Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (26)
- Constitutional Law (19)
- Criminal Procedure (14)
- Privacy Law (13)
- Supreme Court of the United States (11)
-
- Criminal Law (8)
- Law Enforcement and Corrections (7)
- Jurisprudence (5)
- Evidence (4)
- Internet Law (4)
- Law and Society (4)
- Science and Technology Law (4)
- Communications Law (3)
- Courts (3)
- National Security Law (3)
- Civil Procedure (2)
- Civil Rights and Discrimination (2)
- Computer Law (2)
- Consumer Protection Law (2)
- First Amendment (2)
- Fourteenth Amendment (2)
- Legal Education (2)
- Legal History (2)
- Legal Profession (2)
- Legal Remedies (2)
- Legal Studies (2)
- Other Law (2)
- Social and Behavioral Sciences (2)
- State and Local Government Law (2)
- Institution
-
- Seattle University School of Law (3)
- St. John's University School of Law (3)
- The University of Akron (3)
- American University Washington College of Law (2)
- Maurer School of Law: Indiana University (2)
-
- SJ Quinney College of Law, University of Utah (2)
- Texas A&M University School of Law (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Arkansas, Fayetteville (2)
- Belmont University (1)
- Boston University School of Law (1)
- Cleveland State University (1)
- Duke Law (1)
- George Washington University Law School (1)
- Liberty University (1)
- Mitchell Hamline School of Law (1)
- New York Law School (1)
- Penn State Law (1)
- Seton Hall University (1)
- St. Mary's University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Denver (1)
- University of Pennsylvania Carey Law School (1)
- University of South Carolina (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- Washington University in St. Louis (1)
- Publication
-
- Seattle University Law Review (3)
- St. John's Law Review (3)
- Arkansas Law Review (2)
- Articles in Law Reviews & Other Academic Journals (2)
- ConLawNOW (2)
-
- Faculty Scholarship (2)
- Indiana Law Journal (2)
- Utah Law Faculty Scholarship (2)
- Akron Law Review (1)
- All Faculty Scholarship (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Cleveland State Law Review (1)
- Duke Journal of Constitutional Law & Public Policy Sidebar (1)
- Faculty Publications (1)
- GW Law Faculty Publications & Other Works (1)
- Health Law Outlook (1)
- Journal Articles (1)
- Law Faculty Scholarship (1)
- Mitchell Hamline Law Review (1)
- NYLS Law Review (1)
- Scholarship@WashULaw (1)
- Senior Honors Theses (1)
- St. Mary's Law Journal (1)
- Sturm College of Law: Faculty Scholarship (1)
- Texas A&M Law Review (1)
- Touro Law Review (1)
- Vanderbilt Law School Faculty Publications (1)
- Washington Law Review Online (1)
- Publication Type
Articles 1 - 30 of 39
Full-Text Articles in Law
The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn
The Jones Trespass Doctrine And The Need For A Reasonable Solution To Unreasonable Protection, Geoffrey Corn
Arkansas Law Review
Each day that Houston drivers exit from Interstate 45 to drive to downtown Houston, they pass an odd sight. Nestled within some bushes is an encampment of tents. This encampment is very clearly located on public property adjacent to the interstate highway, and equally clearly populated by homeless individuals. While local police ostensibly tolerate this presence, at least temporarily, the sight frequently evokes an image in my mind of a police search of those tents. This thought is especially prominent on the days I am driving to my law school, South Texas College of Law Houston, to teach my federal …
Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger
Ring, Amazon Calling: The State Action Doctrine & The Fourth Amendment, Grace Egger
Washington Law Review Online
Video doorbells have proliferated across the United States and Amazon owns one of the most popular video doorbell companies on the market—Ring. While many view the Ring video doorbell as useful technology that protects the home and promotes safer neighborhoods, the product reduces consumer privacy without much recourse. For example, Ring partners with cities and law enforcement agencies across the United States thereby creating a mass surveillance network in which law enforcement agencies can watch neighborhoods and access Ring data without the user’s knowledge or consent. Because Amazon is not a state actor, it is able to circumvent the due …
No Longer Innocent Until Proven Guilty: How Ohio Violates The Fourth Amendment Through Familial Dna Searches Of Felony Arrestees, Jordan Mason
Cleveland State Law Review
In 2013, the United States Supreme Court legalized DNA collection of all felony arrestees upon arrest through its decision in Maryland v. King. Since then, the State of Ohio has broadened the use of arrestee DNA by subjecting it to familial DNA searches. Ohio’s practice of conducting familial DNA searches of arrestee DNA violates the Fourth Amendment because arrestees have a reasonable expectation of privacy in the information that is extracted from a familial DNA search and it fails both the totality of the circumstances and the special needs tests. Further, these tests go against the intention of the …
Structural Sensor Surveillance, Andrew Guthrie Ferguson
Structural Sensor Surveillance, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
City infrastructure is getting smarter. Embedded smart sensors in roads, lampposts, and electrical grids offer the government a way to regulate municipal resources and the police a new power to monitor citizens. This structural sensor surveillance, however, raises a difficult constitutional question: Does the creation of continuously-recording, aggregated, long-term data collection systems violate the Fourth Amendment? After all, recent Supreme Court cases suggest that technologies that allow police to monitor location, reveal personal patterns, and track personal details for long periods of time are Fourth Amendment searches which require a probable cause warrant. This Article uses the innovation of smart …
Inescapable Surveillance, Matthew Tokson
Inescapable Surveillance, Matthew Tokson
Utah Law Faculty Scholarship
Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.
In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
Justice Sonia Sotomayor: The Court’S Premier Defender Of The Fourth Amendment, David L. Hudson Jr.
Justice Sonia Sotomayor: The Court’S Premier Defender Of The Fourth Amendment, David L. Hudson Jr.
Seattle University Law Review
This essay posits that Justice Sotomayor is the Court’s chief defender of the Fourth Amendment and the cherished values it protects. She has consistently defended Fourth Amendment freedoms—in majority, concurring, and especially in dissenting opinions. Part I recounts a few of her majority opinions in Fourth Amendment cases. Part II examines her concurring opinion in United States v. Jones. Part III examines several of her dissenting opinions in Fourth Amendment cases. A review of these opinions demonstrates what should be clear to any observer of the Supreme Court: Justice Sotomayor consistently defends Fourth Amendment principles and values.
Rethinking Standards Of Appellate Review, Adam Steinman
Rethinking Standards Of Appellate Review, Adam Steinman
Indiana Law Journal
Every appellate decision typically begins with the standard of appellate review. The Supreme Court has shown considerable interest in selecting the standard of appellate review for particular issues, frequently granting certiorari in order to decide whether de novo or deferential review governs certain trial court rulings. This Article critiques the Court's framework for making this choice and questions the desirability of assigning distinct standards of appellate review on an issue-by-issue basis. Rather, the core functions of appellate courts are better served by a single template for review that dispenses with the recurring uncertainty over which standard governs which trial court …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Indiana Law Journal
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
The Fourth Amendment At Home, Thomas P. Crocker
The Fourth Amendment At Home, Thomas P. Crocker
Faculty Publications
A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …
Recent Developments, Peyton Hildebrand
Recent Developments, Peyton Hildebrand
Arkansas Law Review
In a 5-4 opinion, the United States Supreme Court once again denied a Bivens action. This case involved a tragic crossborder shooting by a border patrol agent standing on United States soil, who shot and killed a young boy standing on Mexican soil. Petitioners, the boy’s parents, sought relief under Biven2, arguing the agent’s action violated the Constitution. However, the Court determined the cross-border shooting was a new Bivens context, which required an analysis of whether any special factors “counseled hesitation” for the cause of action to be extended. The Court concluded Bivens was inappropriate because several factors “counseled hesitation”—namely, …
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Adapting U.S. Electronic Surveillance Laws, Policies, And Practices To Reflect Impending Technological Developments, Eric Manpearl
Catholic University Law Review
Intelligence collection must always evolve to meet technological developments. While the collection programs under Section 702 of the FISA Amendments Act of 2008 have produced a great deal of valuable intelligence over the last decade, the United States must begin to think about foreseeable technological developments and strategically consider how to conduct signals intelligence (SIGINT) collection in the future.
This Article identifies four technological trends that could significantly impact the way the United States conducts SIGINT. Individuals now have access to sophisticated technologies that formerly only governments seemed capable of creating, and this decentralization of capabilities will likely only increase …
Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent
Symposium: Pandemics And The Constitution: Pandemic Surveillance - The New Predictive Policing, Michael Gentithes, Harold J. Krent
ConLawNOW
As the fight against the coronavirus pandemic continues, state governments are considering more invasive surveillance to determine who has been exposed to the virus and who is most likely to catch the virus in the future. Widespread efforts to test temperatures have been initiated; calls for contact tracing have increased; and plans have been revealed to allow only those testing positive for the virus’s antibodies (who presumably now are immune) to return to work and travel. Such fundamental liberties may now hinge on the mere probabilities that one may catch the disease or be immune from it.
To assess the …
The Constitutionality Of Abortion, John M. Nerney
The Constitutionality Of Abortion, John M. Nerney
Senior Honors Theses
The purpose of this study is to determine whether abortion is constitutional under the Fourth Amendment. Essentially, the Supreme Court used what is known as the “right to privacy” which they created using the First, Fourth, Fifth and Ninth Amendments finding penumbras of the Bill of Rights, and in the concept of liberty guaranteed by the first section of the Fourteenth Amendment. This study addresses the history of the right to privacy and tries to show that the Supreme Court stretched the meaning of these Amendments beyond what the founders of the Constitution intended. This study analyzed the application of …
Peffer V. Stephens: Probable Cause, Searches And Seizures Within The Home, And Why Using Technology Should Not Open Your Front Door, Shane Landers
Peffer V. Stephens: Probable Cause, Searches And Seizures Within The Home, And Why Using Technology Should Not Open Your Front Door, Shane Landers
Texas A&M Law Review
The Fourth Amendment provides for the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures. Search warrants may only be issued upon a finding of probable cause. This core tenet of our constitutional republic becomes progressively flexible with every development in Fourth Amendment interpretation. In Peffer v. Stephens, the United States Court of Appeals for the Sixth Circuit delivered the latest blow to constitutional rights that restrict the State from engaging in unprincipled searches. In an issue of first impression, the Sixth Circuit held that a criminal defendant’s alleged use …
Symposium: Pandemics And The Constitution: Why The Special Needs Doctrine Is The Most Appropriate Fourth Amendment Theory For Justifying Police Stops To Enforce Covid-19 Stay-At-Home Orders, Henry F. Fradella
ConLawNOW
Despite the fact that the steps the federal and state governments take to curtail the spread of the viral infection are presumably taken in the best interest of public health, governmental actions and actors must comply with the U.S. Constitution even during a pandemic. Some public health measures, such as stay-at-home orders, restrict the exercise of personal freedoms ranging from the rights to travel and freely associate to the ability to gather in places of worship for religious services. This Essay explores several completing doctrines that might justify the authority of law enforcement to stop people who are out of …
Tear Gas + Water Hoses + Dispersal Orders: The Fourth Amendment Endorses Brutality In Protest Policing, Karen Pita Loor
Tear Gas + Water Hoses + Dispersal Orders: The Fourth Amendment Endorses Brutality In Protest Policing, Karen Pita Loor
Faculty Scholarship
Thirty years ago, in Graham v. Connor, the Supreme Court determined that excessive-force claims against police should proceed via the Fourth Amendment, which theoretically protects an individual against unreasonable seizures. However, the Court showed extreme deference to law enforcement’s use of force by using a permissive reasonableness analysis that bestows on police great leeway to make quick split-second decisions in tense and rapidly evolving circumstances. The result is a test that, from its inception, has been too forgiving of police violence and misconduct. This lax reasonableness standard, along with qualified immunity principles, has shielded police from § 1983 civil rights …
A Third-Party Doctrine For Digital Metadata, H. Brian Holland
A Third-Party Doctrine For Digital Metadata, H. Brian Holland
Faculty Scholarship
For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …
Hash It Out: Fourth Amendment Protection Of Electronically Stored Child Exploitation, Rebekah A. Branham
Hash It Out: Fourth Amendment Protection Of Electronically Stored Child Exploitation, Rebekah A. Branham
Akron Law Review
Few courts have addressed whether ISP’s use of hash-based evaluation violates an individual’s Fourth Amendment rights. In 2018, the Fifth Circuit was presented with this issue in United States v. Reddick. The defendant is Reddick uploaded files to the cloud-sharing server Microsoft SkyDrive. Thereafter PhotoDNA, a computer software program that uses hashing, automatically reviewed the hash values of those files and compared them against its database of known child pornography hash values. PhotoDNA detected a hash value match between the defendant’s photos and the database. It then created a “CyberTip,” sending the files and users information to the NCMEC. …
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
St. John's Law Review
(Excerpt)
Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …
Kansas V. Glover And The Issue Of Reasonable Suspicion, Zach Kumar
Kansas V. Glover And The Issue Of Reasonable Suspicion, Zach Kumar
Duke Journal of Constitutional Law & Public Policy Sidebar
It is settled law that an officer may initiate a traffic stop when there is articulable and reasonable suspicion that the person stopped has committed, is committing, or is about to commit a crime. In Kansas v. Glover, the Supreme Court has an opportunity to clarify what constitutes “reasonable suspicion.” The Court will determine whether it is reasonable for an officer to seize a vehicle if the registered owner has a revoked license and there is no information to suggest that the person driving is not the owner of the car. This Commentary argues that the Court should uphold …
Stingray Cell-Site Simulator Surveillance And The Fourth Amendment In The Twenty-First Century: A Review Of The Fourth Amendment In An Age Of Surveillance, And Unwarranted, Harvey Gee
St. John's Law Review
(Excerpt)
This Review discusses two timely and insightful books examining the changing relationship between privacy and the Fourth Amendment in the digital era. Part I discusses the tensions between the need to protect privacy rights and the slowly evolving legal landscape during a time of rapidly changing technology, to introduce David Gray’s The Fourth Amendment in an Age of Surveillance. His book explains how the Fourth Amendment, though embattled, can have a prominent role in twenty-first century discussions of privacy, technology, and surveillance. Gray’s analysis is engaged to broaden the conversation about Stingray technology. This section analyzes a sampling of …
Unlimited Data Search Plan: Warrantless Border Search Of Mobile Device Data Likely Unconstitutional For Violating The Fundamental Right To Informational Privacy, Atanu Das
St. John's Law Review
(Excerpt)
Part I of this Article discusses a case in which a United States citizen was subject to an unconstitutional warrantless border search of his mobile device data. Part II explains the history and current state of Supreme Court jurisprudence of the border search exception doctrine. Part III explains the way in which Supreme Court jurisprudence finds the right to informational privacy for mobile device data to be a fundamental right. Part IV discusses the reluctance of some legal commentators to find that a governmental intrusion on the right to informational privacy is subject to strict scrutiny. Part V finds …
The Origins And Legacy Of The Fourth Amendment Reasonableness Balancing Model, Kit Kinports
The Origins And Legacy Of The Fourth Amendment Reasonableness Balancing Model, Kit Kinports
Journal Articles
The overwhelming majority of the Supreme Court’s Fourth Amendment cases over the past fifty years have been resolved using a warrant presumption model, which determines the constitutionality of a search or seizure by asking whether law enforcement officials had probable cause and a warrant, or some exception to those requirements. But three decisions, beginning in 2001, mysteriously deviated from that approach and applied a reasonableness balancing model, upholding the searches in those cases after considering the totality of the circumstances and weighing the competing government interests against the defendant’s privacy interests. This balancing approach has justifiably been criticized as amorphous, …
Direct-To-Consumer Genetic Testing: Maintenance Of Individual Privacy, Jessica L. Missel
Direct-To-Consumer Genetic Testing: Maintenance Of Individual Privacy, Jessica L. Missel
Health Law Outlook
No abstract provided.
42nd Annual Foulston-Siefkin Lecture: The Next Wave Of Fourth Amendment Challenges After Carpenter, Matthew Tokson
42nd Annual Foulston-Siefkin Lecture: The Next Wave Of Fourth Amendment Challenges After Carpenter, Matthew Tokson
Utah Law Faculty Scholarship
This is an edited and adapted version of the 42nd Annual Foulston Siefkin Lecture, delivered at Washburn University School of Law.
The lecture discusses the future of Fourth Amendment law following the Supreme Court’s enormously important decision in Carpenter v. United States. It analyzes Carpenter and argues that its detailed account of the privacy harms caused by government surveillance will be its most important legacy. Moreover, the Court’s emphasis on the risk of privacy harm is not a one-off or a sharp break from previous practice. Carpenter is consistent with a long line of Supreme Court decisions ignoring or reshaping …
Transnational Government Hacking, Jennifer Daskal
Transnational Government Hacking, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
No abstract provided.
The Purpose Paradox: A Linguistic Dilemma Within Fourth Amendment Jurisprudence, Luke Belflower
The Purpose Paradox: A Linguistic Dilemma Within Fourth Amendment Jurisprudence, Luke Belflower
Mitchell Hamline Law Review
No abstract provided.
The Sacred Fourth Amendment Text, Christopher Slobogin
The Sacred Fourth Amendment Text, Christopher Slobogin
Vanderbilt Law School Faculty Publications
The Supreme Court's jurisprudence governing the Fourth Amendment's "threshold"--a word meant to refer to the types of police actions that trigger the amendment's warrant and reasonableness requirements--has confounded scholars and students alike since Katz v. United States. Before that 1967 decision, the Court's decisions on the topic were fairly straightforward, based primarily on whether the police trespassed on the target's property or property over which the target had control. After that decision-which has come to stand for the proposition that a Fourth Amendment search occurs if police infringe an expectation of privacy that society is prepared to recognize as reasonable--scholars …
The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff
The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff
Sturm College of Law: Faculty Scholarship
Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.
These courts have a …