Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (5)
- Washington and Lee University School of Law (4)
- Maurer School of Law: Indiana University (2)
- Pepperdine University (2)
- Selected Works (2)
-
- University of Pittsburgh School of Law (2)
- University of South Carolina (2)
- Columbia Law School (1)
- New York Law School (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Massachusetts School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Richmond (1)
- Publication Year
- Publication
-
- Touro Law Review (5)
- Faculty Publications (3)
- Articles (2)
- Pepperdine Law Review (2)
- Supreme Court Case Files (2)
-
- All Faculty Scholarship (1)
- Articles & Chapters (1)
- Catholic University Journal of Law and Technology (1)
- Faculty Scholarship (1)
- Federal Communications Law Journal (1)
- Georgia Law Review (1)
- Indiana Law Journal (1)
- Law Faculty Publications (1)
- Law Faculty Scholarship (1)
- Martin A. Schwartz (1)
- Michael I Niman Ph.D. (1)
- Publications (1)
- Seattle University Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Washington and Lee Law Review Online (1)
- Publication Type
Articles 1 - 29 of 29
Full-Text Articles in Law
Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan
Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan
Georgia Law Review
The Supreme Court has long deprived immigrants of the full protection of substantive constitutional rights, including the right to free speech, leaving undocumented immigrants exposed to detention and deportation if they earn the government’s ire through political speech. The best remedy for this would be for the Supreme Court to reconsider its approach. This Essay offers an interim alternative borrowed from an analogous problem that arises under the Fourth Amendment. Under the Constitution, the Supreme Court has indicated that illegally obtained evidence may be suppressed in a removal proceeding only if the Fourth Amendment violation was “egregious.” Yet, some circuit …
The Fourth Amendment’S Forgotten Free-Speech Dimensions, Aya Gruber
The Fourth Amendment’S Forgotten Free-Speech Dimensions, Aya Gruber
Publications
No abstract provided.
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy
Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy
Washington and Lee Law Review Online
In recent years body-worn cameras have been championed by community groups, scholars, and the courts as a potential check on police misconduct. Such has been the enthusiasm for body-worn cameras that, in a relatively short time, they have been rolled out to police departments across the country. Perhaps because of the optimism surrounding these devices there has been little consideration of the Fourth Amendment issues they pose, especially when they are coupled with facial recognition technology (FRT). There is one particular context in which police use of FRT equipped body-worn cameras is especially concerning: public protests. This Comment constitutes the …
Ithink My Electronic Data Is Secure, But Is It: A Constitutional Analysis Of In Re The Search Of An Apple Iphone, Shira Bloom
Ithink My Electronic Data Is Secure, But Is It: A Constitutional Analysis Of In Re The Search Of An Apple Iphone, Shira Bloom
Touro Law Review
No abstract provided.
United States District Court, Southern District Of New York, People For The Ethical Treatment Of Animals V. Giuliani, Melissa Murphy
United States District Court, Southern District Of New York, People For The Ethical Treatment Of Animals V. Giuliani, Melissa Murphy
Touro Law Review
No abstract provided.
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Dystopian Constitutionalism, Thomas P. Crocker
Dystopian Constitutionalism, Thomas P. Crocker
Faculty Publications
This article describes and defends the distinctive role and rich tradition of using contrastive dystopian states in constitutional theory and practice. As constitutional tradition going back to the founding, U.S. constitutional analysis was replete with arguments about what practices would lead to an undesirable state of tyranny. In more recent constitutional history, the use of contrasting examples of the “police state,” totalitarianism, or Orwellian references have been prevalent in Supreme Court opinions across doctrinal domains, most recently making a prominent appearance at oral argument in the Fourth Amendment case, United States v. Jones. In contrast to more comprehensive constitutional theories, …
Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski
Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski
Faculty Publications
For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Martin A. Schwartz
No abstract provided.
Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman
Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman
Touro Law Review
No abstract provided.
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.
The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.
Michael I Niman Ph.D.
It reads like a political thriller. An NSA spook, Edward Snowden, meets his conscience, blows the whistle on a massive secret attack on the Fourth Amendment, and is pursued globally by an obsessed president. Spice things up with a bit of character development cross-pollinated with a history lesson. First there’s Darth President. His administration has earned the distinction of invoking the Espionage Act of 1917 (a constitutionally questionable World War One relic) more than all other presidents in the previous 96 years combined—by a factor of two. The Obama administration has charged eight people under the act. All previous administrations …
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …
Substance And Method In The Year 2000, Akhil Reed Amar
Substance And Method In The Year 2000, Akhil Reed Amar
Pepperdine Law Review
No abstract provided.
New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo
New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Criminal Procedure And The Racial Profiling Issue For Professor Gates And Sergeant Crowley, L. Darnell Weeden
Criminal Procedure And The Racial Profiling Issue For Professor Gates And Sergeant Crowley, L. Darnell Weeden
Washington and Lee Journal of Civil Rights and Social Justice
No abstract provided.
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Touro Law Review
No abstract provided.
Raiding Islam: Searches That Target Religious Institutions, John G. Douglass
Raiding Islam: Searches That Target Religious Institutions, John G. Douglass
Law Faculty Publications
On the morning of March 20, 2002, while television cameras recorded the events for the evening news, dozens of federal agents entered and searched the offices of several Islamic educational and religious organizations in Northern Virginia. The agents were searching, it appears, for evidence that those organizations contributed money to international groups known to have sponsored terrorist acts. By most public accounts, the targeted institutions were regarded as moderate and progressive voices in American Islam. For that reason, the searches sent shock waves through the American Muslim community. Muslims who had supported the Administration's domestic war on terrorism began to …
Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar
Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar
Federal Communications Law Journal
Last year, the State of Wisconsin passed legislation which would require statechartered public broadcasting television networks to carry political advertising for candidates free of charge. In this article, Andrew Cotlar raises many concerns about the wisdom of such legislation and the impact this trend may have on public broadcasters throughout the nation. The author begins by analyzing the current position of the law on political access requirements, at both federal and state levels, and then argues that the public television stations should continue to be free to exercise substantial editorial discretion. The Article proceeds to critique the Wisconsin statute as …
'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang
'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang
Articles
While hate crimes may tend to be less routine and more violent than discriminatory traffic stops, closer examination of each shows the need to complicate our understanding of both. The work of social scientists who have studied racial profiling reveals striking similarities and connections between these two practices. In particular, both hate crimes and racial profiling tend to be condemned only at extremes, in situations where they appear to be irrational and excessive, but overlooked in cases where they seem logical or are expected. The tendency to see only the most extreme cases as problematic, however, fails to recognize that …
What's In A Word? A Comparative Analysis Of Article I, § 12 Of The New York State Constitution And The Fourth Amendment To The United States Constitution As Interpreted By The New York Court Of Appeals And The United States Supreme Court, Douglas Holden Wigdor
Touro Law Review
No abstract provided.
Webster V. Doe, Lewis F. Powell, Jr.
Prior Restraint Of Expression Through The Private Search Doctrine, Edward J. Eberle
Prior Restraint Of Expression Through The Private Search Doctrine, Edward J. Eberle
Law Faculty Scholarship
No abstract provided.
Bell V. Wolfish, Lewis F. Powell, Jr.
Search And Seizure Of The Media: A Statutory, Fourth Amendment And First Amendment Analysis, James S. Liebman
Search And Seizure Of The Media: A Statutory, Fourth Amendment And First Amendment Analysis, James S. Liebman
Faculty Scholarship
On the evening of October 10, 1974, police appeared at radio station KPFK-FM in Los Angeles with a warrant authorizing them to search the premises for a New World Liberation Front (NWLF) "communique" that took credit for a recent bombing. The officers conducted an intensive 8-hour search-combing files, listening to tapes, and looking through reporters' notes – finally concluding that the NWLF letter was not at the station. The KPFK search warrant was one of six that California law enforcement officials have executed at press offices since 1972. The circumstances surrounding the incident illustrate the rationale behind the recent development …