Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

The Mosaic Theory Of The Fourth Amendment, Orin S. Kerr Jul 2019

The Mosaic Theory Of The Fourth Amendment, Orin S. Kerr

Orin Kerr

In the Supreme Court's recent decision on GPS surveillance, United States v. Jones, five justices authored or joined concurring opinions that applied a new approach to interpreting Fourth Amendment protection. Before Jones, Fourth Amendment decisions had always evaluated each step of an investigation individually. Jones introduced what we might call a "mosaic theory" of the Fourth Amendment, by which courts evaluate a collective sequence of government activity as an aggregated whole to consider whether the sequence amounts to a search. This Article considers the implications of a mosaic theory of the Fourth Amendment. It explores the choices and puzzles that …


Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker Jun 2019

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker

Articles

In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.


The Quantum Of Suspicion Needed For An Exigent Circumstances Search, Kit Kinports Apr 2019

The Quantum Of Suspicion Needed For An Exigent Circumstances Search, Kit Kinports

University of Michigan Journal of Law Reform

For decades, the United States Supreme Court opinions articulating the standard of exigency necessary to trigger the exigent circumstances exception to the Fourth Amendment’s warrant requirement have been maddeningly opaque and confusing. Some cases require probable cause, others call for reasonable suspicion, and still, others use undefined and unhelpful terms such as “reasonable to believe” in describing how exigent the situation must be to permit the police to proceed without a warrant. Not surprisingly, the conflicting signals coming from the Supreme Court have led to disagreement in the lower courts.

To resolve this conflict and provide guidance to law enforcement …


Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern Jan 2019

Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern

Michigan Law Review

The Stored Communications Act (“SCA”) arms federal law enforcement agencies with the ability to use a special type of warrant to access users’ electronically stored communications. In some circumstances, SCA warrants can require service providers to bundle and produce a user’s electronically stored communications without ever disclosing the existence of the warrant to the individual user until charges are brought. Users that are charged will ultimately receive notice of the search after the fact through their legal proceedings. Users that are never charged, however, may never know that their communications were obtained and searched. This practice effectively makes the provisions …