Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin Jan 2018

Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin

UF Law Faculty Publications

No discerning student of the Supreme Court would contend that Justice Anthony Kennedy broadly interpreted the Fourth Amendment during his thirty years on the Court. His majority opinions in Maryland v. King, Drayton v. United States and his willingness to join the three key sections of Justice Scalia’s opinion in Hudson v. Maryland, which held that suppression is never a remedy for knock-and-announce violations, are just a few examples of Justice Kennedy’s narrow view of the Fourth Amendment. In light of his previous votes in search and seizure cases, surprisingly Justice Kennedy, in what would be his final Fourth Amendment …


Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance Jan 2017

Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance

UF Law Faculty Publications

In the wake of high-profile incidents of school violence, school officials have increased their reliance on a host of surveillance measures to maintain order and control in their schools. Paradoxically, such practices can foster hostile environments that may lead to even more disorder and dysfunction. These practices may also contribute to the so-called “school-to-prison pipeline” by pushing more students out of school and into the juvenile justice system. However, not all students experience the same level of surveillance. This Article presents data on school surveillance practices, including an original empirical analysis of restricted data recently released by the U.S. Department …


Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin Jan 2015

Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin

UF Law Faculty Publications

This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA. Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …


School Surveillance And The Fourth Amendment, Jason P. Nance Jan 2014

School Surveillance And The Fourth Amendment, Jason P. Nance

UF Law Faculty Publications

In the aftermath of several highly-publicized incidents of school violence, public school officials have increasingly turned to intense surveillance methods to promote school safety. The current jurisprudence interpreting the Fourth Amendment generally permits school officials to employ a variety of strict measures, separately or in conjunction, even when their use creates a prison-like environment for students. Yet, not all schools rely on such strict measures. Recent empirical evidence suggests that low-income and minority students are much more likely to experience intense security conditions in their school than other students, even after taking into account factors such as neighborhood crime, school …


School Security Considerations After Newtown, Jason P. Nance Feb 2013

School Security Considerations After Newtown, Jason P. Nance

UF Law Faculty Publications

On December 14, 2012, and in the weeks thereafter, our country mourned the deaths of twenty children and six educators who were brutally shot and killed at Sandy Hook Elementary School in Newtown, Connecticut. Since the horrific massacre, parents, educators, and lawmakers have understandably turned their attention to implementing stronger security measures in schools. This essay provides important points for policymakers and school officials to consider before embarking on a new phase of school security upgrades.


Maryland V. King: Terry V. Ohio Redux, Tracey Maclin Jan 2013

Maryland V. King: Terry V. Ohio Redux, Tracey Maclin

UF Law Faculty Publications

In Maryland v. King, the Supreme Court addressed whether forensic testing of DNA samples taken from persons arrested for violent felonies violated the Fourth Amendment. The purpose behind DNA testing laws is obvious: collecting and analyzing DNA samples advances the capacity of law enforcement to solve both "cold cases" and future crimes when the government has evidence of the perpetrator's DNA from the crime scene. In a 5-4 decision, the Court, in an opinion by Justice Kennedy, upheld Maryland's DNA testing statute, and presumably the similar laws of twenty-seven other states and the federal government. Although Justice Kennedy's opinion suggests …


Students, Security, And Race, Jason P. Nance Jan 2013

Students, Security, And Race, Jason P. Nance

UF Law Faculty Publications

In the wake of the terrible shootings in Newtown, Connecticut, our nation has turned its attention to school security. For example, several states have passed or are considering passing legislation that will provide new funding to schools for security equipment and law enforcement officers. Strict security measures in schools are certainly not new. In response to prior acts of school violence, many public schools for years have relied on metal detectors, random sweeps, locked gates, surveillance cameras, and law enforcement officers to promote school safety. Before policymakers and school officials invest more money in strict security measures, this Article provides …


Random, Suspicionless Searches Of Students' Belongings: A Legal, Empirical, And Normative Analysis, Jason P. Nance Jan 2013

Random, Suspicionless Searches Of Students' Belongings: A Legal, Empirical, And Normative Analysis, Jason P. Nance

UF Law Faculty Publications

This Article provides a legal, empirical, and normative analysis of an intrusive search practice used by schools officials to prevent school crime: random, suspicionless searches of students’ belongings. First, it argues that these searches are not permitted under the Fourth Amendment unless schools have particularized evidence of a weapons or substance problem in their schools. Second, it provides normative considerations against implementing strict security measures in schools, especially when they are applied disproportionately on minority students. Third, drawing on recent restricted data from the U.S. Department of Education’s School Survey on Crime and Safety, it provides empirical findings that raise …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

UF Law Faculty Publications

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


No More Chipping Away: The Roberts Court Uses An Axe To Take Out The Fourth Amendment Exclusionary Rule, Tracey Maclin, Jennifer Rader Jan 2012

No More Chipping Away: The Roberts Court Uses An Axe To Take Out The Fourth Amendment Exclusionary Rule, Tracey Maclin, Jennifer Rader

UF Law Faculty Publications

This article considers the current status of the Fourth Amendment exclusionary rule under the Roberts Court, as well as what the future holds for the rule. Despite Justice Kennedy’s 2006 declaration that “the continued operation of the exclusionary rule, as settled and defined by our precedents, is not in doubt,” this Article demonstrates why this is not the case. Kennedy’s statement is noteworthy and has been accorded substantial weight primarily because it was made at a time when it was thought that four Justices (Chief Justice Roberts, and Justices Scalia, Thomas, and Alito) were prepared to announce the demise of …


Framing The Fourth, Tracey Maclin, Julia Mirabella Jan 2011

Framing The Fourth, Tracey Maclin, Julia Mirabella

UF Law Faculty Publications

Book Review of "The Fourth Amendment: Origins and Original Meaning", 602-1791. By William J. Cuddihy. Oxford and New York: Oxford Press. 2009. Pp. lxviii, 940. $165. History is again an important element of the Supreme Court’s Fourth Amendment analysis. In Wyoming v. Houghton, Justice Scalia’s opinion for the Court announced that a historical inquiry is the starting point for every Fourth Amendment case. William Cuddihy’s book on the origins and original meaning of the Fourth Amendment will undoubtedly assist the Justices (and everyone else) in understanding the history of search and seizure law. Cuddihy’s historical analysis is unprecedented. As Justice …


The Good And Bad News About Consent Searches In The Supreme Court, Tracey Maclin Jan 2008

The Good And Bad News About Consent Searches In The Supreme Court, Tracey Maclin

UF Law Faculty Publications

This article is about the Supreme Court's consent search doctrine. Part I describes how the law of consent searches developed between the 1920s and 1973, when Schneckloth v. Bustamonte was decided, which is the Court's seminal consent search case. Part II of the article is a discussion of Bustamonte. In particular, this part highlights the spoken and unspoken premises that influenced the result in Bustamonte and outlines Bustamonte's continuing relevance for consent search cases today. Part III examines United States v. Drayton, a ruling authored by Justice Kennedy that explains why a cryptic passage in that ruling provides important clues …


Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher N. Baldwin Jr., Robert B. Shaw Jan 2006

Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher N. Baldwin Jr., Robert B. Shaw

UF Law Faculty Publications

The article discusses the constitutionality of warrantless wiretapping surveillance by the National Security Agency (NSA) on U.S. citizens. The wiretapping program existed weeks after the September 11, 2001 attacks, on the justification that Congress authorized the president to wiretap U.S. citizens without a warrant, and that the president had inherent authority as commander-in-chief. But it is argued that Congress did not expressly authorize the president to conduct warrantless wiretapping and that he does not have such inherent authority.

We intend this Article to be a commentary on the constitutionality of the NSA wiretapping program solely as it relates to the …


Internet Casinos: A Sure Bet For Money Laundering, Jon L. Mills Oct 2000

Internet Casinos: A Sure Bet For Money Laundering, Jon L. Mills

UF Law Faculty Publications

Since the end of World War II, American society has seen the emergence of technology promising to make life easier, better and longer lasting. The more recent explosion of the Internet is fulfilling the dreams of the high-tech pundits as it provides global real-time communication links and makes the world's knowledge universally available. Privacy concerns surrounding the develop-ment of the Internet have mounted, and in response, service providers and web site operators have enabled web users to conduct transactions in nearly complete anonymity. While anonymity respects individual privacy, anonymity also facilitates criminal activities needing secrecy. One such activity is money …