Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

Selected Works

2016

Fourth Amendment

Articles 1 - 5 of 5

Full-Text Articles in Law

On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye Mar 2016

On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye

David Kaye

For nearly a decade, DNA-on-arrest laws eluded scrutiny in the courts. For another five years, they withstood a gathering storm of constitutional challenges. In Maryland v. King, however, Maryland's highest court reasoned that usually fingerprints provide everything police need to establish the true identity of an individual before trial and that the state's interest in finding the perpetrators of crimes by trawling databases of DNA profiles is too "generalized" to support "a warrantless, suspicionless search." The U.S. Supreme Court reacted forcefully. Chief Justice Roberts stayed the Maryland judgment, writing that "given the considered analysis of courts on the other side …


Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye Mar 2016

Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye

David Kaye

In Maryland v. King, the Supreme Court applied a balancing test to uphold a Maryland statute mandating preconviction collection and analysis of DNA from individuals charged with certain crimes. The DNA profiles are limited to an inherited set of DNA sequences that are not known to be functional and that are tokens of individual identity. This invited online essay examines two aspects of an article on the case by Professor Erin Murphy. I question the claim that the case is pivotal in a conceivable abandonment of the per se rule that warrantless, suspicionless searches are unconstitutional unless they fall …


Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried Mar 2016

Dna Typing: Emerging Or Neglected Issues, David H. Kaye, Edward J. Imwinkelried

David Kaye

DNA typing has had a major impact on the criminal justice system. There are hundreds of opinions and thousands of cases dealing with DNA evidence. Yet, at virtually every stage of the process, there are important issues that are just emerging or that have been neglected.At the investigative stage, courts have barely begun to focus on the legal limitations on the power of the police to obtain samples directly from suspects and to use the data from DNA samples in various ways. Issues such as the propriety of "DNA dragnets" (in which large numbers of individuals in a geographic area …


Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith Mar 2016

Dna Identification Databases: Legality, Legitimacy, And The Case For Population-Wide Coverage, David H. Kaye, Michael E. Smith

David Kaye

Over the past decade, law enforcement authorities have amassed huge collections of DNA samples and the identifying profiles derived from them. Large DNA databanks routinely help to identify the guilty and to exonerate the innocent, but as the databanks grow, so do fears about civil liberties. Perhaps the most controversial policy issue in the creation of these databases is the question of coverage: Whose DNA profiles should be stored in them? The possibilities extend from convicted violent sex offenders to all convicted felons, to everyone arrested, to the entire population. This Article questions the rationales for drawing the line at …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …