Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Knowledge And Fourth Amendment Privacy, Matthew Tokson Dec 2016

Knowledge And Fourth Amendment Privacy, Matthew Tokson

Northwestern University Law Review

This Article examines the central role that knowledge plays in determining the Fourth Amendment’s scope. What people know about surveillance practices or new technologies often shapes the “reasonable expectations of privacy” that define the Fourth Amendment’s boundaries. From early decisions dealing with automobile searches to recent cases involving advanced information technologies, courts have relied on assessments of knowledge in a wide variety of Fourth Amendment contexts. Yet the analysis of knowledge in Fourth Amendment law is rarely if ever studied on its own.

This Article fills that gap. It starts by identifying the characteristics of Fourth Amendment knowledge. It finds, …


Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen Aug 2016

Cell Phone Searches After Riley: Establishing Probable Cause And Applying Search Warrant Exceptions, Erica L. Danielsen

Pace Law Review

Part I of this note discusses the Fourth Amendment’s protection against unreasonable search and seizures and its probable cause requirement. The Fourth Amendment’s text remains the same since its enactment. However, interpretation of the Fourth Amendment continues to evolve in order to stay current with society. Interpretation of the Fourth Amendment also varies based on state constitutional law since states can provide its citizens with greater protection than the United States Constitution. This is why the United States Supreme Court, federal district courts, and state courts have all undergone thorough Fourth Amendment analyses when applying the true meaning of the …


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin Jan 2016

Never Alone: Why The Inevitable Influx Of Drones Necessitates A New Fourth Amendment Standard That Adequately Protects Reasonable Expectations Of Privacy, Paul Burgin

University of Baltimore Law Review

In June 2011, North Dakota cattle rancher Rodney Brossart became the first American to be arrested with the aid of a drone (Unmanned Aircraft System(s) or UAS) operated by law enforcement. Six cows found their way onto Brossart's property, and he refused to turn them over to law enforcement officials. Brossart and a few family members chased police officers off of his property at gunpoint, and police later returned with a warrant and SWAT team. A sixteen-hour standoff ensued until police called in the assistance of a UAS to pinpoint Brossart's exact location. Shortly thereafter, SWAT officers rushed in, tased, …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …