Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

The Fourth Amendment's National Security Exception: Its History And Limits, L. Rush Atkinson Oct 2013

The Fourth Amendment's National Security Exception: Its History And Limits, L. Rush Atkinson

Vanderbilt Law Review

Since 2001, federal prosecutors have indicted and convicted hundreds of defendants for terrorism, espionage, and other national security crimes.' And for every prosecution, there are dozens of investigations into foreign threats that never result in a trial. Between 2001 and 2010, for example, the federal government obtained 16,306 foreign intelligence warrants in the course of its security operations. Between 2004 and 2011, the Federal Bureau of Investigations ("FBI") issued 119,192 National Security Letters for records deemed to be pertinent to national security investigations.

Despite these numbers, security investigations and prosecutions proceed on uncertain constitutional footing. The rights of terrorism suspects …


Life On Streets And Trails: Fourth Amendment Rights For The Homeless And The Homeward Bound, Wesley C. Jackson Apr 2013

Life On Streets And Trails: Fourth Amendment Rights For The Homeless And The Homeward Bound, Wesley C. Jackson

Vanderbilt Law Review

People who read law review articles usually have the resources to temporarily abscond from society on a whim, perhaps to the nearest trailhead, and begin a trek through the woods. Such readers, if they choose a well-maintained trail frequented by long-distance hikers, may come across a simple, three-sided cabin known as a shelter. There they might find a grimy and unwashed bunch, talking amongst themselves using jargon such as "blazes" and "trail angels." Some may recognize them as "thru-hikers" and wonder how long the scrawny, bearded, and overloaded travelers have been at it. But some may ask if these apparent …


Looking For Trouble: An Exploration Of How To Regulate Digital Searches, Eric Yeager Mar 2013

Looking For Trouble: An Exploration Of How To Regulate Digital Searches, Eric Yeager

Vanderbilt Law Review

Imagine that the cybercrime division of a local police force receives a report of fraudulent credit card purchases, and after linking subpoenaed credit card records to a particular shipping address, officers obtain a warrant to search the computer of the resident for evidence of identity theft and fraud. During a preliminary search of the suspect's hard drive, the investigators discover a folder marked "preteen porno pix" filled entirely with picture and video files. Knowing that the evidence they are looking for is almost certainly contained within a text file, they have little reason to believe that opening this folder will …


The Exclusionary Rule: Is It On Its Way Out? Should It Be?, Christopher Slobogin Jan 2013

The Exclusionary Rule: Is It On Its Way Out? Should It Be?, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This symposium, comprising six articles in addition to this one, was triggered by a spate of Supreme Court opinions occurring over the last seven years, all of which raise the two questions in the title to this article (which is also the title of the symposium). Since 1974, when United States v. Calandra definitively established deterrence as the primary objective of the suppression remedy, the Court has nibbled away at the exclusionary rule from a number of different directions. But the Court's decisions in Hudson v. Michigan (2006), Herring v. United States (2009), and Davis v. United States (2011) reveal …


Rehnquist And Panvasive Searches, Christopher Slobogin Jan 2013

Rehnquist And Panvasive Searches, Christopher Slobogin

Vanderbilt Law School Faculty Publications

In the history of the Supreme Court, William Rehnquist may have been the least friendly justice toward the view that the Fourth Amendment should be read expansively. Even he, however, might have interpreted the amendment to place more restrictions on modern law enforcement techniques than current caselaw does. Relying on a 1974 article authored by Rehnquist, this essay, written for a symposium on Rehnquist and the Fourth Amendment, describes his views on the types of requirements the Fourth Amendment imposes on the police, how decriminalization can protect privacy, and most importantly, why Rehnquist might have been willing to regulate surveillance …