Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Custodial Compulsion, Kyron J. Huigens
Custodial Compulsion, Kyron J. Huigens
Faculty Articles
In cases that fall under Miranda v Arizona, police interrogators not only give a suspect reasons to confess; they also suggest that the suspect ought to confess. In doing so, interrogators effectively invoke the Wigmorean duty of a citizen to produce any evidence he has in his possession, including his own confession. That is, they invoke the duty against which the Self Incrimination Clause stands, so that the clause is applicable to police interrogations, and is violated where it is not waived. This means that “a Miranda violation” is a violation of the Self Incrimination Clause in the field, just …
Sharkfests And Databases: Crowdsourcing Plea Bargains, Kay L. Levine, Ronald F. Wright, Nancy J. King, Marc L. Miller
Sharkfests And Databases: Crowdsourcing Plea Bargains, Kay L. Levine, Ronald F. Wright, Nancy J. King, Marc L. Miller
Faculty Articles
In this Essay, we dive deeper into this final dimension to discuss the influence of professional networks on plea negotiations. In particular, we examine the effects of crowdsourcing tactics in the negotiation setting. We describe, for example, what happens when lawyers bargain in public, benefitting from an audience that provides information about past practices and deals. And then we speculate about what might happen if that audience were instead a widely shared database that documents plea practices in the jurisdiction. We offer a few preliminary thoughts about the potential influence of such techniques, as we are not in a position …
Taking Data, Michael C. Pollack
Taking Data, Michael C. Pollack
Faculty Articles
Technological development has created new forms of information, altered expectations of privacy, and given law enforcement more tools to examine that information and intrude on that privacy. One crucial facet of these changes involves internet service providers (ISPs): as people expose more of their lives to their ISPs—all the websites they visit, people they communicate with, emails they send, files they store, and more—law enforcement efforts to access that data become more and more common. But scholars and policymakers alike recognize that the existing statutory frameworks governing those efforts are based on obsolete technology and strike balances that are difficult …