Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Procedure

Technology

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 49

Full-Text Articles in Law

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry Jan 2023

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry

Seattle University Law Review

If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …


Freedom From Speech, Mary Anne Franks Jul 2022

Freedom From Speech, Mary Anne Franks

Articles

The importance of freedom of speech in a democratic society is usually taken as a given, but freedom from speech is no less important in safeguarding the values of truth, autonomy, and democracy. Freedom from speech includes both the right of the individual to not be forced to speak and the freedom to avoid the speech of others. This essay attempts to highlight the significance of freedom from speech in order to clarify the importance of the First Amendment right against compelled speech; provide an explanation for when the right of free speech yields to other rights; and offer a …


Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety Jan 2022

Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety

Articles by Maurer Faculty

This Article uses a wrongful conviction lens to compare identifications by machines, notably facial recognition software, with identifications by humans. The Article advocates for greater reliability checks on both before use against a criminal defendant. The Article examines the cascading influence of facial recognition software on eyewitness identifications themselves and the related potential for greater errors. As a solution, the Article advocates the inclusion of eyewitness identification in the Organization of Scientific Area Committees' ("OSAC") review of facial recognition software for a more robust examination and consideration of software and its usage. The Article also encourages police departments to adopt …


Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin Jan 2022

Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin

Scholarly Works

As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …


Special Matters: Filtering Privileged Materials In Federal Prosecutions, Christina Frohock Oct 2021

Special Matters: Filtering Privileged Materials In Federal Prosecutions, Christina Frohock

Articles

This Article reviews the U.S. Department of Justice's toolbox for handling potentially privileged materials, with close attention to the evolution from filter teams to the Special Matters Unit in fraud prosecutions. Significant case opinions from the U.S. Courts of Appeals for the Fourth, Sixth, and Eleventh Circuits reveal the judiciary's diverse views on filter teams. The recent case of United States v. Esformes in the U.S. District Court for the Southern District of Florida, now on appeal to the Eleventh Circuit, illustrates how a filter team can fall short and draw unflattering attention to the Department of Justice. In the …


Covid-19 And Business Interruption Insurance: The Constitutionality Of Legislatively Mandated Coverage, William G. Arnold Jul 2021

Covid-19 And Business Interruption Insurance: The Constitutionality Of Legislatively Mandated Coverage, William G. Arnold

South Carolina Law Review

No abstract provided.


Fraud Law And Misinfodemics, Wes Henricksen Jan 2021

Fraud Law And Misinfodemics, Wes Henricksen

Faculty Scholarship

No abstract provided.


Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


Structural Sensor Surveillance, Andrew Guthrie Ferguson Nov 2020

Structural Sensor Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

City infrastructure is getting smarter. Embedded smart sensors in roads, lampposts, and electrical grids offer the government a way to regulate municipal resources and the police a new power to monitor citizens. This structural sensor surveillance, however, raises a difficult constitutional question: Does the creation of continuously-recording, aggregated, long-term data collection systems violate the Fourth Amendment? After all, recent Supreme Court cases suggest that technologies that allow police to monitor location, reveal personal patterns, and track personal details for long periods of time are Fourth Amendment searches which require a probable cause warrant. This Article uses the innovation of smart …


How The Covid-19 Pandemic Has And Should Reshape The American Safety Net, Gabriel Scheffler, Andrew Hammond, Ariel Jurow Kleiman Oct 2020

How The Covid-19 Pandemic Has And Should Reshape The American Safety Net, Gabriel Scheffler, Andrew Hammond, Ariel Jurow Kleiman

Articles

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Jul 2019

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Orin Kerr

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Visibly (Un)Just: The Optics Of Grand Jury Secrecy And Police Violence, Nicole Smith Futrell Oct 2018

Visibly (Un)Just: The Optics Of Grand Jury Secrecy And Police Violence, Nicole Smith Futrell

Dickinson Law Review (2017-Present)

Police violence has become more visible to the public through racial justice activism and social justice advocates’ use of technology. Yet, the heightened visibility of policing has had limited impact on transparency and accountability in the legal process, particularly when a grand jury is empaneled to determine whether to issue an indictment in a case of police violence. When a grand jury decides not to indict, the requirement of grand jury secrecy prevents public disclosure of the testimony, witnesses, and evidence presented to the grand jury. Grand jury secrecy leaves those who have seen and experienced the act of police …


The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips Oct 2018

The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips

Dickinson Law Review (2017-Present)

Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.

Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott Jul 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, J. J. Prescott

Articles

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as ‘‘civil’’ in character—and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil character of …


Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen Jun 2018

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston Mar 2017

The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston

Catholic University Law Review

The advent of new technology has presented courts with unique challenges when analyzing searches and seizures under the Fourth Amendment. Out of necessity, the application of the Fourth Amendment has evolved to address privacy issues stemming from modern technology that could not have been anticipated by the Amendment’s drafters. As part of this evolution, the Supreme Court devised the “private search” doctrine, which upholds the constitutionality of warrantless police searches of items that were previously searched by a private party, so long as the police search does not exceed the scope of the private-party search. However, courts have struggled to …


Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman Feb 2017

Riley And Abandonment: Expanding Fourth Amendment Protection Of Cell Phones, Abigail Hoverman

Northwestern University Law Review

In light of the privacy concerns inherent to personal technological devices, the Supreme Court handed down a unanimous decision in 2014 recognizing the need for categorical heightened protection of cell phones during searches incident to arrest in Riley v. California. This Note argues for expansion of heightened protections for cell phones in the context of abandoned evidence because the same privacy concerns apply. This argument matters because state and federal courts have not provided the needed protection to abandoned cell phones pre- or post-Riley.


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams Jan 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams

Law Student Publications

George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amendments to Rule 41 of the Federal Rules of Criminal Procedure. Rule 41, governing searches and seizures, now permits magistrate judges to authorize agents- under a single warrant- to "remotely access," and simultaneously search, copy and seize information from an infinite number of unknown electronic devices in multiple districts anywhere in the country. The unlimited jurisdiction provision is triggered when a device's location is obscured through "technological means," or if agents are investigating computer crimes in five or more districts- regardless of whether …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill Jan 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill

Law Student Publications

This comment explores how broader shifts in Fourth Amendment doctrine may affect the government's collection of Cell Site Location Information (CSLI) moving forward. It consists of three parts. Part I examines the technological underpinnings of cellular networks. The issue is frequently litigated, but few in the legal community have a real grasp on the technology. A nuanced understanding of the technology is crucial when examining the accuracy of CSLI or how the third-party doctrine ought to apply. This comment consolidates and simplifies the technical workings of cellular networks to enable better and more informed answers. Last, drawing on this understanding, …


Search And Seizures As Applied To Changing Digital Technologies: A Look At Pole Camera Surveillance, Tiffany M. Russo Feb 2016

Search And Seizures As Applied To Changing Digital Technologies: A Look At Pole Camera Surveillance, Tiffany M. Russo

Seton Hall Circuit Review

No abstract provided.


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


The Big Data Jury, Andrew Ferguson Jan 2016

The Big Data Jury, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article addresses the disruptive impact of big data technologies on jury selection.Jury selection requires personal information about potential jurors. Current selection practices, however, collect very little information about citizens, and litigants picking jury panels know even less. This data gap results in a jury selection system that: (1) fails to create a representative cross-section of the community; (2) encourages the discriminatory use of peremptory challenges; (3) results in an unacceptably high juror “no show” rate; and (4) disproportionately advantages those litigants who can afford to hire expensive jury consultants.Big data has the potential to remedy these existing limitations and …


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Dec 2014

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Sherry Colb

No abstract provided.


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean Jan 2014

Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean

Charles E. MacLean

The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”

This article calls upon Congress, and to a lesser extent, state legislatures, to control that …


Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid Dec 2013

Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid

Melanie M. Reid

One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …


Orwellian Surveillance Of Vehicular Travels, Sam Hanna Dec 2013

Orwellian Surveillance Of Vehicular Travels, Sam Hanna

Sam Hanna

What would someone learn about you if all your automobile travels were ubiquitously tracked beginning today? Creating an indefinite database of a person’s previous automobile travels to formulate deductions on intimate details of people's lives is precisely what law enforcement agencies are currently able to accomplish with automatic license plate recognition (“ALPR”). With the ubiquity of ALPR cameras, continuous government surveillance of automobile travels is no longer a figment of the imagination. Consequently, the judicial and legislative branches of government must embark on balancing the private and public interests implicated by this technology. Failure to set suitable boundaries around the …


“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino Aug 2013

“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino

Laurie B. Serafino

Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …