Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 272

Full-Text Articles in Law

The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter Oct 2020

Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter

Washington and Lee Journal of Civil Rights and Social Justice

You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.

Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.

Accordingly, the United States government has been …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore May 2020

Cell-Site Location Information And The Privacies Of Life: The Impact Of Carpenter V. United States, Trevor Moore

Loyola of Los Angeles Law Review

No abstract provided.


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez Jan 2020

A New Era: Digital Curtilage And Alexa-Enabled Smart Home Devices, Johanna Sanchez

Touro Law Review

No abstract provided.


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


United States V. Touset, Katelyn James Jan 2020

United States V. Touset, Katelyn James

NYLS Law Review

No abstract provided.


Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin Dec 2019

Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin

Faculty Scholarship

This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …


The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern Sep 2019

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

James Y. Stern

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


The Case For The Third-Party Doctrine, Orin S. Kerr Jul 2019

The Case For The Third-Party Doctrine, Orin S. Kerr

Orin Kerr

This Article offers a defense of the Fourth Amendment's third party doctrine, the controversial rule that information loses Fourth Amendment protection when it is knowingly revealed to a third party. Fourth Amendment scholars have repeatedly attacked the rule on the ground that it is unpersuasive on its face and gives the government too much power This Article responds that critics have overlooked the benefits of the rule and have overstated its weaknesses. The third-party doctrine serves two critical functions. First, the doctrine ensures the technological neutrality of the Fourth Amendment. It corrects for the substitution effect of third parties that …


Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash Jun 2019

Automated License Plate Readers: The Difficult Balance Of Solving Crime And Protecting Individual Privacy, Lauren Fash

Maryland Law Review Online

No abstract provided.


Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones May 2019

Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones

Cleveland State Law Review

Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …


Alexa, Amazon Assistant Or Government Informant?, Julia R. Shackleton Esq. Apr 2019

Alexa, Amazon Assistant Or Government Informant?, Julia R. Shackleton Esq.

University of Miami Business Law Review

Alexa, are you listening to me? Technology has become an integral part of one’s everyday life with voice-controlled devices pervading our most intimate interactions and spaces within the home. The answers to our questions are now at our fingertips with the simple roll of the tongue “Alexa,” your very own personal intelligence assistant. This futuristic household tool can perform tasks that range from answering simple voice commands to ordering any online shopping. However, the advent of voice technology presents a myriad of problems. Concerns arise as these new devices live in the privacy of our homes while quietly listening for …


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr Feb 2019

When A Tent Is Your Castle: Constitutional Protection Against Unreasonable Searches Of Makeshift Dwellings Of Unhoused Persons, Evanie Parr

Seattle University Law Review

This Note will argue that all jurisdictions should follow the Washington State Court of Appeals, Division II in validating makeshift dwellings used by people experiencing homelessness as spaces protected from unwarranted police intrusions by shifting evaluations of “reasonable expectations of privacy” to a more equitable standard that appreciates the realities of economic disparity. This approach to constitutional protections against unreasonable searches and seizures is imperative to protect the rights of people experiencing homelessness, given that such individuals are regularly subjected to invasions of privacy and heightened exposure to the criminal justice system.


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin Jan 2019

Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin

Faculty Scholarship

No discerning student of the Supreme Court would contend that Justice Anthony Kennedy broadly interpreted the Fourth Amendment during his thirty years on the Court. His majority opinions in Maryland v. King, Drayton v. United States and his willingness to join the three key sections of Justice Scalia’s opinion in Hudson v. Maryland, which held that suppression is never a remedy for knock-and-announce violations, are just a few examples of Justice Kennedy’s narrow view of the Fourth Amendment.

In light of his previous votes in search and seizure cases, surprisingly Justice Kennedy, in what would be his final Fourth Amendment …


Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin Jan 2019

Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin

UF Law Faculty Publications

This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …


The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey Jan 2019

The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey

Faculty Scholarship

Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …


Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue Jan 2019

Functional Equivalence And Residual Rights Post-Carpenter: Framing A Test Consistent With Precedent And Original Meaning, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Carpenter Court held that warrantless access to seven or more days of cell site location information (CSLI) constitutes a violation of the reasonable expectation of privacy that individuals have in the whole of their physical movements. But the grounds on which the Court drew a line characterize all sorts of digital records—including those at issue in Miller and Smith, belying the majority’s claim that the decision leaves third-party doctrine intact. Instead of avoiding Katz’s pitfalls, moreover, the Court emphasized voluntary assumption of risk, doubling down on the subjective nature of judicial determination. The decision will likely lead to …


Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral Dec 2018

Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral

University of Miami Business Law Review

No abstract provided.


Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller Nov 2018

Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller

Loyola of Los Angeles Law Review

During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.

Although …


Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, Jj Prescott Apr 2018

Fourth Amendment Constraints On The Technological Monitoring Of Convicted Sex Offenders, Ben A. Mcjunkin, Jj Prescott

Law & Economics Working Papers

More than forty U.S. states currently track at least some of their convicted sex offenders using GPS devices. Many offenders will be monitored for life. The burdens and expense of living indefinitely under constant technological monitoring have been well documented, but most commentators have assumed that these burdens were of no constitutional moment because states have characterized such surveillance as “civil” in character — and courts have seemed to agree. In 2015, however, the Supreme Court decided in Grady v. North Carolina that attaching a GPS monitoring device to a person was a Fourth Amendment search, notwithstanding the ostensibly civil …


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


Katz V. United States: Back To The Future?, Michael Vitiello Jan 2018

Katz V. United States: Back To The Future?, Michael Vitiello

University of Richmond Law Review

No abstract provided.