Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Fourth Amendment (52)
- Privacy (38)
- Fourth amendment (34)
- Search (21)
- Constitutional Law (17)
-
- Search and seizure (17)
- Searches and Seizures (16)
- United States Constitution 4th Amendment (12)
- Surveillance (11)
- Law and Technology (10)
- Technology (9)
- Wireless Telephones (9)
- Jurisprudence (8)
- Law and Society (8)
- Privacy; Surveillance; United States v. Jones (8)
- Probable cause (8)
- Third party doctrine (8)
- Criminal procedure (7)
- Reasonable expectation of privacy (7)
- Seizure (7)
- Supreme Court (7)
- Warrants (7)
- Criminal Law (6)
- Due process (6)
- Exclusionary Rule (6)
- Expectation of privacy (6)
- Fifth Amendment (6)
- Section 1983 (6)
- Civil rights (5)
- Constitution (5)
- Publication Year
- Publication
-
- Stephen E Henderson (26)
- Adam M. Gershowitz (11)
- Kit Kinports (10)
- Sherry Colb (8)
- David C. Gray (7)
-
- Michele Carducci Prof. (7)
- Martin A. Schwartz (6)
- David Kaye (5)
- Jason P. Nance (5)
- Orin Kerr (4)
- Susan Freiwald (4)
- Daniel B. Yeager (3)
- Danielle Keats Citron (3)
- Jeffrey Bellin (3)
- Margaret Hu (3)
- Robert M. Bloom (3)
- Robert Sprague (3)
- Teresa A. Miller (3)
- Timothy P. O'Neill (3)
- Adam Lamparello (2)
- Charles B Frye (2)
- Daniel A. Horwitz (2)
- Erwin Chemerinsky (2)
- Gerard V. Bradley (2)
- Joelle A. Moreno (2)
- Lawrence Rosenthal (2)
- Lori B. Andrews (2)
- Patricia L. Bellia (2)
- Rachel A. Harmon (2)
- Sheri Lynn Johnson (2)
Articles 31 - 60 of 182
Full-Text Articles in Law
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Inside The Border, Outside The Law: Undocumented Immigrants And The Fourth Amendment, D. Carolina Nuñez
Inside The Border, Outside The Law: Undocumented Immigrants And The Fourth Amendment, D. Carolina Nuñez
D. Carolina Núñez
As states enact immigration-related laws requiring local law enforcement officers to identify and detain undocumented immigrants, the Fourth Amendment rights of aliens are becoming critically important. In United States v. Verdugo-Urquidez, a divided Supreme Court suggested that aliens in the United States do not have Fourth Amendment rights unless they have established "substantial connections" to the United States. Lower courts have relied on Verdugo's holding to categorically deny Fourth Amendment rights to certain classes of undocumented immigrants. Commentators have criticized the "substantial connections" test as an isolated misinterpretation of Court precedent regarding the rights of aliens within the United States. …
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Teresa A. Miller
The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Bright Lines, Black Bodies: The Florence Strip Search Case And Its Dire Repercussions, Teresa A. Miller
Bright Lines, Black Bodies: The Florence Strip Search Case And Its Dire Repercussions, Teresa A. Miller
Teresa A. Miller
Part I is a brief history of Search and Seizure law, focusing on seismic doctrinal shifts that occurred from the 1950s to the present. As a framework for the important cases, the Founders’ concerns about abuse of governmental authority are discussed, as well as the rights protected by the Fourth Amendment. Various governmental programs will also be presented, such as the War on Drugs and its call for a large-scale federal anti-drug policy, first initiated by President Richard Nixon in 1969. Part II is a description of the central reasoning presented in Florence v. Board of Chosen Freeholders, including the …
Procedural Due Process Claims, Erwin Chemerinsky
Procedural Due Process Claims, Erwin Chemerinsky
Erwin Chemerinsky
No abstract provided.
Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum
Fourth Amendment Stops, Arrests And Searches In The Context Of Qualified Immunity, Erwin Chemerinsky, Karen M. Blum
Erwin Chemerinsky
No abstract provided.
Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark
Small Cells, Big Problems: The Increasing Precision Of Cell Site Location Information And The Need For Fourth Amendment Protections, Robert M. Bloom, William T. Clark
Robert M. Bloom
The past fifty years has witnessed an evolution in technology advancement in police surveillance. Today, one of the essential tools of police surveillance is something most Americans carry with them in their pockets every day, the cell phone. Cell phones not only contain a huge repository of personal data, they also provide continuous surveillance of a person’s movement known as cell site location information (CSLI). In 1986, Congress sought to provide some privacy protections to CSLI in the Stored Communication Act. Although this solution may have struck the proper balance in an age when cell phones were a mere novelty …
Stubbornness Of Pretexts, Daniel B. Yeager
Stubbornness Of Pretexts, Daniel B. Yeager
Daniel B. Yeager
This Article will reflect on (1) how the Whren v. United States failure to acknowledge what counts as a pretext accounts for the residual confusion as to whether or not Whren really has killed off the pretext argument in constitutional criminal procedure, and (2) the extent to which the Court in Sullivan compounded that failure, which I hope to lightly correct here by distinguishing motives from intentions and then by elaborating the role that each plays, or at least should play, in Fourth Amendment jurisprudence.
Search, Seizure And The Positive Law: Expectations Of Privacy Outside The Fourth Amendment, Daniel B. Yeager
Search, Seizure And The Positive Law: Expectations Of Privacy Outside The Fourth Amendment, Daniel B. Yeager
Daniel B. Yeager
This Article is about the misunderstood relationship between the Fourth Amendment and the positive law. It shows how state property law and other expressions of the positive law are more resilient and useful to Fourth Amendment analysis than the Court's decisions of the past three decades recognize.
Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager
Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager
Daniel B. Yeager
This Article rehearses a response to the problems posed to and by the Supreme Court's attempts to work out the meaning and operation of the word "search." After commencing Part II by meditating on the notion of privacy, I take up its relation to the antecedent suspicion or knowledge that Fourth-Amendment law requires as a justification for all privacy invasions. From there, I look specifically at that uneasy relation in Supreme Court jurisprudence, which has come to privilege privacy over property as a Fourth Amendment value. From there, Part III reviews the sources or bases that can tell us what …
Some Observations On The Supreme Court's Use Of Property Concepts In Resolving Fourth Amendment Problems, Fernand N. Dutile
Some Observations On The Supreme Court's Use Of Property Concepts In Resolving Fourth Amendment Problems, Fernand N. Dutile
Fernand "Tex" N. Dutile
No abstract provided.
The Rhetoric Of The Fourth Amendment: Toward A More Persuasive Fourth Amendment, Timothy C. Macdonnell
The Rhetoric Of The Fourth Amendment: Toward A More Persuasive Fourth Amendment, Timothy C. Macdonnell
Timothy C. MacDonnell
In the last forty-five years, the United States Supreme Court’s jurisprudence through the lens of classical rhetoric. Opinions are assessed based on three areas of persuasion: appeals to logic (logos); appeals to emotion (pathos); and appeals to credibility (ethos). By examining the Justices’ opinions in this fashion, patterns of unpersuasive opinion writing emerge. While a common source for all unpersuasive opinions is not available, common patterns of weak persuasion in particular appeals do exist. Weak appeals to ethos commonly stem from Justices failing to fully confront the doctrine of stare decisis. Weak pathos-based appeals often involve Justices engaging in misplaced …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Remedies As Rights: The Warrant Requirement, David Gray
Fourth Amendment Remedies As Rights: The Warrant Requirement, David Gray
David C. Gray
The constitutional status of the warrant requirement is hotly debated. Critics argue that neither the text nor history of the Fourth Amendment support a warrant requirement. Also questioned is the warrant requirement’s ability to protect Fourth Amendment interests. Perhaps in response to these concerns, the Court has steadily degraded the warrant requirement through a series of widening exceptions. The result is an unsatisfying jurisprudence that fails on both conceptual and practical grounds.
These debates have gained new salience with the emergence of modern surveillance technologies such as stingrays, GPS tracking, drones, and Big Data. Although a majority of the Court …
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye
On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye
David Kaye
For nearly a decade, DNA-on-arrest laws eluded scrutiny in the courts. For another five years, they withstood a gathering storm of constitutional challenges. In Maryland v. King, however, Maryland's highest court reasoned that usually fingerprints provide everything police need to establish the true identity of an individual before trial and that the state's interest in finding the perpetrators of crimes by trawling databases of DNA profiles is too "generalized" to support "a warrantless, suspicionless search." The U.S. Supreme Court reacted forcefully. Chief Justice Roberts stayed the Maryland judgment, writing that "given the considered analysis of courts on the other side …
Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye
Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye
David Kaye
In Maryland v. King, the Supreme Court applied a balancing test to uphold a Maryland statute mandating preconviction collection and analysis of DNA from individuals charged with certain crimes. The DNA profiles are limited to an inherited set of DNA sequences that are not known to be functional and that are tokens of individual identity. This invited online essay examines two aspects of an article on the case by Professor Erin Murphy. I question the claim that the case is pivotal in a conceivable abandonment of the per se rule that warrantless, suspicionless searches are unconstitutional unless they fall …
Dna Database Trawls And The Definition Of A Search In Boroian V. Mueller, David H. Kaye
Dna Database Trawls And The Definition Of A Search In Boroian V. Mueller, David H. Kaye
David Kaye
As a general matter, once the government acquires information from a permissible search or seizure, it can use this information in later criminal investigations. Courts have applied this simple rule to uphold the indefinite reuse of DNA samples acquired from convicted offenders. This essay describes the First Circuit Court of Appeals’ reliance on the rule in rejecting a convicted offender’s claim that his DNA sample and profile had to be removed from the federal DNA databank after he completed his sentence. Acknowledging that the rule permitting reuse should not be applied mechanically, I argue that the rule's application to DNA …
Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried
Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried
David Kaye
DNA typing has had a major impact on the criminal justice system. There are hundreds of opinions and thousands of cases dealing with DNA evidence. Yet, at virtually every stage of the process, there are important issues that are just emerging or that have been neglected.At the investigative stage, courts have barely begun to focus on the legal limitations on the power of the police to obtain samples directly from suspects and to use the data from DNA samples in various ways. Issues such as the propriety of "DNA dragnets" (in which large numbers of individuals in a geographic area …
Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith
Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith
David Kaye
Over the past decade, law enforcement authorities have amassed huge collections of DNA samples and the identifying profiles derived from them. Large DNA databanks routinely help to identify the guilty and to exonerate the innocent, but as the databanks grow, so do fears about civil liberties. Perhaps the most controversial policy issue in the creation of these databases is the question of coverage: Whose DNA profiles should be stored in them? The possibilities extend from convicted violent sex offenders to all convicted felons, to everyone arrested, to the entire population. This Article questions the rationales for drawing the line at …
The Supreme Court's Quiet Expansion Of Qualified Immunity, Kit Kinports
The Supreme Court's Quiet Expansion Of Qualified Immunity, Kit Kinports
Kit Kinports
This Essay discusses the Supreme Court’s tendency in recent opinions to covertly expand the reach of the qualified immunity defense available to public officials in § 1983 civil rights suits. In particular, the Essay points out that the Court, often in per curiam rulings, has described qualified immunity in increasingly broad terms and has qualified and retreated from its precedents, without offering any explanation or even acknowledging that it is deviating from past practice.In making this claim, I focus on three specific issues: the manner in which the Court characterizes the standard governing the qualified immunity defense; the question whether …
“The Right Of The People To Be Secure. . .”: Toward A Metatheory Of The Fourth Amendment, Thomas E. Baker
“The Right Of The People To Be Secure. . .”: Toward A Metatheory Of The Fourth Amendment, Thomas E. Baker
Thomas E. Baker
No abstract provided.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Margaret Hu
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Margaret Hu
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
Video Evidence And Summary Judgment: The Procedure Of Scott V. Harris, Howard Wasserman
Video Evidence And Summary Judgment: The Procedure Of Scott V. Harris, Howard Wasserman
Howard M Wasserman
In Scott v. Harris (2007), the Supreme Court granted summary judgment on a Fourth Amendment excessive-force claim brought by a motorist injured when a pursuing law-enforcement officer terminated a high-speed pursuit by bumping the plaintiff's car. The Court relied almost exclusively on a video of the chase captured from the officer's dash-mounted camera and disregarded witness testimony that contradicted the video. In granting summary judgment in this circumstance, the Court fell sway to the myth of video evidence as able to speak for itself, as an objective, unambiguous, and singularly accurate depiction of real-world events, not subject to any interpretation …