Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Dead Canaries In The Coal Mines: The Symbolic Assailant Revisited, Jeannine Bell May 2018

Dead Canaries In The Coal Mines: The Symbolic Assailant Revisited, Jeannine Bell

Georgia State University Law Review

The well-publicized deaths of several African-Americans—Tamir Rice, Philando Castile, and Alton Sterling among others—at the hands of police stem from tragic interactions predicated upon well-understood practices analyzed by police scholars since the 1950s. The symbolic assailant, a construct created by police scholar Jerome Skolnick in the mid-1960s to identify persons whose behavior and characteristics the police view as threatening, is especially relevant to contemporary policing. This Article explores the societal roots of the creation of a Black symbolic assailant in contemporary American policing.

The construction of African-American men as symbolic assailants is one of the most important factors characterizing police …


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso

Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …