Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (9)
- Touro University Jacob D. Fuchsberg Law Center (8)
- Vanderbilt University Law School (6)
- Selected Works (5)
- American University Washington College of Law (4)
-
- Seattle University School of Law (3)
- University of Colorado Law School (3)
- Pepperdine University (2)
- SelectedWorks (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Baltimore Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- Boston University School of Law (1)
- Florida State University College of Law (1)
- Georgetown University Law Center (1)
- Roger Williams University (1)
- Schulich School of Law, Dalhousie University (1)
- St. Mary's University (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Missouri School of Law (1)
- University of Richmond (1)
- University of the District of Columbia School of Law (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Touro Law Review (8)
- All Faculty Scholarship (4)
- Articles in Law Reviews & Other Academic Journals (4)
- Stephen E Henderson (4)
- Articles (3)
-
- Michigan Law Review (3)
- Publications (3)
- Seattle University Law Review (3)
- Catholic University Journal of Law and Technology (2)
- Faculty Scholarship (2)
- Michigan Law Review First Impressions (2)
- Michigan Telecommunications & Technology Law Review (2)
- Pepperdine Law Review (2)
- Vanderbilt Law Review (2)
- Vanderbilt Law School Faculty Publications (2)
- Adam Lamparello (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Life of the Law School (1993- ) (1)
- Missouri Law Review (1)
- Rachel A. Harmon (1)
- Renée M. Hutchins (1)
- Reports & Public Policy Documents (1)
- Scholarly Articles (1)
- Scholarly Publications (1)
- St. Mary's Law Journal (1)
- University of Michigan Journal of Law Reform Caveat (1)
- University of Richmond Law Review (1)
- University of the District of Columbia Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Publication Type
- File Type
Articles 31 - 60 of 61
Full-Text Articles in Law
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
Michigan Telecommunications & Technology Law Review
In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …
Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell
Justice Scalia's Fourth Amendment: Text, Context, Clarity, And Occasional Faint-Hearted Originalism, Timothy C. Macdonnell
Scholarly Articles
Since joining the United States Supreme Court in 1986, Justice Scalia has been a prominent voice on the Fourth Amendment, having written twenty majority opinions, twelve concurrences, and six dissents on the topic. Under his pen, the Court has altered its test for determining when the Fourth Amendment should apply; provided a vision to address technology's encroachment on privacy; and articulated the standard for determining whether government officials are entitled to qualified immunity in civil suits involving alleged Fourth Amendment violations. In most of Justice Scalia's opinions, he has championed an originalist/textualist theory of constitutional interpretation. Based on that theory, …
Neuroprediction: New Technology, Old Problems, Stephen J. Morse
Neuroprediction: New Technology, Old Problems, Stephen J. Morse
All Faculty Scholarship
Neuroprediction is the use of structural or functional brain or nervous system variables to make any type of prediction, including medical prognoses and behavioral forecasts, such as an indicator of future dangerous behavior. This commentary will focus on behavioral predictions, but the analysis applies to any context. The general thesis is that using neurovariables for prediction is a new technology, but that it raises no new ethical issues, at least for now. Only if neuroscience achieves the ability to “read” mental content will genuinely new ethical issues be raised, but that is not possible at present.
Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman
Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman
Touro Law Review
No abstract provided.
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Adam Lamparello
Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.
When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …
Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson
Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Do citizens have any Fourth Amendment protection from sense-enhancing surveillance technologies in public? This article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces.This article proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Curtilage recognizes a buffer zone beyond the four corners of the home that deserves protection, even in public, even if accessible to public view. Based on …
Public Duties, Private Rights: Privacy And Unsubstantiated Allegations In Washington’S Public Records Act, Robert E. Miller
Public Duties, Private Rights: Privacy And Unsubstantiated Allegations In Washington’S Public Records Act, Robert E. Miller
Seattle University Law Review
Open government laws allow private citizens to monitor public servants. But this vital function of access presents a clash of competing interests: the privacy of public employees versus the public’s right to know. Washington’s Public Records Act (PRA) seeks to balance these interests, and the Washington Supreme Court has fought to adhere to the PRA’s spirit of open government while creating bright-line rules for the ease of government agencies. The Bainbridge Island Police Guild court held that investigative reports of unsubstantiated allegations of sexual misconduct against public officials are highly offensive to a reasonable person and that the public has …
The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy
Michigan Law Review
When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States Code currently contains over twenty separate statutes that restrict both the acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to driver's licenses, educational records, health histories, telephone calls, email messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards - ranging from …
After Dothard: Female Correctional Workers And The Challenge To Employment Law, Brenda V. Smith, Melissa C. Loomis
After Dothard: Female Correctional Workers And The Challenge To Employment Law, Brenda V. Smith, Melissa C. Loomis
Articles in Law Reviews & Other Academic Journals
This article examines a profession where women have made great strides - corrections. Using an equality framework, corrections and other non-traditional professions were the first target of the feminist movement in the 1970s. By and large, feminists were successful in creating greater porosity for women in law enforcement, emergency services, corrections, and the military. While women have entered these traditionally masculine spaces, they still suffer from an achievement gap. They are still underrepresented in leadership positions and marginalized in these settings; are still the targets of discrimination based on race, gender, and perceived sexual orientation; and are less likely than …
Substance And Method In The Year 2000, Akhil Reed Amar
Substance And Method In The Year 2000, Akhil Reed Amar
Pepperdine Law Review
No abstract provided.
Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright
Wilson V. Layne: Increasing The Scope Of The Fourth Amendment Right To Privacy, Ashlea Wright
Pepperdine Law Review
No abstract provided.
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
Renée M. Hutchins
No abstract provided.
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
University of Michigan Journal of Law Reform Caveat
Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.
Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus
Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus
Articles
Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …
How United States V. Jones Can Restore Our Faith In The Fourth Amendment, Erica Goldberg
How United States V. Jones Can Restore Our Faith In The Fourth Amendment, Erica Goldberg
Michigan Law Review First Impressions
United States v. Jones, issued in January of this year, is a landmark case that has the potential to restore a property-based interpretation of the Fourth Amendment to prominence. In 1967, the Supreme Court abandoned its previous Fourth Amendment framework, which had viewed the prohibition on unreasonable searches in light of property and trespass laws, and replaced it with a rule protecting the public’s reasonable expectations of privacy. Although the Court may have intended this reasonable expectations test to provide more protection than a test rooted in property law, the new test in fact made the Justices’ subjective views about …
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins
Faculty Scholarship
No abstract provided.
The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray
The Double-Helix Double-Edged Sword: Comparing Dna Retention Policies Of The United States And The United Kingdom, Erica S. Deray
Vanderbilt Journal of Transnational Law
Forensic scientists have used DNA profiling technologies to link suspects to crimes since Alec Jeffreys first proposed the idea in the 1970s. Recognizing the potential for using DNA databases to solve crimes and to prevent future crimes, England and Wales attempted to greatly expand its DNA database by allowing for the collection and indefinite retention of DNA profiles from arrestees. The European Court of Human Rights, however, issued a ruling in 2008 in the case of S. & Marper v. United Kingdom, advising the United Kingdom to restrict use of DNA profiles from arrestees and to establish time frames for …
Relative Doubt: Familial Searches Of Dna Databases, Erin Murphy
Relative Doubt: Familial Searches Of Dna Databases, Erin Murphy
Michigan Law Review
The continued growth of forensic DNA databases has brought about greater interest in a search method known as "familial" or "kinship" matching. Whereas a typical database search seeks the source of a crime-scene stain by making an exact match between a known person and the DNA sample, familial searching instead looks for partial matches in order to find potential relatives of the source. The use of a familial DNA search to identify the alleged "Grim Sleeper" killer in California brought national attention to the method, which has many proponents. In contrast, this Article argues against the practice of familial searching …
Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson
Reflections On Standing: Challenges To Searches And Seizures In A High Technology World, José F. Anderson
All Faculty Scholarship
Among the profound issues that surround constitutional criminal procedure is the obscure often overlooked issue of who has standing to challenge an illegal search, seizure or confession. Privacy interests are often overlooked because without a legal status that allows a person to complain in court, there is no way to challenge whether one is constitutionally protected from personal invasions. Standing is that procedural barrier often imposed to prevent a person in a case from objecting to improper police conduct because of his or her relationship of ownership, proximity, location, or interest in an item searched or a thing seized. Although …
Subpoenas And Privacy, Christopher Slobogin
Subpoenas And Privacy, Christopher Slobogin
Vanderbilt Law School Faculty Publications
This symposium article, the first of two on regulation of government's efforts to obtain paper and digital records of our activities, analyzes the constitutional legitimacy of subpoenas. Whether issued by a grand jury or an administrative agency, subpoenas are extremely easy to enforce, merely requiring the government to demonstrate that the items sought pursuant to the subpoena are "relevant" to a investigation. Yet today subpoenas and pseudo-subpoenas are routinely used not only to obtain business records and the like, but also documents containing significant amounts of personal information about individuals, including medical, financial, and email records. Part I provides an …
Presentation By Councilmember Kathy Patterson, Kathy Patterson
Presentation By Councilmember Kathy Patterson, Kathy Patterson
University of the District of Columbia Law Review
No abstract provided.
We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss
We Can Do This The Easy Way Or The Hard Way: The Use Of Deceit To Induce Consent Searches, Rebecca Strauss
Michigan Law Review
In October of 1995, Aaron Salvo was studying and living at Ashland College. College officials informed local FBI agents that they suspected Salvo of possible child molestation and related conduct based on incriminating electronic mail. FBI agents approached Salvo at his dormitory, asked to speak with him in private about the suspicious mail, and suggested they speak in Salvo's dorm room. Salvo agreed to speak with the officers, but declined to do so in his room because his roommate was there, and he did not want to get anyone else involved in the embarrassing nature of the upcoming conversation. Salvo …
Protecting Privacy On The Front Page: Why Restrictions On Commercial Use Of Law Enforcement Records Violate The First Amendment, Jason L. Cagle
Protecting Privacy On The Front Page: Why Restrictions On Commercial Use Of Law Enforcement Records Violate The First Amendment, Jason L. Cagle
Vanderbilt Law Review
An individual is involved in an automobile accident and is arrested for driving under the influence. A few days after being re- leased, he receives several letters in the mail. One is from a chiropractor offering services to treat his injuries. Another is from an alcohol abuse treatment center. Yet another is from an attorney who defends traffic offenses. Each of the solicitors obtained the individual's name and address from publicly available records concerning the incident. The letters are truthful and not misleading, but utilize publicly available information for purely commercial purposes at the expense of the individual's privacy.
Several …
Constitutional Posture Of Canine Sniffs, Lina Shahin
Constitutional Posture Of Canine Sniffs, Lina Shahin
Touro Law Review
No abstract provided.
Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley
Privatization Of Corrections: Is The State Out On A Limb When The Company Goes Bankrupt?, Cathy E. Holley
Vanderbilt Law Review
The incarceration of convicted criminals is an important matter to law enforcement officials and the public at large. Institutional correctional services consume significant governmental energy and resources. In 1983 corrections, including jails, prisons, probation, and parole, cost over 10.4 billion dollars. In 1985 approximately 503,000 people were imprisoned in federal and state correctional facilities.' The provision of prison services must occur on a continuous basis, and space must be available for every convicted criminal. As certain commentators have noted, "[o]ne cannot simply let offenders wait in line for an opening."'Historically, local, state, and federal government has overseen and operated our …