Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Georgetown University Law Center (4)
- American University Washington College of Law (2)
- Brooklyn Law School (2)
- Florida State University College of Law (2)
- University of Baltimore Law (2)
-
- University of Florida Levin College of Law (2)
- Boston University School of Law (1)
- Columbia Law School (1)
- Duke Law (1)
- Florida International University College of Law (1)
- Maurer School of Law: Indiana University (1)
- Maurice A. Deane School of Law at Hofstra University (1)
- New York Law School (1)
- St. John's University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Colorado Law School (1)
- University of Massachusetts School of Law (1)
- University of Nebraska - Lincoln (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- Ursinus College (1)
- Washington and Lee University School of Law (1)
- Western New England University School of Law (1)
- William & Mary Law School (1)
- Keyword
-
- Fourth Amendment (16)
- Privacy (7)
- Surveillance (6)
- Supreme Court (4)
- Constitutional Law (3)
-
- Constitutional law (3)
- Criminal procedure (3)
- Reasonableness (3)
- Search and seizure (3)
- Criminal Procedure (2)
- Criminal law (2)
- DNA (2)
- Law (2)
- Maryland v. King (2)
- Police (2)
- Police investigation (2)
- Polie (2)
- Seach and Seizure (2)
- Stop and Frisk (2)
- 1179 (9th Cir. 20 14)) (1)
- African-Americans (1)
- Analytics (1)
- Arrestees (1)
- Big Data (1)
- Big data (1)
- Brown v. Entertainment Merchants Association (1)
- Bulk metadata collection (1)
- Cable television (1)
- Cell phone (1)
- Cloud Computing (1)
- Publication
-
- Faculty Scholarship (6)
- Faculty Publications (4)
- Georgetown Law Faculty Publications and Other Works (4)
- All Faculty Scholarship (3)
- Articles in Law Reviews & Other Academic Journals (2)
-
- Scholarly Articles (2)
- Scholarly Publications (2)
- UF Law Faculty Publications (2)
- Articles (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Hofstra Law Faculty Scholarship (1)
- Politics Summer Fellows (1)
- Publications (1)
- University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches (1)
Articles 1 - 30 of 32
Full-Text Articles in Law
Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin
Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin
Faculty Scholarship
This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA.
Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …
The Right To Remain Armed, Jeffrey Bellin
The Right To Remain Armed, Jeffrey Bellin
Faculty Publications
The laws governing gun possession are changing rapidly. In the past two years, federal courts have wielded a revitalized Second Amendment to invalidate longstanding gun carrying restrictions in Chicago, the District of Columbia, and throughout California. Invoking similar Second Amendment themes, legislators across the country have steadily deregulated public gun carrying, preempting municipal gun control ordinances in cities like Philadelphia, Atlanta, and Cleveland.
These changes to substantive gun laws reverberate through the constitutional criminal procedure framework. By making it lawful for citizens to carry guns even in crowded urban areas, enhanced Second Amendment rights trigger Fourth Amendment protections that could …
Regulation Or Resistance: A Counter-Narrative Of Constitutional Criminal Procedure, Alice Ristroph
Regulation Or Resistance: A Counter-Narrative Of Constitutional Criminal Procedure, Alice Ristroph
Faculty Scholarship
No abstract provided.
Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas
Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas
Politics Summer Fellows
Contemporary mainstream discussions of the Supreme Court are often qualified with the warning that the nine justices are out of touch with everyday American life, especially when it comes to the newest and most popular technologies. For instance, during oral argument for City of Ontario v. Quon, a 2010 case that dealt with sexting on government-issued devices, Chief Justice John Roberts famously asked what the difference was “between email and a pager,” and Justice Antonin Scalia wondered if the “spicy little conversations” held via text message could be printed and distributed. While these comments have garnered a great deal of …
Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff
Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff
All Faculty Scholarship
The Supreme Court’s decision in Scott v. Harris has quickly become a staple in many Civil Procedure courses, and small wonder. The cinematic high-speed car chase complete with dash-cam video and the Court’s controversial treatment of that video evidence seem tailor-made for classroom discussion. As is often true with instant classics, however, splashy first impressions can mask a more complex state of affairs. At the heart of Scott v. Harris lies the potential for a radical doctrinal reformation: a shift in the core summary judgment standard undertaken to justify a massive expansion of interlocutory appellate jurisdiction in qualified immunity cases. …
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …
Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue
Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …
From Fugitives To Ferguson: Repairing Historical And Structural Defects In Legally Sanctioned Use Of Deadly Force, José F. Anderson
From Fugitives To Ferguson: Repairing Historical And Structural Defects In Legally Sanctioned Use Of Deadly Force, José F. Anderson
All Faculty Scholarship
The lawful use of lethal force to subdue suspected wrongdoers has a long tradition in our nation. There is certainly nothing wrong with securing, incapacitating, or even killing violent persons who pose a serious threat to the lives of innocent individuals. One of the important roles of government is to protect people from harm and keep the peace. Recent events in Ferguson, Missouri, have highlighted the tension between the officers on the beat and citizens on the street. These tensions are not likely to subside unless there are major structural changes in the way the police do their job and …
Unsexing The Fourth Amendment, I. Bennett Capers
Unsexing The Fourth Amendment, I. Bennett Capers
Faculty Scholarship
No abstract provided.
The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens
The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens
Faculty Scholarship
Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …
Cutting Cops Too Much Slack, Wayne A. Logan
Cutting Cops Too Much Slack, Wayne A. Logan
Scholarly Publications
Police officers can make mistakes, which, for better or worse, the U.S. Supreme Court has often seen fit to forgive. Police, for instance, can make mistakes of fact when assessing whether circumstances justify the seizure of an individual or search of a residence; they can even be mistaken about the identity of those they arrest. This essay examines yet another, arguably more significant context where police mistakes are forgiven: when they seize a person based on their misunderstanding of what a law prohibits.
Government Retention And Use Of Unlawfully Secured Dna Evidence, Wayne A. Logan
Government Retention And Use Of Unlawfully Secured Dna Evidence, Wayne A. Logan
Scholarly Publications
No abstract provided.
Big Data And Predictive Reasonable Suspicion, Andrew Ferguson
Big Data And Predictive Reasonable Suspicion, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …
Rights, Remedies, And The Quantum And Burden Of Proof, Joelle A. Moreno
Rights, Remedies, And The Quantum And Burden Of Proof, Joelle A. Moreno
Faculty Publications
It is tempting to commemorate the 2014 centenary of the exclusionary rule by celebrating our historically progressive role in constitutional rights protection, but those familiar with the facts know that Fourth Amendment violations persist unabated. As New Yorkers consider Judge Scheindlin’s damning assessment of police stop-and-frisk practices, and the country erupts in protests following fatal police encounters, are legal scholars who continue to pontificate on constitutional bona fides addressing “real” Fourth Amendment questions?
Traditional academic abstraction and artificial doctrinal divides obscure the fact that rights and remedies are defined by their operation. Constitutional rights have no value if, after they …
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele
Faculty Publications
This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …
Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell
Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell
Scholarly Articles
Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …
The Un-Territoriality Of Data, Jennifer Daskal
The Un-Territoriality Of Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …
The Death Penalty On The Streets: What The Eighth Amendment Can Teach About Regulating Police Use Of Force, Jelani Jefferson Exum
The Death Penalty On The Streets: What The Eighth Amendment Can Teach About Regulating Police Use Of Force, Jelani Jefferson Exum
Faculty Publications
(Excerpt)
The use of force by police officers has traditionally been analyzed through the lens of Fourth Amendment reasonableness. The Supreme Court has decided that the proper question regarding the excessiveness of police force is whether the police officer acted as a reasonable law enforcement officer. When that police force is fatal — what this Article deems the death penalty on the streets — the legal question is the same, leaving us with an analysis that requires a heavy reliance on the officer's version of events and a host of disagreement on what constitutes appropriate police action. Reasonable minds can, …
Substitute Arguments In Constitutional Law, Louis Michael Seidman
Substitute Arguments In Constitutional Law, Louis Michael Seidman
Georgetown Law Faculty Publications and Other Works
In this article, I argue that that substitution is crucial to our practice of constitutional law. Of course, if one wished, one could easily extend the domain of substitution beyond these boundaries. Substitute arguments are an important aspect of law more generally and, indeed, of life. I have nonetheless chosen to limit my discussion to constitutional substitution because, I believe, overt discussion of substitution in this particular area illuminates important aspects of our constitutional regime-–aspects that substitution itself regularly obscures. To put my central point directly, I hope to show that constitutional law amounts to one, giant substitute argument.
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin
Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin
UF Law Faculty Publications
This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA. Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …
A Comprehensive Analysis Of The History Of Interrogation Law, With Some Shots Directed At Miranda V. Arizona, Tracey Maclin
A Comprehensive Analysis Of The History Of Interrogation Law, With Some Shots Directed At Miranda V. Arizona, Tracey Maclin
UF Law Faculty Publications
Police interrogation is designed to convict suspects under arrest or those suspected of crime. It does not matter that the suspect may not be guilty; interrogation is instigated to obtain an incriminating statement that will help convict the suspect. While many are quick to defend what are considered the “respectable freedoms” embodied in the Constitution — freedom of speech, freedom of the press, and freedom of religion — few champion the Fifth Amendment’s bar against compelled self-incrimination, popularly known as the “right to remain silent,” as a basis for a suspect’s right to resist police questioning. Although it has been …
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Resisting Wholesale Electronic Invasion Of The Fourth Amendment, Michael E. Tigar
Resisting Wholesale Electronic Invasion Of The Fourth Amendment, Michael E. Tigar
Faculty Scholarship
No abstract provided.
Using The Dna Testing Of Arrestees To Reevaluate Fourth Amendment Doctrine, Steven P. Grossman
Using The Dna Testing Of Arrestees To Reevaluate Fourth Amendment Doctrine, Steven P. Grossman
All Faculty Scholarship
With the advent of DNA testing, numerous issues have arisen with regard to obtaining and using evidence developed from such testing. As courts have come to regard DNA testing as a reliable method for linking some people to crimes and for exonerating others, these issues are especially significant. The federal government and most states have enacted statutes that permit or direct the testing of those convicted of at least certain crimes. Courts have almost universally approved such testing, rejecting arguments that obtaining and using such evidence violates the Fourth Amendment.
More recently governments have enacted laws permitting or directing the …
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Publications
A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …
The Supreme Digital Divide, Mary Graw Leary
The Supreme Digital Divide, Mary Graw Leary
Scholarly Articles
Society has long struggled with the meaning of privacy in a modern world. This struggle is not new. With the advent of modern technology and information sharing, however, the challenges have become more complex. Socially, Americans seek to both protect their private lives, and also to utilize technology to connect with the world. Commercially, industries seek to obtain information from individuals, often without their consent, and sell it to the highest bidder. As technology has advanced, the ability of other individuals, institutions, and governments to encroach upon this privacy has strengthened. Nowhere is this tension between individual privacy rights and …
Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick
Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick
Hofstra Law Faculty Scholarship
This article looks at consequence, with a particular focus on the threatened use of a WMD, to begin a discussion on a new doctrinal solution to the hypothetical. As background, Part I takes a look at cardinal Fourth Amendment principles and rules, as well as the many exceptions to the warrant, probable cause and particularity requirements that the Supreme Court has recognized. Part I also discusses minimization, a well-established privacy enhancing mechanism that normally serves as a back-end check on the government’s conduct, to determine whether it can serve as a front-end substitute for the Fourth Amendment’s particularity requirement. Based …
Beyond The Fourth Amendment: Additional Constitutional Guarantees That Mass Surveillance Violates, Nadine Strossen
Beyond The Fourth Amendment: Additional Constitutional Guarantees That Mass Surveillance Violates, Nadine Strossen
Articles & Chapters
The ongoing dragnet communications surveillance programs raise multiple statutory and constitutional problems. Each problem alone, and even more so the whole combination, provides a serious ground at least for vastly curbing such programs, if not ending them. This Article reviews constitutional challenges to these programs to evaluate the likely success of current and future litigants.