Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

Selected Works

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 182

Full-Text Articles in Law

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Inside The Border, Outside The Law: Undocumented Immigrants And The Fourth Amendment, D. Carolina Nuñez Feb 2018

Inside The Border, Outside The Law: Undocumented Immigrants And The Fourth Amendment, D. Carolina Nuñez

D. Carolina Núñez

As states enact immigration-related laws requiring local law enforcement officers to identify and detain undocumented immigrants, the Fourth Amendment rights of aliens are becoming critically important. In United States v. Verdugo-Urquidez, a divided Supreme Court suggested that aliens in the United States do not have Fourth Amendment rights unless they have established "substantial connections" to the United States. Lower courts have relied on Verdugo's holding to categorically deny Fourth Amendment rights to certain classes of undocumented immigrants. Commentators have criticized the "substantial connections" test as an isolated misinterpretation of Court precedent regarding the rights of aliens within the United States. …


Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson Dec 2017

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

Stephen E Henderson

We finally have a federal ‘test case.’  In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age.  The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher.  This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious. 
 
As for ambition, the …


Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez Dec 2017

Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez

Stephen E Henderson

In Birchfield v. North Dakota (2016), the Supreme Court broke new Fourth Amendment ground by establishing that law enforcement’s collection of information can be cause for “anxiety,” meriting constitutional protection, even if subsequent uses of the information are tightly restricted.  This change is significant.  While the Court has long recognized the reality that police cannot always be trusted to follow constitutional rules, Birchfield changes how that concern is implemented in Fourth Amendment law, and importantly, in a manner that acknowledges the new realities of data-driven policing.
 
Beyond offering a careful reading of Birchfield, this Article has two goals. …


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Dec 2017

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

Elizabeth De Armond

No abstract provided.


Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller Nov 2017

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller

Teresa A. Miller

The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


Bright Lines, Black Bodies: The Florence Strip Search Case And Its Dire Repercussions, Teresa A. Miller Nov 2017

Bright Lines, Black Bodies: The Florence Strip Search Case And Its Dire Repercussions, Teresa A. Miller

Teresa A. Miller

Part I is a brief history of Search and Seizure law, focusing on seismic doctrinal shifts that occurred from the 1950s to the present. As a framework for the important cases, the Founders’ concerns about abuse of governmental authority are discussed, as well as the rights protected by the Fourth Amendment. Various governmental programs will also be presented, such as the War on Drugs and its call for a large-scale federal anti-drug policy, first initiated by President Richard Nixon in 1969. Part II is a description of the central reasoning presented in Florence v. Board of Chosen Freeholders, including the …


Procedural Due Process Claims, Erwin Chemerinsky Jun 2017

Procedural Due Process Claims, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum Jun 2017

Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum

Erwin Chemerinsky

No abstract provided.


Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark May 2017

Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark

Robert M. Bloom

The past fifty years has witnessed an evolution in technology advancement in police surveillance. Today, one of the essential tools of police surveillance is something most Americans carry with them in their pockets every day, the cell phone. Cell phones not only contain a huge repository of personal data, they also provide continuous surveillance of a person’s movement known as cell site location information (CSLI). In 1986, Congress sought to provide some privacy protections to CSLI in the Stored Communication Act. Although this solution may have struck the proper balance in an age when cell phones were a mere novelty …


Stubbornness Of Pretexts, Daniel B. Yeager Mar 2017

Stubbornness Of Pretexts, Daniel B. Yeager

Daniel B. Yeager

This Article will reflect on (1) how the Whren v. United States failure to acknowledge what counts as a pretext accounts for the residual confusion as to whether or not Whren really has killed off the pretext argument in constitutional criminal procedure, and (2) the extent to which the Court in Sullivan compounded that failure, which I hope to lightly correct here by distinguishing motives from intentions and then by elaborating the role that each plays, or at least should play, in Fourth Amendment jurisprudence.


Search, Seizure And The Positive Law: Expectations Of Privacy Outside The Fourth Amendment, Daniel B. Yeager Mar 2017

Search, Seizure And The Positive Law: Expectations Of Privacy Outside The Fourth Amendment, Daniel B. Yeager

Daniel B. Yeager

This Article is about the misunderstood relationship between the Fourth Amendment and the positive law. It shows how state property law and other expressions of the positive law are more resilient and useful to Fourth Amendment analysis than the Court's decisions of the past three decades recognize.


Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager Mar 2017

Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager

Daniel B. Yeager

This Article rehearses a response to the problems posed to and by the Supreme Court's attempts to work out the meaning and operation of the word "search." After commencing Part II by meditating on the notion of privacy, I take up its relation to the antecedent suspicion or knowledge that Fourth-Amendment law requires as a justification for all privacy invasions. From there, I look specifically at that uneasy relation in Supreme Court jurisprudence, which has come to privilege privacy over property as a Fourth Amendment value. From there, Part III reviews the sources or bases that can tell us what …


Some Observations On The Supreme Court's Use Of Property Concepts In Resolving Fourth Amendment Problems, Fernand N. Dutile Mar 2017

Some Observations On The Supreme Court's Use Of Property Concepts In Resolving Fourth Amendment Problems, Fernand N. Dutile

Fernand "Tex" N. Dutile

No abstract provided.


The Rhetoric Of The Fourth Amendment: Toward A More Persuasive Fourth Amendment, Timothy C. Macdonnell Jan 2017

The Rhetoric Of The Fourth Amendment: Toward A More Persuasive Fourth Amendment, Timothy C. Macdonnell

Timothy C. MacDonnell

In the last forty-five years, the United States Supreme Court’s jurisprudence through the lens of classical rhetoric. Opinions are assessed based on three areas of persuasion: appeals to logic (logos); appeals to emotion (pathos); and appeals to credibility (ethos). By examining the Justices’ opinions in this fashion, patterns of unpersuasive opinion writing emerge. While a common source for all unpersuasive opinions is not available, common patterns of weak persuasion in particular appeals do exist. Weak appeals to ethos commonly stem from Justices failing to fully confront the doctrine of stare decisis. Weak pathos-based appeals often involve Justices engaging in misplaced …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


If You Fly A Drone, So Can Police, Stephen E. Henderson May 2016

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


Fourth Amendment Remedies As Rights: The Warrant Requirement, David Gray Apr 2016

Fourth Amendment Remedies As Rights: The Warrant Requirement, David Gray

David C. Gray

The constitutional status of the warrant requirement is hotly debated. Critics argue that neither the text nor history of the Fourth Amendment support a warrant requirement. Also questioned is the warrant requirement’s ability to protect Fourth Amendment interests. Perhaps in response to these concerns, the Court has steadily degraded the warrant requirement through a series of widening exceptions. The result is an unsatisfying jurisprudence that fails on both conceptual and practical grounds.

These debates have gained new salience with the emergence of modern surveillance technologies such as stingrays, GPS tracking, drones, and Big Data. Although a majority of the Court …


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye Mar 2016

On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye

David Kaye

For nearly a decade, DNA-on-arrest laws eluded scrutiny in the courts. For another five years, they withstood a gathering storm of constitutional challenges. In Maryland v. King, however, Maryland's highest court reasoned that usually fingerprints provide everything police need to establish the true identity of an individual before trial and that the state's interest in finding the perpetrators of crimes by trawling databases of DNA profiles is too "generalized" to support "a warrantless, suspicionless search." The U.S. Supreme Court reacted forcefully. Chief Justice Roberts stayed the Maryland judgment, writing that "given the considered analysis of courts on the other side …


Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye Mar 2016

Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye

David Kaye

In Maryland v. King, the Supreme Court applied a balancing test to uphold a Maryland statute mandating preconviction collection and analysis of DNA from individuals charged with certain crimes. The DNA profiles are limited to an inherited set of DNA sequences that are not known to be functional and that are tokens of individual identity. This invited online essay examines two aspects of an article on the case by Professor Erin Murphy. I question the claim that the case is pivotal in a conceivable abandonment of the per se rule that warrantless, suspicionless searches are unconstitutional unless they fall …


Dna Database Trawls And The Definition Of A Search In Boroian V. Mueller, David H. Kaye Mar 2016

Dna Database Trawls And The Definition Of A Search In Boroian V. Mueller, David H. Kaye

David Kaye

As a general matter, once the government acquires information from a permissible search or seizure, it can use this information in later criminal investigations. Courts have applied this simple rule to uphold the indefinite reuse of DNA samples acquired from convicted offenders. This essay describes the First Circuit Court of Appeals’ reliance on the rule in rejecting a convicted offender’s claim that his DNA sample and profile had to be removed from the federal DNA databank after he completed his sentence. Acknowledging that the rule permitting reuse should not be applied mechanically, I argue that the rule's application to DNA …


Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried Mar 2016

Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried

David Kaye

DNA typing has had a major impact on the criminal justice system. There are hundreds of opinions and thousands of cases dealing with DNA evidence. Yet, at virtually every stage of the process, there are important issues that are just emerging or that have been neglected.At the investigative stage, courts have barely begun to focus on the legal limitations on the power of the police to obtain samples directly from suspects and to use the data from DNA samples in various ways. Issues such as the propriety of "DNA dragnets" (in which large numbers of individuals in a geographic area …


Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith Mar 2016

Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith

David Kaye

Over the past decade, law enforcement authorities have amassed huge collections of DNA samples and the identifying profiles derived from them. Large DNA databanks routinely help to identify the guilty and to exonerate the innocent, but as the databanks grow, so do fears about civil liberties. Perhaps the most controversial policy issue in the creation of these databases is the question of coverage: Whose DNA profiles should be stored in them? The possibilities extend from convicted violent sex offenders to all convicted felons, to everyone arrested, to the entire population. This Article questions the rationales for drawing the line at …


The Supreme Court's Quiet Expansion Of Qualified Immunity, Kit Kinports Feb 2016

The Supreme Court's Quiet Expansion Of Qualified Immunity, Kit Kinports

Kit Kinports

This Essay discusses the Supreme Court’s tendency in recent opinions to covertly expand the reach of the qualified immunity defense available to public officials in § 1983 civil rights suits. In particular, the Essay points out that the Court, often in per curiam rulings, has described qualified immunity in increasingly broad terms and has qualified and retreated from its precedents, without offering any explanation or even acknowledging that it is deviating from past practice.In making this claim, I focus on three specific issues: the manner in which the Court characterizes the standard governing the qualified immunity defense; the question whether …


“The Right Of The People To Be Secure. . .”: Toward A Metatheory Of The Fourth Amendment, Thomas E. Baker Feb 2016

“The Right Of The People To Be Secure. . .”: Toward A Metatheory Of The Fourth Amendment, Thomas E. Baker

Thomas E. Baker

No abstract provided.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Taxonomy Of The Snowden Disclosures, Margaret Hu Feb 2016

Taxonomy Of The Snowden Disclosures, Margaret Hu

Margaret Hu

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Video Evidence And Summary Judgment: The Procedure Of Scott V. Harris, Howard Wasserman Feb 2016

Video Evidence And Summary Judgment: The Procedure Of Scott V. Harris, Howard Wasserman

Howard M Wasserman

In Scott v. Harris (2007), the Supreme Court granted summary judgment on a Fourth Amendment excessive-force claim brought by a motorist injured when a pursuing law-enforcement officer terminated a high-speed pursuit by bumping the plaintiff's car. The Court relied almost exclusively on a video of the chase captured from the officer's dash-mounted camera and disregarded witness testimony that contradicted the video. In granting summary judgment in this circumstance, the Court fell sway to the myth of video evidence as able to speak for itself, as an objective, unambiguous, and singularly accurate depiction of real-world events, not subject to any interpretation …