child Pornography Possessors And Restitution Based On A Commerce-Clause Derived, Aggregate Proximate Cause Theory., Adam Lamparello, Charles Maclean Jan 2014

Paroline, Restitution, And Transferred Scienter: Child Pornography Possessors And Restitution Based On A Commerce-Clause Derived, Aggregate Proximate Cause Theory., Adam Lamparello, Charles Maclean

Adam Lamparello

This Article responds to the Fifth Circuit’s decision in In re Amy Unknown, which is before the United States Supreme Court on granted writ of certiorari. This Article poses a more logical and legal construct, derived from Commerce Clause analysis, that although each individual possessor of child pornography appears to contribute almost imperceptibly to the original victim’s harm, instead, on an aggregate proximate cause theory, the original victim would not have been victimized at all had there been no aggregate market of willing possessors for the material. Victims of child pornography, under the federal statute, and via aggregate proximate cause, …


Lethal Injection And The Right Of Access: The Intersection Of The Eighth And First Amendments, Timothy F. Brown Jan 2014

Lethal Injection And The Right Of Access: The Intersection Of The Eighth And First Amendments, Timothy F. Brown

Timothy Brown

The Spring and Summer of 2014 have witnessed renewed debate on the constitutionality of the death penalty after a series of high profile legal battles concerning access to lethal injection protocols and subsequent questionable executions. Due to shortages in the drugs traditionally used for the lethal injection, States have changed their lethal injection protocols to shield information from both the prisoners and the public. Citing public safety concerns, the States refuse to release information concerning the procurement of the drugs to the public. Such obstruction hinders the public’s ability to determine the cruelty of the punishment imposed and creates the …