Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

Surveillance

Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 41 of 41

Full-Text Articles in Law

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins

University of Richmond Law Review

In this essay, I contend that when evaluating the constitutionality of enhanced surveillance devices, the existing test for assessing the occurrence of a Fourth Amendment search should be modified. Specifically, I suggest that intrusiveness should be unambiguously adopted by the Court as the benchmark for assessing and defining the existence of a search under the Fourth Amendment. Moreover, intrusiveness should be clearly defined to require an examination of two factors: the functionality of a challenged form of surveillance and the potential for disclosure created by the device.


Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia Dec 2007

Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Electronic Surveillance At The Virtual Border, Susan Freiwald Dec 2007

Electronic Surveillance At The Virtual Border, Susan Freiwald

Susan Freiwald

A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …


Confronting The Evolving Safety And Security Challenge At Colleges And Universities, Oren R. Griffin Jan 2007

Confronting The Evolving Safety And Security Challenge At Colleges And Universities, Oren R. Griffin

Articles, Chapters in Books and Other Contributions to Scholarly Works

Colleges and universities have long been scrutinized and confronted with lawsuits regarding safety and security measures designed and implemented to protect students and prevent dangerous incidents on campus. Under the doctrine of in loco parentis, college administrators assume responsibility for the physical safety and well-being of students as they matriculate through their academic programs. However, in recent decades, the realization that university communities are not immune to criminal activity has led to federal legislation and judicial opinions that have attempted to identify what legal duty colleges and universities have to prevent security breaches. Moreover, college and university administrators have looked …


A First Principles Approach To Communications' Privacy, Susan Freiwald Dec 2006

A First Principles Approach To Communications' Privacy, Susan Freiwald

Susan Freiwald

Under current doctrines, parties to a communication enjoy robust constitutional protection against government surveillance only when they have a reasonable expectation of privacy in those communications. This paper suggests that the surprising dearth of case law applying the reasonable expectations of privacy test to modern electronic communications reflects courts' discomfort with the test's necessarily normative analysis. That discomfort also likely explains courts' use of shortcuts based on Miller v. United States and Smith v. Maryland in those few cases that have considered online surveillance practices. In particular, the government has argued that a broad third party rule deprives electronic mail …


Chasing Bits Across Borders, Patricia L. Bellia Jan 2001

Chasing Bits Across Borders, Patricia L. Bellia

Journal Articles

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Jan 2000

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Journal Articles

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches.

The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


Reflecting On The Subject: A Critique Of The Social Influence Conception Of Deterrence, The Broken Windows Theory, And Order-Maintenance Policing New York Style, Bernard E. Harcourt Nov 1998

Reflecting On The Subject: A Critique Of The Social Influence Conception Of Deterrence, The Broken Windows Theory, And Order-Maintenance Policing New York Style, Bernard E. Harcourt

Michigan Law Review

In 1993, New York City began implementing the quality-of-life initiative, an order-maintenance policing strategy targeting minor misdemeanor offenses like turnstile jumping, aggressive panhandling, and public drinking. The policing initiative is premised on the broken windows theory of deterrence, namely the hypothesis that minor physical and social disorder, if left unattended in a neighborhood, causes serious crime. New York City's new policing strategy has met with overwhelming support in the press and among public officials, policymakers, sociologists, criminologists and political scientists. The media describe the "famous" Broken Windows essay as "the bible of policing" and "the blueprint for community policing." Order-maintenance …


Fourth, Fifth, And Sixth Amendments, William E. Hellerstein Jan 1991

Fourth, Fifth, And Sixth Amendments, William E. Hellerstein

Touro Law Review

No abstract provided.


Tape Recording Conversations - Is It Ethical For Attorneys?, Charles W. Adams Jan 1990

Tape Recording Conversations - Is It Ethical For Attorneys?, Charles W. Adams

Articles, Chapters in Books and Other Contributions to Scholarly Works

No abstract provided.


The Criminal's Right Of Privacy Jun 1929

The Criminal's Right Of Privacy

Michigan Law Review

The dissent of Mr. Justice Brandeis in the famed wire tapping case has been of especial interest to those who are acquainted with his article in the Harvard Law Review in 1890 on "The Right of Privacy." The law has witnessed few more fascinating developments than the engrafting of this latter concept into the formula of justice, few more conspicuous examples of creative juristic effort. Concerning it Dean Pound has said: "What may almost be called the classical example (of creative activity) is the paper on the Right of Privacy in which Mr. Justice Brandeis, then at the bar, was …