Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2017

Fourth Amendment

Discipline
Institution
Publication

Articles 1 - 17 of 17

Full-Text Articles in Law

Ditech Financial, Llc Vs. Buckles, 133 Nev. Adv. Op. 64 (September 14, 2017), Landon Littlefield Sep 2017

Ditech Financial, Llc Vs. Buckles, 133 Nev. Adv. Op. 64 (September 14, 2017), Landon Littlefield

Nevada Supreme Court Summaries

In an en banc opinion, the Court determined that NRS 200.620 does not apply to telephone recordings made by a party outside of Nevada who uses equipment outside of Nevada to record a conversation with a person in Nevada without that person’s consent.


Brief Of The National Association For Public Defense As Amici Curiae Supporting Petitioner, Byrd V. U.S. (U.S. June 12, 2017) (No. 16- 1371)., Janet Moore Jun 2017

Brief Of The National Association For Public Defense As Amici Curiae Supporting Petitioner, Byrd V. U.S. (U.S. June 12, 2017) (No. 16- 1371)., Janet Moore

Faculty Articles and Other Publications

More than two centuries after it was ratified, the Fourth Amendment continues to protect the “right of the people to be secure” from “unreasonable searches.” U.S. Const. amend. IV. Modern technological advances and social developments do not render our rights “any less worthy of the protection for which the Founders fought.” Riley v. California, 134 S. Ct. 2473, 2494–95 (2014). This Court plays an essential role in ensuring that the Fourth Amendment retains its vitality as an indispensable safeguard of liberty, even as Americans dramatically change the ways they organize their everyday affairs. This case calls for the Court to …


Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins Apr 2017

Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins

Maryland Law Review Online

No abstract provided.


A Tactical Fourth Amendment, Brandon L. Garrett, Seth W. Stoughton Apr 2017

A Tactical Fourth Amendment, Brandon L. Garrett, Seth W. Stoughton

Faculty Publications

What rules regulate when police can kill? As ongoing public controversy over high-profile police killings drives home, the civil, criminal, and administrative rules governing police use of force all remain deeply contested. Members of the public may assume that police rules and procedures provide detailed direction for when officers can use deadly force. However, many agencies train officers to respond to threats according to a force “continuum” that does not provide hardedged rules for when or how police can use force or deadly force. Nor, as recent cases have illustrated, does a criminal prosecution under state law readily lend itself …


An Alcohol Mindset In A Drug-Crazed World: A Review Of Birchfield V. North Dakota, Devon Beeny Mar 2017

An Alcohol Mindset In A Drug-Crazed World: A Review Of Birchfield V. North Dakota, Devon Beeny

Duke Journal of Constitutional Law & Public Policy Sidebar

Birchfield v. North Dakota involved the ability of legislatures to criminalize a driver’s refusal to submit to a chemical test after a law enforcement officer arrested the individual for driving under the influence of alcohol or drugs. The driver’s argued this criminalized their constitutional right to refuse a warrantless search, while the governments’ argued they needed this power in order to effectively address drunk driving in their jurisdictions. The Court decided that refusing a breath test could be criminalized because requiring the test did not violate the driver’s constitutional rights, however the Court also ruled that because of the invasive …


Birchfield V. North Dakota: Warrantless Breath Tests And The Fourth Amendment, Sara Jane Schlafstein Mar 2017

Birchfield V. North Dakota: Warrantless Breath Tests And The Fourth Amendment, Sara Jane Schlafstein

Duke Journal of Constitutional Law & Public Policy Sidebar

In Birchfield v. North Dakota, the Supreme Court explored warrantless breath tests during DUI stops and their validity under the Fourth Amendment. To determine their constitutionality, the Court adopted a balancing test, weighing the government’s interest in preventing instances of drunk driving with the intrusion on an individual’s privacy. The Court ultimately concluded that warrantless breath tests are constitutional when conducted incident to a lawful DUI arrest. This commentary explores the Court’s reasoning and holding and will argue that the Court was correct in deciding that a warrant is not necessary for conducting a breath test incident to a …


Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele Jan 2017

Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele

Faculty Publications

Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …


An Expressive Theory Of Privacy Intrusions, Craig Konnoth Jan 2017

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Publications

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …


Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal Jan 2017

Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams Jan 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams

Law Student Publications

George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amendments to Rule 41 of the Federal Rules of Criminal Procedure. Rule 41, governing searches and seizures, now permits magistrate judges to authorize agents- under a single warrant- to "remotely access," and simultaneously search, copy and seize information from an infinite number of unknown electronic devices in multiple districts anywhere in the country. The unlimited jurisdiction provision is triggered when a device's location is obscured through "technological means," or if agents are investigating computer crimes in five or more districts- regardless of whether …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill Jan 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill

Law Student Publications

This comment explores how broader shifts in Fourth Amendment doctrine may affect the government's collection of Cell Site Location Information (CSLI) moving forward. It consists of three parts. Part I examines the technological underpinnings of cellular networks. The issue is frequently litigated, but few in the legal community have a real grasp on the technology. A nuanced understanding of the technology is crucial when examining the accuracy of CSLI or how the third-party doctrine ought to apply. This comment consolidates and simplifies the technical workings of cellular networks to enable better and more informed answers. Last, drawing on this understanding, …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn Jan 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


The Third-Party Doctrine And The Future Of The Cloud, Neil M. Richards Jan 2017

The Third-Party Doctrine And The Future Of The Cloud, Neil M. Richards

Scholarship@WashULaw

When the government seeks electronic documents held in the cloud, what legal standard should apply? This simple question raises fundamental questions about the future of our civil liberties in the digital world. In a series of cases, government lawyers have argued that information shared with digital intermediaries—including emails and cloud-stored documents—can be seized without a warrant. Their argument rests upon a controversial Fourth Amendment principle known as the “Third-Party Doctrine,” which maintains that information shared even with trusted “third parties” loses a reasonable expectation of privacy under the Fourth Amendment, and with it, the protection of the warrant requirement. Criminal …


Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson Jan 2017

Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …


Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance Jan 2017

Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance

UF Law Faculty Publications

In the wake of high-profile incidents of school violence, school officials have increased their reliance on a host of surveillance measures to maintain order and control in their schools. Paradoxically, such practices can foster hostile environments that may lead to even more disorder and dysfunction. These practices may also contribute to the so-called “school-to-prison pipeline” by pushing more students out of school and into the juvenile justice system. However, not all students experience the same level of surveillance. This Article presents data on school surveillance practices, including an original empirical analysis of restricted data recently released by the U.S. Department …


The Fourth Amendment In A Digital World, Laura K. Donohue Jan 2017

The Fourth Amendment In A Digital World, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …