Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Custodial Compulsion, Kyron J. Huigens Mar 2019

Custodial Compulsion, Kyron J. Huigens

Faculty Articles

In cases that fall under Miranda v Arizona, police interrogators not only give a suspect reasons to confess; they also suggest that the suspect ought to confess. In doing so, interrogators effectively invoke the Wigmorean duty of a citizen to produce any evidence he has in his possession, including his own confession. That is, they invoke the duty against which the Self Incrimination Clause stands, so that the clause is applicable to police interrogations, and is violated where it is not waived. This means that “a Miranda violation” is a violation of the Self Incrimination Clause in the field, just …


Sharkfests And Databases: Crowdsourcing Plea Bargains, Kay L. Levine, Ronald F. Wright, Nancy J. King, Marc L. Miller Jan 2019

Sharkfests And Databases: Crowdsourcing Plea Bargains, Kay L. Levine, Ronald F. Wright, Nancy J. King, Marc L. Miller

Faculty Articles

In this Essay, we dive deeper into this final dimension to discuss the influence of professional networks on plea negotiations. In particular, we examine the effects of crowdsourcing tactics in the negotiation setting. We describe, for example, what happens when lawyers bargain in public, benefitting from an audience that provides information about past practices and deals. And then we speculate about what might happen if that audience were instead a widely shared database that documents plea practices in the jurisdiction. We offer a few preliminary thoughts about the potential influence of such techniques, as we are not in a position …


Taking Data, Michael C. Pollack Jan 2019

Taking Data, Michael C. Pollack

Faculty Articles

Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …