Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Iright: There's No App For That, Justin Hinderliter Sep 2017

Iright: There's No App For That, Justin Hinderliter

Oklahoma Journal of Law and Technology

No abstract provided.


The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman Jul 2017

The Outer Limits: Imsi-Catchers, Technology, And The Future Of The Fourth Amendment, Ryan C. Chapman

Pepperdine Law Review

Recent advances in technology are posing new challenges for a legal system based on decades-old precedent. Nowhere is this more apparent than in law enforcement’s warrantless use of IMSI Catchers. These devices mimic a cell phone tower, and when the device is activated, cell phones will naturally connect to them. Law enforcement officers can use those intercepted cell phone signals to track a suspect’s movements in real time with startling accuracy. Scholarly commentary on these devices has largely concluded that their use requires a warrant. This Comment engages in a close examination of Fourth Amendment precedent and argues that, as …


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone Mar 2017

Game Of Phones: The Fourth Amendment Implications Of Real-Time Cell Phone Tracking, Cal Cumpstone

Cleveland State Law Review

With the help of technological advancements, law enforcement can now hijack a targeted individual’s cell phone to ping and track the phone’s exact location in real time. Based upon previous rulings, this new tracking process has apparently fallen into a "grey area" of Fourth Amendment jurisprudence. However, real-time cell phone tracking should be a search in terms of the Fourth Amendment and, therefore, require a warrant. Real-time cell phone tracking infringes on an individual’s reasonable expectation of privacy, violates the trespass doctrine as a trespass to chattels, and violates the Kyllo standard by using technology not in general public use …


Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell Feb 2017

Local Law Enforcement Jumps On The Big Data Bandwagon: Automated License Plate Recognition Systems, Infomation Privacy, And Access To Government Information, Bryce Clayton Newell

Maine Law Review

As government agencies and law enforcement departments increasingly adopt big-data surveillance technologies as part of their routine investigatory practice, personal information privacy concerns are becoming progressively more palpable. On the other hand, advancing technologies and data-mining potentially offer law enforcement greater ability to detect, investigate, and prosecute criminal activity. These concerns (for personal information privacy and the efficacy of law enforcement) are both very important in contemporary society. On one view, American privacy law has not kept up with advancing technological capabilities, and government agencies have arguably begun to overstep the acceptable boundaries of information access, violating the privacy of …


Simon Didn't Say: When Reconstruction Of A Private Search Goes Awry Under The Private Search Doctrine, John G. Chambers Jan 2017

Simon Didn't Say: When Reconstruction Of A Private Search Goes Awry Under The Private Search Doctrine, John G. Chambers

Georgia Law Review

A privateparty conducting an unreasonablesearch of an
individual need not fear the Fourth Amendment as the
proscriptions therein are applicable against only the
government. The government, however, need not fear the
Fourth Amendment where it replicates that private party's
unreasonable search. As such, the Fourth Amendment is
not offended where the government directs the private

party to "reconstruct" its initial search. This
reconstruction doctrine breeds many questions in
application, particularly in the digital context. In
grappling with these questions, this Note demonstrates
that the current law provides no satisfying answers. It
proposes a new test to assess reconstructed private party …