Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 12 of 12
Full-Text Articles in Law
Confessions, Criminals, And Community, Sheri Lynn Johnson
Confessions, Criminals, And Community, Sheri Lynn Johnson
Sheri Lynn Johnson
No abstract provided.
The Qualitative Dimension Of Fourth Amendment "Reasonableness", Sherry F. Colb
The Qualitative Dimension Of Fourth Amendment "Reasonableness", Sherry F. Colb
Sherry Colb
Supreme Court doctrine protects two seemingly distinct kinds of interests under the heading of privacy rights: one "substantive," the other "procedural." The Fourth Amendment guarantee against "unreasonable searches and seizures" has been generally interpreted to protect procedural privacy. Searches are typically defined as governmental inspections of activities and locations in which an individual has a reasonable expectation of privacy from observation. In the typical case, this reasonable expectation of privacy may be breached only where the government has acquired a quantitatively substantial objective basis for believing that the search would uncover evidence of a crime. Substantive privacy rights have not …
The Illusory Eighth Amendment, John F. Stinneford
The Illusory Eighth Amendment, John F. Stinneford
John F. Stinneford
Although there is no obvious doctrinal connection between the Supreme Court’s Miranda jurisprudence and its Eighth Amendment excessive punishments jurisprudence, the two are deeply connected at the level of methodology. In both areas, the Supreme Court has been criticized for creating “prophylactic” rules that invalidate government actions because they create a mere risk of constitutional violation. In reality, however, both sets of rules deny constitutional protection to a far greater number of individuals with plausible claims of unconstitutional treatment than they protect. This dysfunctional combination of over- and underprotection arises from the Supreme Court’s use of implementation rules as a …
District Court, Nassau County, People V. Yaghoubi, David Schoenhaar
District Court, Nassau County, People V. Yaghoubi, David Schoenhaar
Touro Law Review
No abstract provided.
Putting The Cat Back In The Bag: Involuntary Confessions And Self-Incrimination, Joseph A. Iemma
Putting The Cat Back In The Bag: Involuntary Confessions And Self-Incrimination, Joseph A. Iemma
Touro Law Review
No abstract provided.
Self-Incrimination: Are Underlying Questions About A Pending Conviction On Appeal A Violation Of A Defendant's Fifth Amendment Privilege Against Self-Incrimination?, Macdonald R. Drane Iv
Self-Incrimination: Are Underlying Questions About A Pending Conviction On Appeal A Violation Of A Defendant's Fifth Amendment Privilege Against Self-Incrimination?, Macdonald R. Drane Iv
Touro Law Review
No abstract provided.
Double Jeopardy: A Resentencing Game, Deirdre Cicciaro
Double Jeopardy: A Resentencing Game, Deirdre Cicciaro
Touro Law Review
No abstract provided.
Probing Into Salinas's Silence: Back To The "Accused Speaks" Model?, Rinat Kitai-Sangero, Yuval Merin
Probing Into Salinas's Silence: Back To The "Accused Speaks" Model?, Rinat Kitai-Sangero, Yuval Merin
Nevada Law Journal
No abstract provided.
Supreme Court, Bronx County, People V. Buari, Matthew Moisan
Supreme Court, Bronx County, People V. Buari, Matthew Moisan
Touro Law Review
No abstract provided.
Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik
Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik
Amanda C Pustilnik
The rapid development of neurotechnologies poses novel constitutional issues for criminal law and criminal procedure. These technologies can identify directly from brain waves whether a person is familiar with a stimulus like a face or a weapon, can model blood flow in the brain to indicate whether a person is lying, and can even interfere with brain processes themselves via high-powered magnets to cause a person to be less likely to lie to an investigator. These technologies implicate the constitutional privilege against compelled, self-incriminating speech under the Fifth Amendment and the right to be free of unreasonable search and seizure …
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Timothy A Wiseman
Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.
This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …
Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack
Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack
Michigan Journal of Race and Law
Our criminal justice system is founded upon a belief that one is innocent until proven guilty. This belief is what foists the burden of proving a person’s guilt upon the government and belies a statutory presumption in favor of allowing a defendant to remain free pending trial at the federal level. Though there are certainly circumstances in which a federal magistrate judge may—and sometimes must—remand a defendant to jail pending trial, it is well-settled that pretrial detention itself inherently prejudices the quality of a person’s defense. In some cases, a defendant’s pretrial conditions become so onerous that they become punitive …