Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (40)
- Touro University Jacob D. Fuchsberg Law Center (21)
- American University Washington College of Law (14)
- Florida State University College of Law (14)
- Seattle University School of Law (12)
-
- SelectedWorks (12)
- Penn State Law (11)
- BLR (8)
- Maurer School of Law: Indiana University (8)
- University of Pittsburgh School of Law (8)
- Pepperdine University (5)
- The University of Akron (5)
- University of Georgia School of Law (5)
- University of Richmond (5)
- Vanderbilt University Law School (5)
- Barry University School of Law (4)
- Columbia Law School (4)
- Loyola Marymount University and Loyola Law School (4)
- Northwestern Pritzker School of Law (4)
- The Catholic University of America, Columbus School of Law (4)
- University of Arkansas at Little Rock William H. Bowen School of Law (4)
- University of Denver (4)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (4)
- Washington and Lee University School of Law (4)
- Cleveland State University (3)
- Emory University School of Law (3)
- Georgia State University College of Law (3)
- University of Arkansas, Fayetteville (3)
- University of Washington School of Law (3)
- University of the District of Columbia School of Law (3)
- Publication Year
- Publication
-
- Touro Law Review (18)
- Journal Articles (16)
- Scholarly Publications (13)
- Faculty Scholarship (11)
- Seattle University Law Review (11)
-
- Articles (10)
- ExpressO (8)
- Articles in Law Reviews & Other Academic Journals (7)
- Scholarly Works (6)
- Akron Law Review (5)
- Kit Kinports (5)
- Pepperdine Law Review (5)
- Susan Freiwald (5)
- All Faculty Scholarship (4)
- American University Law Review (4)
- Indiana Law Journal (4)
- Loyola of Los Angeles Law Review (4)
- University of Arkansas at Little Rock Law Review (4)
- University of Richmond Law Review (4)
- Articles by Maurer Faculty (3)
- Catholic University Law Review (3)
- Cleveland State Law Review (3)
- David Kaye (3)
- Faculty Articles (3)
- Georgia State University Law Review (3)
- Nevada Law Journal (3)
- Sturm College of Law: Faculty Scholarship (3)
- Vanderbilt Law School Faculty Publications (3)
- Washington Law Review (3)
- Brian Gallini (2)
- Publication Type
- File Type
Articles 31 - 60 of 279
Full-Text Articles in Law
Recalibrating Suspicion In An Era Of Hazy Legality, Deborah Ahrens
Recalibrating Suspicion In An Era Of Hazy Legality, Deborah Ahrens
Seattle University Law Review
After a century of employing varying levels of prohibition enforced by criminal law, the United States has entered an era where individual states are rethinking marijuana policy, and the majority of states have in some way decided to make cannabis legally available. This symposium Article will offer a description of what has happened in the past few years, as well as ideas for how jurisdictions can use the changing legal status of cannabis to reshape criminal procedure more broadly. This Article will recommend that law enforcement no longer be permitted use the smell of marijuana as a reason to search …
Police Violence And The African-American Procedural Habitus, Trevor George Gardner
Police Violence And The African-American Procedural Habitus, Trevor George Gardner
Scholarship@WashULaw
How should an African American respond to a race-based police stop? What approach, disposition, or tactic will minimize his risk within the context of the police stop of being subject to police violence? This Essay advances a conversation among criminal procedural theorists about citizen agency within the field of police-administered criminal procedure, highlighting “The Talk” that parents have with their African American children regarding how to respond to police seizure. It argues that the most prominent version of The Talk—the one in which parents call for absolute deference to police authority in the event of a police stop—may be as …
Using Technology The Founders Never Dreamed Of: Cell Phones As Tracking Devices And The Fourth Amendment, R. Craig Curtis, Michael C. Gizzi, Michael J. Kittleson
Using Technology The Founders Never Dreamed Of: Cell Phones As Tracking Devices And The Fourth Amendment, R. Craig Curtis, Michael C. Gizzi, Michael J. Kittleson
University of Denver Criminal Law Review
No abstract provided.
Lawful Searches Incident To Unlawful Arrests: A Reform Proposal, Mark A. Summers
Lawful Searches Incident To Unlawful Arrests: A Reform Proposal, Mark A. Summers
Faculty Scholarship
No abstract provided.
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cleveland State Law Review
Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …
A Warrant Requirement Resurgence: The Fourth Amendment In The Roberts Court, Benjamin Priester
A Warrant Requirement Resurgence: The Fourth Amendment In The Roberts Court, Benjamin Priester
Journal Publications
Over many years, the United States Supreme Court has developed an extensive body of precedent interpreting and enforcing the provisions of the Fourth Amendment to the United States Constitution, which prohibits unreasonable searches and seizures by law enforcement agents conducting criminal investigations. Commonly called the "warrant requirement," one key component of this case law operates to deem some police investigatory techniques to be unconstitutional unless they are conducted pursuant to a search warrant issued in advance by a judge. The terms of the doctrine and its exceptions also authorize other investigatory actions as constitutionally permissible without a search warrant. The …
The Criminal Continues To Go Free When The Constable Blunders: Testing The Boundaries Of Curtilage—State V. Chute, 908 N.W.2d 578 (Minn. 2018), Akina Khan
Mitchell Hamline Law Review
No abstract provided.
Judges Do It Better: Why Judges Can (And Should) Decide Life Or Death, Andrew R. Ford
Judges Do It Better: Why Judges Can (And Should) Decide Life Or Death, Andrew R. Ford
Dickinson Law Review (2017-Present)
Following its decision in Furman v. Georgia, the Supreme Court of the United States has attempted to standardize procedures that states use to subject offenders to the ultimate penalty. In practice, this attempt at standardization has divided capital sentencing into two distinct parts: the death eligibility decision and the death selection decision. The eligibility decision addresses whether the sentencer may impose the death penalty, while the selection decision determines who among that limited subset of eligible offenders is sentenced to death. In Ring v. Arizona, the Court held for the first time that the Sixth Amendment right to …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Loyola of Los Angeles Law Review
During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.
Although …
Perceptions, Knowledge And Experiences Among Police Officers: Traffic Stops, Vehicle Searches And K-9 Involvement, Daniel Ozment
Perceptions, Knowledge And Experiences Among Police Officers: Traffic Stops, Vehicle Searches And K-9 Involvement, Daniel Ozment
Master of Science in Criminal Justice Theses & (Pre-2016) Policy Research Projects
This survey study explores the perceptions, knowledge and experiences of police “line” officers concerning Fourth Amendment search and seizure norms and applications during traffic stops and vehicles searches, in particular police use of canine units following the landmark United States Supreme Court decision of Rodriguez v. United States. In particular, the study examines issues surrounding the length and scope of a traffic stop by police, including stops with canine involvement. Finally, the study includes an analysis of how federal courts of appeal and Georgia courts have interpreted the Rodriguez decision.
Is Your Smartphone Conversation Private? The Stingray Device’S Impact On Privacy In States, Katherine M. Sullivan
Is Your Smartphone Conversation Private? The Stingray Device’S Impact On Privacy In States, Katherine M. Sullivan
Catholic University Law Review
“Where are you” is a common question to receive on your cellphone, but it is up to you whether or not to respond with an answer. No longer does this question need to be asked due to advancements in surveillance technology. When pinpointing a criminal suspect, the question can be answered by local and state agencies, without the person of interest knowing, by using a StingRay device. The main question to be asked is does the conduct of locating a criminal suspect’s exact location without a warrant, violate an individual’s Fourth Amendment Constitutional right to be free from unreasonable searches. …
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic
The Fourth Amendment In The Age Of Persistent Aerial Surveillance, John Pavletic
Journal of Criminal Law and Criminology
If Big Brother made movies, persistent aerial surveillance would be its masterpiece. Small airplanes are rigged with high-tech cameras that can continuously transmit real-time images to the ground. The aircraft is able to monitor an area of thirty square miles for ten hours at a time. This technology allows video analysts to zoom in and track the location of vehicles, and even people. It was originally designed for military use during the Iraq War, but since then, it has been adapted for civilian applications. In 2016, the Baltimore Police Department contracted with Persistent Surveillance Systems to carry out a trial …
Policing The Prosecutor: Race, The Fourth Amendment, And The Prosecution Of Criminal Cases, Renee Mcdonald Hutchins
Policing The Prosecutor: Race, The Fourth Amendment, And The Prosecution Of Criminal Cases, Renee Mcdonald Hutchins
Journal Articles
As this article explores, while the Fourth Amendment is commonly criticized for the discretion it affords police officers, an overlooked result of the amendment’s lax regulation of the police is the enhanced power it affords prosecutors. Though for a time a warrant was the notional measure of reasonableness, over the last century the Court has crafted several exceptions to that measure to give the police greater leeway during on-the-street encounters. The Court has concurrently retreated from robust application of the exclusionary rule to remedy constitutional violations. These shifts have meant far more predictable wins for the prosecution at the suppression …
Supreme Irrelevance: The Court’S Abdication In Criminal Procedure Jurisprudence, Tonja Jacobi, Ross Berlin
Supreme Irrelevance: The Court’S Abdication In Criminal Procedure Jurisprudence, Tonja Jacobi, Ross Berlin
Faculty Articles
Criminal procedure is one of the Supreme Court’s most active areas of jurisprudence, but the Court’s rulings are largely irrelevant to the actual workings of the criminal justice system. The Court’s irrelevance takes two forms: objectively, on the numbers, its jurisprudence fails to protect the vast majority of people affected by the criminal justice system; and in terms of salience, the Court has sidestepped the major challenges in the United States today relating to the criminal justice system. These challenges include discrimination in stops and frisks, fatal police shootings, unconscionable plea deals, mass incarceration, and disproportionate execution of racial minorities. …
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Scholarly Articles
To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …
Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff
Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff
Sturm College of Law: Faculty Scholarship
Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?
This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …
Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov
Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov
Faculty Scholarship
No abstract provided.
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Scholarly Works
This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?
The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David Rudovsky, David A. Harris
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David Rudovsky, David A. Harris
All Faculty Scholarship
The investigative detention doctrine first announced in Terry v. Ohio and amplified over the past fifty years has been much analyzed, praised, and criticized from a number of perspectives. Significantly, however, over this time period commentators have only occasionally questioned the Supreme Court’s “common sense” judgments regarding the factors sufficient to establish reasonable suspicion for stops and frisks. For years, the Court has provided no empirical basis for its judgments, due in large part to the lack of reliable data. Now, with the emergence of comprehensive data on these police practices, much can be learned about the predictive power of …
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky
Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky
Articles
The investigative detention doctrine first announced in Terry v. Ohio and amplified over the past fifty years has been much analyzed, praised, and criticized from a number of perspectives. Significantly, however, over this time period commentators have only occasionally questioned the Supreme Court’s “common sense” judgments regarding the factors sufficient to establish reasonable suspicion for stops and frisks. For years, the Court has provided no empirical basis for its judgments, due in large part to the lack of reliable data. Now, with the emergence of comprehensive data on these police practices, much can be learned about the predictive power of …
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Teresa A. Miller
The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky
Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky
Erwin Chemerinsky
No abstract provided.
The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston
The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston
Catholic University Law Review
The advent of new technology has presented courts with unique challenges when analyzing searches and seizures under the Fourth Amendment. Out of necessity, the application of the Fourth Amendment has evolved to address privacy issues stemming from modern technology that could not have been anticipated by the Amendment’s drafters. As part of this evolution, the Supreme Court devised the “private search” doctrine, which upholds the constitutionality of warrantless police searches of items that were previously searched by a private party, so long as the police search does not exceed the scope of the private-party search. However, courts have struggled to …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Knock And Talk No More, Jamesa J. Drake
Knock And Talk No More, Jamesa J. Drake
Maine Law Review
The Supreme Court has set out a roadmap for challenging one of the most common and insidious police tactics used today: the knock-and-talk. The path is short and clear and it leads to the inescapable conclusion that the knock-and-talk—as it is actually employed in practice—is unconstitutional. Although the Court has yet to squarely consider the issue, some Justices have already taken pains to say, in dictum, that knock-and-talks are lawful. Practitioners should not be dissuaded. What this faction of the Court describes is a highly romanticized—and utterly inaccurate—conception of what a knock-and-talk actually entails. The sort of activity that these …
Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon
Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon
Georgia Law Review
The FourthAmendment's exclusionary rule requires that
criminal courts suppress evidence obtained as a result of
an unconstitutionalsearch or seizure. The Supreme Court
has repeatedly stated that suppression is purely
regulatory, not remedial. Its only purpose is to deter
future police misconduct, not to remedy past privacy or
liberty harms suffered by the defendant. Exclusion, in
other words, is for the benefit of community members who
might, sometime in the future, be subject to police
misconduct like that endured by the defendant.
Exclusion's regulatory purpose would be greatly aided if
criminal courts could identify when a suppression motion
involved Fourth Amendment …