Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

An Exception Swallows A Rule: Police Authority To Search Incident To Arrest, Wayne A. Logan Jan 2001

An Exception Swallows A Rule: Police Authority To Search Incident To Arrest, Wayne A. Logan

Scholarly Publications

Compared to Fourth Amendment jurisprudence more generally, with its well-earned reputation for complexity and variability, the search incident to arrest exception to the Amendment's warrant requirement would appear an oasis of consistency. The exception affords police an unqualified right to search anyone they arrest, without first obtaining a search warrant from a neutral judicial official. This right extends to the bodies of all arrestees, their area of "immediate control," and, if driving a car, the interior of the car and any containers located therein


'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang Jan 2001

'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang

Articles

While hate crimes may tend to be less routine and more violent than discriminatory traffic stops, closer examination of each shows the need to complicate our understanding of both. The work of social scientists who have studied racial profiling reveals striking similarities and connections between these two practices. In particular, both hate crimes and racial profiling tend to be condemned only at extremes, in situations where they appear to be irrational and excessive, but overlooked in cases where they seem logical or are expected. The tendency to see only the most extreme cases as problematic, however, fails to recognize that …


Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller Jan 2001

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller

Journal Articles

The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …


An Empirically Based Comparison Of American And European Regulatory Approaches To Police Investigation, Christopher Slobogin Jan 2001

An Empirically Based Comparison Of American And European Regulatory Approaches To Police Investigation, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This article takes a comparative and empirical look at two of the most significant methods of police investigation: searches for and seizures of tangible evidence and interrogation of suspects. It first compares American doctrine regulating these investigative tools with the analogous rules predominant in Europe (specifically, England, France and Germany). It then discusses research on the American system that sheds light on the relative advantages and disadvantages of the two regulatory systems. More often than not, the existing data call into question preconceived notions of what "works." In particular, American reverence for search warrants, the exclusionary rule, and "Miranda" warnings …


Chasing Bits Across Borders, Patricia L. Bellia Jan 2001

Chasing Bits Across Borders, Patricia L. Bellia

Journal Articles

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …