Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law Enforcement and Corrections

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 61

Full-Text Articles in Law

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst Jan 2015

No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst

Michigan Telecommunications & Technology Law Review

In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …


Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell Jan 2015

Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell

Scholarly Articles

Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …


Neuroprediction: New Technology, Old Problems, Stephen J. Morse Jan 2015

Neuroprediction: New Technology, Old Problems, Stephen J. Morse

All Faculty Scholarship

Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.


Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman May 2014

Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman

Touro Law Review

No abstract provided.


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson Jan 2014

Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Do citizens have any Fourth Amendment protection from sense-enhancing surveillance technologies in public? This article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces.This article proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Curtilage recognizes a buffer zone beyond the four corners of the home that deserves protection, even in public, even if accessible to public view. Based on …


Public Duties, Private Rights: Privacy And Unsubstantiated Allegations In Washington’S Public Records Act, Robert E. Miller May 2013

Public Duties, Private Rights: Privacy And Unsubstantiated Allegations In Washington’S Public Records Act, Robert E. Miller

Seattle University Law Review

Open government laws allow private citizens to monitor public servants. But this vital function of access presents a clash of competing interests: the privacy of public employees versus the public’s right to know. Washington’s Public Records Act (PRA) seeks to balance these interests, and the Washington Supreme Court has fought to adhere to the PRA’s spirit of open government while creating bright-line rules for the ease of government agencies. The Bainbridge Island Police Guild court held that investigative reports of unsubstantiated allegations of sexual misconduct against public officials are highly offensive to a reasonable person and that the public has …


The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy Feb 2013

The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy

Michigan Law Review

When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States Code currently contains over twenty separate statutes that restrict both the acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to driver's licenses, educational records, health histories, telephone calls, email messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards - ranging from …


After Dothard: Female Correctional Workers And The Challenge To Employment Law, Brenda V. Smith, Melissa C. Loomis Jan 2013

After Dothard: Female Correctional Workers And The Challenge To Employment Law, Brenda V. Smith, Melissa C. Loomis

Articles in Law Reviews & Other Academic Journals

This article examines a profession where women have made great strides - corrections. Using an equality framework, corrections and other non-traditional professions were the first target of the feminist movement in the 1970s. By and large, feminists were successful in creating greater porosity for women in law enforcement, emergency services, corrections, and the military. While women have entered these traditionally masculine spaces, they still suffer from an achievement gap. They are still underrepresented in leadership positions and marginalized in these settings; are still the targets of discrimination based on race, gender, and perceived sexual orientation; and are less likely than …


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright Jul 2012

Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright

Pepperdine Law Review

No abstract provided.


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins Apr 2012

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins

Renée M. Hutchins

No abstract provided.


The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi Jan 2012

The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi

University of Michigan Journal of Law Reform Caveat

Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.


Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus Jan 2012

Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus

Articles

Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …


How United States V. Jones Can Restore Our Faith In The Fourth Amendment, Erica Goldberg Mar 2011

How United States V. Jones Can Restore Our Faith In The Fourth Amendment, Erica Goldberg

Michigan Law Review First Impressions

United States v. Jones, issued in January of this year, is a landmark case that has the potential to restore a property-based interpretation of the Fourth Amendment to prominence. In 1967, the Supreme Court abandoned its previous Fourth Amendment framework, which had viewed the prohibition on unreasonable searches in light of property and trespass laws, and replaced it with a rule protecting the public’s reasonable expectations of privacy. Although the Court may have intended this reasonable expectations test to provide more protection than a test rooted in property law, the new test in fact made the Justices’ subjective views about …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins Mar 2011

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins

Faculty Scholarship

No abstract provided.


The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray Jan 2011

The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray

Vanderbilt Journal of Transnational Law

Forensic scientists have used DNA profiling technologies to link suspects to crimes since Alec Jeffreys first proposed the idea in the 1970s. Recognizing the potential for using DNA databases to solve crimes and to prevent future crimes, England and Wales attempted to greatly expand its DNA database by allowing for the collection and indefinite retention of DNA profiles from arrestees. The European Court of Human Rights, however, issued a ruling in 2008 in the case of S. & Marper v. United Kingdom, advising the United Kingdom to restrict use of DNA profiles from arrestees and to establish time frames for …


Relative Doubt: Familial Searches Of Dna Databases, Erin Murphy Jan 2010

Relative Doubt: Familial Searches Of Dna Databases, Erin Murphy

Michigan Law Review

The continued growth of forensic DNA databases has brought about greater interest in a search method known as "familial" or "kinship" matching. Whereas a typical database search seeks the source of a crime-scene stain by making an exact match between a known person and the DNA sample, familial searching instead looks for partial matches in order to find potential relatives of the source. The use of a familial DNA search to identify the alleged "Grim Sleeper" killer in California brought national attention to the method, which has many proponents. In contrast, this Article argues against the practice of familial searching …


Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson Apr 2006

Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson

All Faculty Scholarship

Among the profound issues that surround constitutional criminal procedure is the obscure often overlooked issue of who has standing to challenge an illegal search, seizure or confession. Privacy interests are often overlooked because without a legal status that allows a person to complain in court, there is no way to challenge whether one is constitutionally protected from personal invasions. Standing is that procedural barrier often imposed to prevent a person in a case from objecting to improper police conduct because of his or her relationship of ownership, proximity, location, or interest in an item searched or a thing seized. Although …


Subpoenas And Privacy, Christopher Slobogin Jan 2005

Subpoenas And Privacy, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This symposium article, the first of two on regulation of government's efforts to obtain paper and digital records of our activities, analyzes the constitutional legitimacy of subpoenas. Whether issued by a grand jury or an administrative agency, subpoenas are extremely easy to enforce, merely requiring the government to demonstrate that the items sought pursuant to the subpoena are "relevant" to a investigation. Yet today subpoenas and pseudo-subpoenas are routinely used not only to obtain business records and the like, but also documents containing significant amounts of personal information about individuals, including medical, financial, and email records. Part I provides an …


Presentation By Councilmember Kathy Patterson, Kathy Patterson Sep 2004

Presentation By Councilmember Kathy Patterson, Kathy Patterson

University of the District of Columbia Law Review

No abstract provided.


We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss Feb 2002

We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss

Michigan Law Review

In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …


Protecting Privacy On The Front Page: Why Restrictions On Commercial Use Of Law Enforcement Records Violate The First Amendment, Jason L. Cagle Oct 1999

Protecting Privacy On The Front Page: Why Restrictions On Commercial Use Of Law Enforcement Records Violate The First Amendment, Jason L. Cagle

Vanderbilt Law Review

An individual is involved in an automobile accident and is arrested for driving under the influence. A few days after being re- leased, he receives several letters in the mail. One is from a chiropractor offering services to treat his injuries. Another is from an alcohol abuse treatment center. Yet another is from an attorney who defends traffic offenses. Each of the solicitors obtained the individual's name and address from publicly available records concerning the incident. The letters are truthful and not misleading, but utilize publicly available information for purely commercial purposes at the expense of the individual's privacy.

Several …


Search & Seizure Jan 1995

Search & Seizure

Touro Law Review

No abstract provided.


Constitutional Posture Of Canine Sniffs, Lina Shahin Jan 1993

Constitutional Posture Of Canine Sniffs, Lina Shahin

Touro Law Review

No abstract provided.


Search & Seizure Jan 1993

Search & Seizure

Touro Law Review

No abstract provided.


Searches And Seizure Jan 1992

Searches And Seizure

Touro Law Review

No abstract provided.


Searches And Seizure Jan 1992

Searches And Seizure

Touro Law Review

No abstract provided.


Search And Seizure Jan 1991

Search And Seizure

Touro Law Review

No abstract provided.


Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley Mar 1988

Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley

Vanderbilt Law Review

The incarceration of convicted criminals is an important matter to law enforcement officials and the public at large. Institutional correctional services consume significant governmental energy and resources. In 1983 corrections, including jails, prisons, probation, and parole, cost over 10.4 billion dollars. In 1985 approximately 503,000 people were imprisoned in federal and state correctional facilities.' The provision of prison services must occur on a continuous basis, and space must be available for every convicted criminal. As certain commentators have noted, "[o]ne cannot simply let offenders wait in line for an opening."'Historically, local, state, and federal government has overseen and operated our …