Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Law
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Oklahoma Journal of Law and Technology
No abstract provided.
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Oklahoma Journal of Law and Technology
No abstract provided.
Iright: There's No App For That, Justin Hinderliter
Iright: There's No App For That, Justin Hinderliter
Oklahoma Journal of Law and Technology
No abstract provided.
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman
Pepperdine Law Review
Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone
Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone
Cleveland State Law Review
With the help of technological advancements, law enforcement can now hijack a targeted individual’s cell phone to ping and track the phone’s exact location in real time. Based upon previous rulings, this new tracking process has apparently fallen into a "grey area" of Fourth Amendment jurisprudence. However, real-time cell phone tracking should be a search in terms of the Fourth Amendment and, therefore, require a warrant. Real-time cell phone tracking infringes on an individual’s reasonable expectation of privacy, violates the trespass doctrine as a trespass to chattels, and violates the Kyllo standard by using technology not in general public use …
Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell
Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell
Maine Law Review
As government agencies and law enforcement departments increasingly adopt big-data surveillance technologies as part of their routine investigatory practice, personal information privacy concerns are becoming progressively more palpable. On the other hand, advancing technologies and data-mining potentially offer law enforcement greater ability to detect, investigate, and prosecute criminal activity. These concerns (for personal information privacy and the efficacy of law enforcement) are both very important in contemporary society. On one view, American privacy law has not kept up with advancing technological capabilities, and government agencies have arguably begun to overstep the acceptable boundaries of information access, violating the privacy of …
Simon Didn't Say: When Reconstruction Of A Private Search Goes Awry Under The Private Search Doctrine, John G. Chambers
Simon Didn't Say: When Reconstruction Of A Private Search Goes Awry Under The Private Search Doctrine, John G. Chambers
Georgia Law Review
A privateparty conducting an unreasonablesearch of an
individual need not fear the Fourth Amendment as the
proscriptions therein are applicable against only the
government. The government, however, need not fear the
Fourth Amendment where it replicates that private party's
unreasonable search. As such, the Fourth Amendment is
not offended where the government directs the private
party to "reconstruct" its initial search. This
reconstruction doctrine breeds many questions in
application, particularly in the digital context. In
grappling with these questions, this Note demonstrates
that the current law provides no satisfying answers. It
proposes a new test to assess reconstructed private party …