Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Law
Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky
Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky
Erwin Chemerinsky
No abstract provided.
Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins
Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins
Maryland Law Review Online
No abstract provided.
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon
Mass Suppression: Aggregation And The Fourth Amendment, Nirej Sekhon
Georgia Law Review
The FourthAmendment's exclusionary rule requires that
criminal courts suppress evidence obtained as a result of
an unconstitutionalsearch or seizure. The Supreme Court
has repeatedly stated that suppression is purely
regulatory, not remedial. Its only purpose is to deter
future police misconduct, not to remedy past privacy or
liberty harms suffered by the defendant. Exclusion, in
other words, is for the benefit of community members who
might, sometime in the future, be subject to police
misconduct like that endured by the defendant.
Exclusion's regulatory purpose would be greatly aided if
criminal courts could identify when a suppression motion
involved Fourth Amendment …
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
St. Mary's Law Journal
Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …