Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

Series

2015

Institution
Keyword
Publication

Articles 1 - 30 of 32

Full-Text Articles in Law

Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin Nov 2015

Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin

Faculty Scholarship

This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA.

Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …


The Right To Remain Armed, Jeffrey Bellin Oct 2015

The Right To Remain Armed, Jeffrey Bellin

Faculty Publications

The laws governing gun possession are changing rapidly. In the past two years, federal courts have wielded a revitalized Second Amendment to invalidate longstanding gun carrying restrictions in Chicago, the District of Columbia, and throughout California. Invoking similar Second Amendment themes, legislators across the country have steadily deregulated public gun carrying, preempting municipal gun control ordinances in cities like Philadelphia, Atlanta, and Cleveland.

These changes to substantive gun laws reverberate through the constitutional criminal procedure framework. By making it lawful for citizens to carry guns even in crowded urban areas, enhanced Second Amendment rights trigger Fourth Amendment protections that could …


Regulation Or Resistance: A Counter-Narrative Of Constitutional Criminal Procedure, Alice Ristroph Oct 2015

Regulation Or Resistance: A Counter-Narrative Of Constitutional Criminal Procedure, Alice Ristroph

Faculty Scholarship

No abstract provided.


Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas Jul 2015

Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas

Politics Summer Fellows

Contemporary mainstream discussions of the Supreme Court are often qualified with the warning that the nine justices are out of touch with everyday American life, especially when it comes to the newest and most popular technologies. For instance, during oral argument for City of Ontario v. Quon, a 2010 case that dealt with sexting on government-issued devices, Chief Justice John Roberts famously asked what the difference was “between email and a pager,” and Justice Antonin Scalia wondered if the “spicy little conversations” held via text message could be printed and distributed. While these comments have garnered a great deal of …


Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff Jul 2015

Scott V. Harris And The Future Of Summary Judgment, Tobias Barrington Wolff

All Faculty Scholarship

The Supreme Court’s decision in Scott v. Harris has quickly become a staple in many Civil Procedure courses, and small wonder. The cinematic high-speed car chase complete with dash-cam video and the Court’s controversial treatment of that video evidence seem tailor-made for classroom discussion. As is often true with instant classics, however, splashy first impressions can mask a more complex state of affairs. At the heart of Scott v. Harris lies the potential for a radical doctrinal reformation: a shift in the core summary judgment standard undertaken to justify a massive expansion of interlocutory appellate jurisdiction in qualified immunity cases. …


The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner Mar 2015

The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


From Fugitives To Ferguson: Repairing Historical And Structural Defects In Legally Sanctioned Use Of Deadly Force, José F. Anderson Jan 2015

From Fugitives To Ferguson: Repairing Historical And Structural Defects In Legally Sanctioned Use Of Deadly Force, José F. Anderson

All Faculty Scholarship

The lawful use of lethal force to subdue suspected wrongdoers has a long tradition in our nation. There is certainly nothing wrong with securing, incapacitating, or even killing violent persons who pose a serious threat to the lives of innocent individuals. One of the important roles of government is to protect people from harm and keep the peace. Recent events in Ferguson, Missouri, have highlighted the tension between the officers on the beat and citizens on the street. These tensions are not likely to subside unless there are major structural changes in the way the police do their job and …


Unsexing The Fourth Amendment, I. Bennett Capers Jan 2015

Unsexing The Fourth Amendment, I. Bennett Capers

Faculty Scholarship

No abstract provided.


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


Cutting Cops Too Much Slack, Wayne A. Logan Jan 2015

Cutting Cops Too Much Slack, Wayne A. Logan

Scholarly Publications

Police officers can make mistakes, which, for better or worse, the U.S. Supreme Court has often seen fit to forgive. Police, for instance, can make mistakes of fact when assessing whether circumstances justify the seizure of an individual or search of a residence; they can even be mistaken about the identity of those they arrest. This essay examines yet another, arguably more significant context where police mistakes are forgiven: when they seize a person based on their misunderstanding of what a law prohibits.


Government Retention And Use Of Unlawfully Secured Dna Evidence, Wayne A. Logan Jan 2015

Government Retention And Use Of Unlawfully Secured Dna Evidence, Wayne A. Logan

Scholarly Publications

No abstract provided.


Big Data And Predictive Reasonable Suspicion, Andrew Ferguson Jan 2015

Big Data And Predictive Reasonable Suspicion, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The Fourth Amendment requires “reasonable suspicion” to seize a suspect. As a general matter, the suspicion derives from information a police officer observes or knows. It is individualized to a particular person at a particular place. Most reasonable suspicion cases involve police confronting unknown suspects engaged in observable suspicious activities. Essentially, the reasonable suspicion doctrine is based on “small data” – discrete facts involving limited information and little knowledge about the suspect.But what if this small data is replaced by “big data”? What if police can “know” about the suspect through new networked information sources? Or, what if predictive analytics …


Rights, Remedies, And The Quantum And Burden Of Proof, Joelle A. Moreno Jan 2015

Rights, Remedies, And The Quantum And Burden Of Proof, Joelle A. Moreno

Faculty Publications

It is tempting to commemorate the 2014 centenary of the exclusionary rule by celebrating our historically progressive role in constitutional rights protection, but those familiar with the facts know that Fourth Amendment violations persist unabated. As New Yorkers consider Judge Scheindlin’s damning assessment of police stop-and-frisk practices, and the country erupts in protests following fatal police encounters, are legal scholars who continue to pontificate on constitutional bona fides addressing “real” Fourth Amendment questions?

Traditional academic abstraction and artificial doctrinal divides obscure the fact that rights and remedies are defined by their operation. Constitutional rights have no value if, after they …


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell Jan 2015

Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell

Scholarly Articles

Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …


The Un-Territoriality Of Data, Jennifer Daskal Jan 2015

The Un-Territoriality Of Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The …


The Death Penalty On The Streets: What The Eighth Amendment Can Teach About Regulating Police Use Of Force, Jelani Jefferson Exum Jan 2015

The Death Penalty On The Streets: What The Eighth Amendment Can Teach About Regulating Police Use Of Force, Jelani Jefferson Exum

Faculty Publications

(Excerpt)

The use of force by police officers has traditionally been analyzed through the lens of Fourth Amendment reasonableness. The Supreme Court has decided that the proper question regarding the excessiveness of police force is whether the police officer acted as a reasonable law enforcement officer. When that police force is fatal — what this Article deems the death penalty on the streets — the legal question is the same, leaving us with an analysis that requires a heavy reliance on the officer's version of events and a host of disagreement on what constitutes appropriate police action. Reasonable minds can, …


Substitute Arguments In Constitutional Law, Louis Michael Seidman Jan 2015

Substitute Arguments In Constitutional Law, Louis Michael Seidman

Georgetown Law Faculty Publications and Other Works

In this article, I argue that that substitution is crucial to our practice of constitutional law. Of course, if one wished, one could easily extend the domain of substitution beyond these boundaries. Substitute arguments are an important aspect of law more generally and, indeed, of life. I have nonetheless chosen to limit my discussion to constitutional substitution because, I believe, overt discussion of substitution in this particular area illuminates important aspects of our constitutional regime-–aspects that substitution itself regularly obscures. To put my central point directly, I hope to show that constitutional law amounts to one, giant substitute argument.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin Jan 2015

Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin

UF Law Faculty Publications

This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA. Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …


A Comprehensive Analysis Of The History Of Interrogation Law, With Some Shots Directed At Miranda V. Arizona, Tracey Maclin Jan 2015

A Comprehensive Analysis Of The History Of Interrogation Law, With Some Shots Directed At Miranda V. Arizona, Tracey Maclin

UF Law Faculty Publications

Police interrogation is designed to convict suspects under arrest or those suspected of crime. It does not matter that the suspect may not be guilty; interrogation is instigated to obtain an incriminating statement that will help convict the suspect. While many are quick to defend what are considered the “respectable freedoms” embodied in the Constitution — freedom of speech, freedom of the press, and freedom of religion — few champion the Fifth Amendment’s bar against compelled self-incrimination, popularly known as the “right to remain silent,” as a basis for a suspect’s right to resist police questioning. Although it has been …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney Jan 2015

Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney

Articles by Maurer Faculty

Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …


Resisting Wholesale Electronic Invasion Of The Fourth Amendment, Michael E. Tigar Jan 2015

Resisting Wholesale Electronic Invasion Of The Fourth Amendment, Michael E. Tigar

Faculty Scholarship

No abstract provided.


Using The Dna Testing Of Arrestees To Reevaluate Fourth Amendment Doctrine, Steven P. Grossman Jan 2015

Using The Dna Testing Of Arrestees To Reevaluate Fourth Amendment Doctrine, Steven P. Grossman

All Faculty Scholarship

With the advent of DNA testing, numerous issues have arisen with regard to obtaining and using evidence developed from such testing. As courts have come to regard DNA testing as a reliable method for linking some people to crimes and for exonerating others, these issues are especially significant. The federal government and most states have enacted statutes that permit or direct the testing of those convicted of at least certain crimes. Courts have almost universally approved such testing, rejecting arguments that obtaining and using such evidence violates the Fourth Amendment.

More recently governments have enacted laws permitting or directing the …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


The Supreme Digital Divide, Mary Graw Leary Jan 2015

The Supreme Digital Divide, Mary Graw Leary

Scholarly Articles

Society has long struggled with the meaning of privacy in a modern world. This struggle is not new. With the advent of modern technology and information sharing, however, the challenges have become more complex. Socially, Americans seek to both protect their private lives, and also to utilize technology to connect with the world. Commercially, industries seek to obtain information from individuals, often without their consent, and sell it to the highest bidder. As technology has advanced, the ability of other individuals, institutions, and governments to encroach upon this privacy has strengthened. Nowhere is this tension between individual privacy rights and …


Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick Jan 2015

Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick

Hofstra Law Faculty Scholarship

This article looks at consequence, with a particular focus on the threatened use of a WMD, to begin a discussion on a new doctrinal solution to the hypothetical. As background, Part I takes a look at cardinal Fourth Amendment principles and rules, as well as the many exceptions to the warrant, probable cause and particularity requirements that the Supreme Court has recognized. Part I also discusses minimization, a well-established privacy enhancing mechanism that normally serves as a back-end check on the government’s conduct, to determine whether it can serve as a front-end substitute for the Fourth Amendment’s particularity requirement. Based …


Beyond The Fourth Amendment: Additional Constitutional Guarantees That Mass Surveillance Violates, Nadine Strossen Jan 2015

Beyond The Fourth Amendment: Additional Constitutional Guarantees That Mass Surveillance Violates, Nadine Strossen

Articles & Chapters

The ongoing dragnet communications surveillance programs raise multiple statutory and constitutional problems. Each problem alone, and even more so the whole combination, provides a serious ground at least for vastly curbing such programs, if not ending them. This Article reviews constitutional challenges to these programs to evaluate the likely success of current and future litigants.