Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Evidence

PDF

Fourth Amendment

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 83

Full-Text Articles in Law

The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict Apr 2022

The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict

Washington and Lee Law Review

Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.

Courts rarely, if ever, examine FRT’s role in establishing …


Criminal Justice Secrets, Meghan J. Ryan Jan 2022

Criminal Justice Secrets, Meghan J. Ryan

Faculty Journal Articles and Book Chapters

The American criminal justice system is cloaked in secrecy. The government employs covert surveillance operations. Grand-jury proceedings are hidden from public view. Prosecutors engage in closed-door plea-bargaining and bury exculpatory evidence. Juries convict defendants on secret evidence. Jury deliberations are a black box. And jails and prisons implement clandestine punishment practices. Although there are some justifications for this secrecy, the ubiquitous nature of it is contrary to this nation’s Founders’ steadfast belief in the transparency of criminal justice proceedings. Further, the pervasiveness of secrecy within today’s criminal justice system raises serious constitutional concerns. The accumulation of secrecy and the aggregation …


Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin Jan 2022

Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin

Scholarly Works

As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …


Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward Sep 2021

Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward

West Virginia Law Review

When the police violate a suspect’s Fourth Amendment rights, what often follows is the discovery of incriminating evidence. Sometimes the evidence is discovered directly after the Fourth Amendment violation. In other situations, the evidence comes by a more indirect route and may occur long after the original Fourth Amendment violation. Courts struggle when trying to decide if the discovery of this indirectly obtained evidence was caused by the police misconduct. This causal question is important because causality acts as a limiting principle when deciding when to apply the exclusionary rule. A basic view of the exclusionary rule suggests that evidence …


No Longer Innocent Until Proven Guilty: How Ohio Violates The Fourth Amendment Through Familial Dna Searches Of Felony Arrestees, Jordan Mason Nov 2020

No Longer Innocent Until Proven Guilty: How Ohio Violates The Fourth Amendment Through Familial Dna Searches Of Felony Arrestees, Jordan Mason

Cleveland State Law Review

In 2013, the United States Supreme Court legalized DNA collection of all felony arrestees upon arrest through its decision in Maryland v. King. Since then, the State of Ohio has broadened the use of arrestee DNA by subjecting it to familial DNA searches. Ohio’s practice of conducting familial DNA searches of arrestee DNA violates the Fourth Amendment because arrestees have a reasonable expectation of privacy in the information that is extracted from a familial DNA search and it fails both the totality of the circumstances and the special needs tests. Further, these tests go against the intention of the …


Justice Sonia Sotomayor: The Court’S Premier Defender Of The Fourth Amendment, David L. Hudson Jr. Oct 2020

Justice Sonia Sotomayor: The Court’S Premier Defender Of The Fourth Amendment, David L. Hudson Jr.

Seattle University Law Review

This essay posits that Justice Sotomayor is the Court’s chief defender of the Fourth Amendment and the cherished values it protects. She has consistently defended Fourth Amendment freedoms—in majority, concurring, and especially in dissenting opinions. Part I recounts a few of her majority opinions in Fourth Amendment cases. Part II examines her concurring opinion in United States v. Jones. Part III examines several of her dissenting opinions in Fourth Amendment cases. A review of these opinions demonstrates what should be clear to any observer of the Supreme Court: Justice Sotomayor consistently defends Fourth Amendment principles and values.


The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


Recalibrating Suspicion In An Era Of Hazy Legality, Deborah Ahrens Jan 2020

Recalibrating Suspicion In An Era Of Hazy Legality, Deborah Ahrens

Seattle University Law Review

After a century of employing varying levels of prohibition enforced by criminal law, the United States has entered an era where individual states are rethinking marijuana policy, and the majority of states have in some way decided to make cannabis legally available. This symposium Article will offer a description of what has happened in the past few years, as well as ideas for how jurisdictions can use the changing legal status of cannabis to reshape criminal procedure more broadly. This Article will recommend that law enforcement no longer be permitted use the smell of marijuana as a reason to search …


A Warrant Requirement Resurgence: The Fourth Amendment In The Roberts Court, Benjamin Priester Jan 2019

A Warrant Requirement Resurgence: The Fourth Amendment In The Roberts Court, Benjamin Priester

Journal Publications

Over many years, the United States Supreme Court has developed an extensive body of precedent interpreting and enforcing the provisions of the Fourth Amendment to the United States Constitution, which prohibits unreasonable searches and seizures by law enforcement agents conducting criminal investigations. Commonly called the "warrant requirement," one key component of this case law operates to deem some police investigatory techniques to be unconstitutional unless they are conducted pursuant to a search warrant issued in advance by a judge. The terms of the doctrine and its exceptions also authorize other investigatory actions as constitutionally permissible without a search warrant. The …


Lacking Regulated Policy For Dna Evidence, Maia Lister May 2018

Lacking Regulated Policy For Dna Evidence, Maia Lister

Themis: Research Journal of Justice Studies and Forensic Science

Despite its strong presence in criminal justice, DNA analysis is still a minimally regulated area. This minimal regulation devalues DNA evidence through the inconsistencies in these areas. The analysis methods of low template DNA lack a uniform method resulting in varying levels of reliability. Utilizing familial searches to assist in criminal investigations can potentially violate citizen rights. Such violations can also be found in the collection of DNA samples before an arrestee is tried or convicted. There are, however, regulations that could be applied universally to combat the problems that were discussed.


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff Jan 2018

Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?

This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …


Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky Jan 2018

Terry Stops And Frisks: The Troubling Use Of Common Sense In A World Of Empirical Data, David A. Harris, David Rudovsky

Articles

The investigative detention doctrine first announced in Terry v. Ohio and amplified over the past fifty years has been much analyzed, praised, and criticized from a number of perspectives. Significantly, however, over this time period commentators have only occasionally questioned the Supreme Court’s “common sense” judgments regarding the factors sufficient to establish reasonable suspicion for stops and frisks. For years, the Court has provided no empirical basis for its judgments, due in large part to the lack of reliable data. Now, with the emergence of comprehensive data on these police practices, much can be learned about the predictive power of …


Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky Jun 2017

Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins Apr 2017

Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins

Maryland Law Review Online

No abstract provided.


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon Jan 2017

Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon

Georgia Law Review

The FourthAmendment's exclusionary rule requires that
criminal courts suppress evidence obtained as a result of
an unconstitutionalsearch or seizure. The Supreme Court
has repeatedly stated that suppression is purely
regulatory, not remedial. Its only purpose is to deter
future police misconduct, not to remedy past privacy or
liberty harms suffered by the defendant. Exclusion, in
other words, is for the benefit of community members who
might, sometime in the future, be subject to police
misconduct like that endured by the defendant.
Exclusion's regulatory purpose would be greatly aided if
criminal courts could identify when a suppression motion
involved Fourth Amendment …


Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal Jan 2017

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


Newsroom: Goldstein On Drug Databases 6-27-2016, Sheri Qualters, Roger Williams University School Of Law Jun 2016

Newsroom: Goldstein On Drug Databases 6-27-2016, Sheri Qualters, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye Mar 2016

On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye

David Kaye

For nearly a decade, DNA-on-arrest laws eluded scrutiny in the courts. For another five years, they withstood a gathering storm of constitutional challenges. In Maryland v. King, however, Maryland's highest court reasoned that usually fingerprints provide everything police need to establish the true identity of an individual before trial and that the state's interest in finding the perpetrators of crimes by trawling databases of DNA profiles is too "generalized" to support "a warrantless, suspicionless search." The U.S. Supreme Court reacted forcefully. Chief Justice Roberts stayed the Maryland judgment, writing that "given the considered analysis of courts on the other side …


Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye Mar 2016

Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye

David Kaye

In Maryland v. King, the Supreme Court applied a balancing test to uphold a Maryland statute mandating preconviction collection and analysis of DNA from individuals charged with certain crimes. The DNA profiles are limited to an inherited set of DNA sequences that are not known to be functional and that are tokens of individual identity. This invited online essay examines two aspects of an article on the case by Professor Erin Murphy. I question the claim that the case is pivotal in a conceivable abandonment of the per se rule that warrantless, suspicionless searches are unconstitutional unless they fall …


Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried Mar 2016

Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried

David Kaye

DNA typing has had a major impact on the criminal justice system. There are hundreds of opinions and thousands of cases dealing with DNA evidence. Yet, at virtually every stage of the process, there are important issues that are just emerging or that have been neglected.At the investigative stage, courts have barely begun to focus on the legal limitations on the power of the police to obtain samples directly from suspects and to use the data from DNA samples in various ways. Issues such as the propriety of "DNA dragnets" (in which large numbers of individuals in a geographic area …


Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith Mar 2016

Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith

David Kaye

Over the past decade, law enforcement authorities have amassed huge collections of DNA samples and the identifying profiles derived from them. Large DNA databanks routinely help to identify the guilty and to exonerate the innocent, but as the databanks grow, so do fears about civil liberties. Perhaps the most controversial policy issue in the creation of these databases is the question of coverage: Whose DNA profiles should be stored in them? The possibilities extend from convicted violent sex offenders to all convicted felons, to everyone arrested, to the entire population. This Article questions the rationales for drawing the line at …


Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii Jan 2016

Policing In The Era Of Permissiveness: Mitigating Misconduct Through Third-Party Standing, Julian A. Cook Iii

Brooklyn Law Review

On April 4, 2015, Walter L. Scott was driving his vehicle when he was stopped by Officer Michael T. Slager of the North Charleston, South Carolina, police department for a broken taillight. A dash cam video from the officer’s vehicle showed the two men engaged in what appeared to be a rather routine verbal exchange. Sometime after Slager returned to his vehicle, Scott exited his car and ran away from Slager, prompting the officer to pursue him on foot. After he caught up with Scott in a grassy field near a muffler establishment, a scuffle between the men ensued, purportedly …


A Domestic Consequence Of The Government Spying On Its Citizens: The Guilty Go Free, Mystica M. Alexander, William P. Wiggins Jan 2016

A Domestic Consequence Of The Government Spying On Its Citizens: The Guilty Go Free, Mystica M. Alexander, William P. Wiggins

Brooklyn Law Review

In recent years, a seemingly endless stream of headlines have alerted people to the steady and relentless government encroachment on their civil liberties. Consider, for example, headlines such as “U.S. Directs Agents to Cover Up Program Used to Investigate Americans,” “DEA Admits to Keeping Secret Database of Phone Calls,” or “No Morsel Too Miniscule for All-Consuming N.S.A.” Of concern is not only the U.S. government’s collection of data on its citizens, but also how that information is aggregated, stored, and used. The Fourth Amendment protects citizens from unreasonable searches and seizures by the government. While the drafters of the Fourth …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Evidence Laundering In A Post-Herring World, Kay L. Levine, Jenia I. Turner, Ronald F. Wright Jan 2016

Evidence Laundering In A Post-Herring World, Kay L. Levine, Jenia I. Turner, Ronald F. Wright

Faculty Journal Articles and Book Chapters

The Supreme Court’s decision in Herring v. United States authorizes police to defeat the Fourth Amendment’s protections through a process we call evidence laundering. Evidence laundering occurs when one police officer makes a constitutional mistake when gathering evidence and then passes that evidence along to a second officer, who develops it further and then delivers it to prosecutors for use in a criminal case. When courts admit the evidence based on the good faith of the second officer, the original constitutional taint disappears in the wash.

In the years since Herring was decided, courts have allowed evidence laundering in a …


Filming The Police: An Interference Or A Public Service, Aracely Rodman Jan 2016

Filming The Police: An Interference Or A Public Service, Aracely Rodman

St. Mary's Law Journal

Abstract forthcoming.


Dna Storage Banks: The Importance Of Preserving Dna Evidence To Allow For Transparency And The Preservation Of Justice, Cristina Martin Jul 2015

Dna Storage Banks: The Importance Of Preserving Dna Evidence To Allow For Transparency And The Preservation Of Justice, Cristina Martin

Chicago-Kent Law Review

What is the duty to preserve information in today’s society? In order for humanity to evolve, change and flourish in the future, society needs to preserve its information from the past. In the criminal justice field, preservation of evidence has special significance. DNA evidence in particular has become a helpful aid for innocent defendants who have been improperly imprisoned. Over the past twenty years, the number of exonerations of imprisoned criminal defendants has increased dramatically. With the advancement of technology, old, previously untestable or improperly tested DNA evidence will need to be retested. However, most states do not have proper …