Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (7)
- University of Michigan Law School (7)
- American University Washington College of Law (3)
- BLR (3)
- The Catholic University of America, Columbus School of Law (3)
-
- University of Miami Law School (3)
- Penn State Dickinson Law (2)
- SelectedWorks (2)
- St. Mary's University (2)
- University of Richmond (2)
- University of South Carolina (2)
- Barry University School of Law (1)
- Cleveland State University (1)
- Cornell University Law School (1)
- Lincoln Memorial University - Duncan School of Law (1)
- Maurer School of Law: Indiana University (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Pepperdine University (1)
- Schulich School of Law, Dalhousie University (1)
- Seattle University School of Law (1)
- Seton Hall University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Pittsburgh School of Law (1)
- Publication Year
- Publication
-
- Articles (5)
- Michigan Law Review (5)
- Articles in Law Reviews & Other Academic Journals (3)
- ExpressO (3)
- Dickinson Law Review (2017-Present) (2)
-
- Law Student Publications (2)
- St. Mary's Law Journal (2)
- Stephen E Henderson (2)
- Adam Lamparello (1)
- Andrew Selbst (1)
- Articles by Maurer Faculty (1)
- Articles, Book Chapters, & Popular Press (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Charles E. MacLean (1)
- Cornell Law Faculty Publications (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Laurie B. Serafino (1)
- Law Faculty Articles and Essays (1)
- Melanie M. Reid (1)
- Michigan Law Review First Impressions (1)
- Northwestern University Law Review (1)
- Orin Kerr (1)
- Pace Law Review (1)
- Pepperdine Law Review (1)
- Sam Hanna (1)
- Scholarly Articles (1)
- Scholarly Works (1)
- Seattle University Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 49
Full-Text Articles in Law
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
Seattle University Law Review
If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …
Freedom From Speech, Mary Anne Franks
Freedom From Speech, Mary Anne Franks
Articles
The importance of freedom of speech in a democratic society is usually taken as a given, but freedom from speech is no less important in safeguarding the values of truth, autonomy, and democracy. Freedom from speech includes both the right of the individual to not be forced to speak and the freedom to avoid the speech of others. This essay attempts to highlight the significance of freedom from speech in order to clarify the importance of the First Amendment right against compelled speech; provide an explanation for when the right of free speech yields to other rights; and offer a …
Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety
Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety
Articles by Maurer Faculty
This Article uses a wrongful conviction lens to compare identifications by machines, notably facial recognition software, with identifications by humans. The Article advocates for greater reliability checks on both before use against a criminal defendant. The Article examines the cascading influence of facial recognition software on eyewitness identifications themselves and the related potential for greater errors. As a solution, the Article advocates the inclusion of eyewitness identification in the Organization of Scientific Area Committees' ("OSAC") review of facial recognition software for a more robust examination and consideration of software and its usage. The Article also encourages police departments to adopt …
Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin
Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin
Scholarly Works
As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …
Special Matters: Filtering Privileged Materials In Federal Prosecutions, Christina Frohock
Special Matters: Filtering Privileged Materials In Federal Prosecutions, Christina Frohock
Articles
This Article reviews the U.S. Department of Justice's toolbox for handling potentially privileged materials, with close attention to the evolution from filter teams to the Special Matters Unit in fraud prosecutions. Significant case opinions from the U.S. Courts of Appeals for the Fourth, Sixth, and Eleventh Circuits reveal the judiciary's diverse views on filter teams. The recent case of United States v. Esformes in the U.S. District Court for the Southern District of Florida, now on appeal to the Eleventh Circuit, illustrates how a filter team can fall short and draw unflattering attention to the Department of Justice. In the …
Covid-19 And Business Interruption Insurance: The Constitutionality Of Legislatively Mandated Coverage, William G. Arnold
Covid-19 And Business Interruption Insurance: The Constitutionality Of Legislatively Mandated Coverage, William G. Arnold
South Carolina Law Review
No abstract provided.
Fraud Law And Misinfodemics, Wes Henricksen
Facial Recognition And The Fourth Amendment, Andrew Ferguson
Facial Recognition And The Fourth Amendment, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.
This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …
Structural Sensor Surveillance, Andrew Guthrie Ferguson
Structural Sensor Surveillance, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
City infrastructure is getting smarter. Embedded smart sensors in roads, lampposts, and electrical grids offer the government a way to regulate municipal resources and the police a new power to monitor citizens. This structural sensor surveillance, however, raises a difficult constitutional question: Does the creation of continuously-recording, aggregated, long-term data collection systems violate the Fourth Amendment? After all, recent Supreme Court cases suggest that technologies that allow police to monitor location, reveal personal patterns, and track personal details for long periods of time are Fourth Amendment searches which require a probable cause warrant. This Article uses the innovation of smart …
How The Covid-19 Pandemic Has And Should Reshape The American Safety Net, Gabriel Scheffler, Andrew Hammond, Ariel Jurow Kleiman
How The Covid-19 Pandemic Has And Should Reshape The American Safety Net, Gabriel Scheffler, Andrew Hammond, Ariel Jurow Kleiman
Articles
No abstract provided.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
Orin Kerr
To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …
Visibly (Un)Just: The Optics Of Grand Jury Secrecy And Police Violence, Nicole Smith Futrell
Visibly (Un)Just: The Optics Of Grand Jury Secrecy And Police Violence, Nicole Smith Futrell
Dickinson Law Review (2017-Present)
Police violence has become more visible to the public through racial justice activism and social justice advocates’ use of technology. Yet, the heightened visibility of policing has had limited impact on transparency and accountability in the legal process, particularly when a grand jury is empaneled to determine whether to issue an indictment in a case of police violence. When a grand jury decides not to indict, the requirement of grand jury secrecy prevents public disclosure of the testimony, witnesses, and evidence presented to the grand jury. Grand jury secrecy leaves those who have seen and experienced the act of police …
The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips
The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips
Dickinson Law Review (2017-Present)
Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.
Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …
Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott
Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott
Articles
More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …
Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen
Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen
St. Mary's Law Journal
Abstract forthcoming
The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston
The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston
Catholic University Law Review
The advent of new technology has presented courts with unique challenges when analyzing searches and seizures under the Fourth Amendment. Out of necessity, the application of the Fourth Amendment has evolved to address privacy issues stemming from modern technology that could not have been anticipated by the Amendment’s drafters. As part of this evolution, the Supreme Court devised the “private search” doctrine, which upholds the constitutionality of warrantless police searches of items that were previously searched by a private party, so long as the police search does not exceed the scope of the private-party search. However, courts have struggled to …
Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman
Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman
Northwestern University Law Review
In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
St. Mary's Law Journal
Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams
Law Student Publications
George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amendments to Rule 41 of the Federal Rules of Criminal Procedure. Rule 41, governing searches and seizures, now permits magistrate judges to authorize agents- under a single warrant- to "remotely access," and simultaneously search, copy and seize information from an infinite number of unknown electronic devices in multiple districts anywhere in the country. The unlimited jurisdiction provision is triggered when a device's location is obscured through "technological means," or if agents are investigating computer crimes in five or more districts- regardless of whether …
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill
Law Student Publications
This comment explores how broader shifts in Fourth Amendment doctrine may affect the government's collection of Cell Site Location Information (CSLI) moving forward. It consists of three parts. Part I examines the technological underpinnings of cellular networks. The issue is frequently litigated, but few in the legal community have a real grasp on the technology. A nuanced understanding of the technology is crucial when examining the accuracy of CSLI or how the third-party doctrine ought to apply. This comment consolidates and simplifies the technical workings of cellular networks to enable better and more informed answers. Last, drawing on this understanding, …
Search And Seizures As Applied To Changing Digital Technologies: A Look At Pole Camera Surveillance, Tiffany M. Russo
Search And Seizures As Applied To Changing Digital Technologies: A Look At Pole Camera Surveillance, Tiffany M. Russo
Seton Hall Circuit Review
No abstract provided.
Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris
Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris
Articles
In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …
The Big Data Jury, Andrew Ferguson
The Big Data Jury, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
This article addresses the disruptive impact of big data technologies on jury selection.Jury selection requires personal information about potential jurors. Current selection practices, however, collect very little information about citizens, and litigants picking jury panels know even less. This data gap results in a jury selection system that: (1) fails to create a representative cross-section of the community; (2) encourages the discriminatory use of peremptory challenges; (3) results in an unacceptably high juror “no show” rate; and (4) disproportionately advantages those litigants who can afford to hire expensive jury consultants.Big data has the potential to remedy these existing limitations and …
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
Sherry Colb
No abstract provided.
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Adam Lamparello
Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.
When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Charles E. MacLean
The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”
This article calls upon Congress, and to a lesser extent, state legislatures, to control that …
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Melanie M. Reid
One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …
Orwellian Surveillance Of Vehicular Travels, Sam Hanna
Orwellian Surveillance Of Vehicular Travels, Sam Hanna
Sam Hanna
What would someone learn about you if all your automobile travels were ubiquitously tracked beginning today? Creating an indefinite database of a person’s previous automobile travels to formulate deductions on intimate details of people's lives is precisely what law enforcement agencies are currently able to accomplish with automatic license plate recognition (“ALPR”). With the ubiquity of ALPR cameras, continuous government surveillance of automobile travels is no longer a figment of the imagination. Consequently, the judicial and legislative branches of government must embark on balancing the private and public interests implicated by this technology. Failure to set suitable boundaries around the …
“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino
“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino
Laurie B. Serafino
Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …