Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

PDF

SelectedWorks

Search and seizure

Articles 1 - 3 of 3

Full-Text Articles in Law

Brief Of Amici Curiae -- Heien V. State Of North Carolina, Charles E. Maclean, Adam Lamparello Jun 2014

Brief Of Amici Curiae -- Heien V. State Of North Carolina, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Reasonable suspicion of unlawful activity cannot be predicated on conduct that does not violate the law. Put differently, if reasonableness — or reasonable suspicion — is to mean anything, it means that apparent violations of the law must be based on actual violations of the law. The North Carolina Supreme Court’s decision sends a message to drivers throughout the country that they cannot be wrong about what the law requires, even where law enforcement is wrong — dead wrong — about what the law proscribes.


Amicus Brief: State V. Glover (Maine Supreme Judicial Court), Adam Lamparello, Charles Maclean Jan 2013

Amicus Brief: State V. Glover (Maine Supreme Judicial Court), Adam Lamparello, Charles Maclean

Adam Lamparello

When law enforcement seeks to obtain a warrantless, pre-arrest DNA sample from an individual, that individual has the right to say “No.” If silence is to become a “badge of guilt,” then the right to silence—under the United States and Maine Constitutions—might become a thing of the past. Allowing jurors to infer consciousness of guilt from a pre-arrest DNA sample violates the Fourth Amendment to the United States and Maine Constitutions.


Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson Jan 2007

Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson

John W. Nelson

Our laptops are capable of containing large amounts of personal, private, intimate, and confidential information. At the same time, the power of the government to search us and our possessions is at its zenith during a border crossing. How should our laptops be treated during these border crossings?

This Note examines the background of the border search exception and the privacy interests we each have in our laptop computers. This Note argues that searches of our laptop computers should be viewed as highly intrusive in nature because of the ability to quickly sort through vast amounts of intimate and private …