Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (13)
- Constitutional Law (9)
- Privacy Law (6)
- Supreme Court of the United States (5)
- Criminal Procedure (4)
-
- Internet Law (3)
- Civil Rights and Discrimination (2)
- Evidence (2)
- Law Enforcement and Corrections (2)
- National Security Law (2)
- Science and Technology Law (2)
- Business Organizations Law (1)
- Communications Law (1)
- Criminal Law (1)
- Food and Drug Law (1)
- Health Law and Policy (1)
- International Law (1)
- Juvenile Law (1)
- Law and Race (1)
- Law and Society (1)
- Legal Studies (1)
- Litigation (1)
- Sexuality and the Law (1)
- Social and Behavioral Sciences (1)
- Institution
-
- American University Washington College of Law (2)
- Duke Law (2)
- University of Colorado Law School (2)
- University of Richmond (2)
- Georgetown University Law Center (1)
-
- Southern Methodist University (1)
- University of Cincinnati College of Law (1)
- University of Florida Levin College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of South Carolina (1)
- Washington University in St. Louis (1)
Articles 1 - 17 of 17
Full-Text Articles in Law
Ditech Financial, Llc Vs. Buckles, 133 Nev. Adv. Op. 64 (September 14, 2017), Landon Littlefield
Ditech Financial, Llc Vs. Buckles, 133 Nev. Adv. Op. 64 (September 14, 2017), Landon Littlefield
Nevada Supreme Court Summaries
In an en banc opinion, the Court determined that NRS 200.620 does not apply to telephone recordings made by a party outside of Nevada who uses equipment outside of Nevada to record a conversation with a person in Nevada without that person’s consent.
Brief Of The National Association For Public Defense As Amici Curiae Supporting Petitioner, Byrd V. U.S. (U.S. June 12, 2017) (No. 16- 1371)., Janet Moore
Faculty Articles and Other Publications
More than two centuries after it was ratified, the Fourth Amendment continues to protect the “right of the people to be secure” from “unreasonable searches.” U.S. Const. amend. IV. Modern technological advances and social developments do not render our rights “any less worthy of the protection for which the Founders fought.” Riley v. California, 134 S. Ct. 2473, 2494–95 (2014). This Court plays an essential role in ensuring that the Fourth Amendment retains its vitality as an indispensable safeguard of liberty, even as Americans dramatically change the ways they organize their everyday affairs. This case calls for the Court to …
Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins
Utah V. Strieff: The Gratuitous Expansion Of The Attenuation Doctrine, Courtney Watkins
Maryland Law Review Online
No abstract provided.
A Tactical Fourth Amendment, Brandon L. Garrett, Seth W. Stoughton
A Tactical Fourth Amendment, Brandon L. Garrett, Seth W. Stoughton
Faculty Publications
What rules regulate when police can kill? As ongoing public controversy over high-profile police killings drives home, the civil, criminal, and administrative rules governing police use of force all remain deeply contested. Members of the public may assume that police rules and procedures provide detailed direction for when officers can use deadly force. However, many agencies train officers to respond to threats according to a force “continuum” that does not provide hardedged rules for when or how police can use force or deadly force. Nor, as recent cases have illustrated, does a criminal prosecution under state law readily lend itself …
An Alcohol Mindset In A Drug-Crazed World: A Review Of Birchfield V. North Dakota, Devon Beeny
An Alcohol Mindset In A Drug-Crazed World: A Review Of Birchfield V. North Dakota, Devon Beeny
Duke Journal of Constitutional Law & Public Policy Sidebar
Birchfield v. North Dakota involved the ability of legislatures to criminalize a driver’s refusal to submit to a chemical test after a law enforcement officer arrested the individual for driving under the influence of alcohol or drugs. The driver’s argued this criminalized their constitutional right to refuse a warrantless search, while the governments’ argued they needed this power in order to effectively address drunk driving in their jurisdictions. The Court decided that refusing a breath test could be criminalized because requiring the test did not violate the driver’s constitutional rights, however the Court also ruled that because of the invasive …
Birchfield V. North Dakota: Warrantless Breath Tests And The Fourth Amendment, Sara Jane Schlafstein
Birchfield V. North Dakota: Warrantless Breath Tests And The Fourth Amendment, Sara Jane Schlafstein
Duke Journal of Constitutional Law & Public Policy Sidebar
In Birchfield v. North Dakota, the Supreme Court explored warrantless breath tests during DUI stops and their validity under the Fourth Amendment. To determine their constitutionality, the Court adopted a balancing test, weighing the government’s interest in preventing instances of drunk driving with the intrusion on an individual’s privacy. The Court ultimately concluded that warrantless breath tests are constitutional when conducted incident to a lawful DUI arrest. This commentary explores the Court’s reasoning and holding and will argue that the Court was correct in deciding that a warrant is not necessary for conducting a breath test incident to a …
Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele
Carpenter Privacy Case Vexes Justices, While Tech Giant Microsoft Battles Government In Second U.S. Supreme Court Privacy Case With International Implications, Richard J. Peltz-Steele
Faculty Publications
Fall 2017 saw a major privacy case with international implications reach the U.S. Supreme Court this term, Carpenter v. United States. Now a second such case pits the Government against Big Tech in United States v. Microsoft. Carpenter is a criminal case involving federal seizure of cell phone location data from service providers. Arising under the “reasonable grounds” provision of the Stored Communications Act (SCA), the case accentuates Americans’ lack of constitutional protection for personal data in third-party hands, in contrast with emerging global privacy norms. The second major privacy case headed for Supreme Court decision in 2018 also arises …
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
Publications
The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."
Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Notice And Standing In The Fourth Amendment: Searches Of Personal Data, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
In at least two recent cases, courts have rejected service providers' capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular thirdparty litigant could not. In the situations presented by the recent cases, by …
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, “Particularly” Speaking, Devin M. Adams
Law Student Publications
George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amendments to Rule 41 of the Federal Rules of Criminal Procedure. Rule 41, governing searches and seizures, now permits magistrate judges to authorize agents- under a single warrant- to "remotely access," and simultaneously search, copy and seize information from an infinite number of unknown electronic devices in multiple districts anywhere in the country. The unlimited jurisdiction provision is triggered when a device's location is obscured through "technological means," or if agents are investigating computer crimes in five or more districts- regardless of whether …
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill
Law Student Publications
This comment explores how broader shifts in Fourth Amendment doctrine may affect the government's collection of Cell Site Location Information (CSLI) moving forward. It consists of three parts. Part I examines the technological underpinnings of cellular networks. The issue is frequently litigated, but few in the legal community have a real grasp on the technology. A nuanced understanding of the technology is crucial when examining the accuracy of CSLI or how the third-party doctrine ought to apply. This comment consolidates and simplifies the technical workings of cellular networks to enable better and more informed answers. Last, drawing on this understanding, …
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn
Faculty Journal Articles and Book Chapters
Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …
The Third-Party Doctrine And The Future Of The Cloud, Neil M. Richards
The Third-Party Doctrine And The Future Of The Cloud, Neil M. Richards
Scholarship@WashULaw
When the government seeks electronic documents held in the cloud, what legal standard should apply? This simple question raises fundamental questions about the future of our civil liberties in the digital world. In a series of cases, government lawyers have argued that information shared with digital intermediaries—including emails and cloud-stored documents—can be seized without a warrant. Their argument rests upon a controversial Fourth Amendment principle known as the “Third-Party Doctrine,” which maintains that information shared even with trusted “third parties” loses a reasonable expectation of privacy under the Fourth Amendment, and with it, the protection of the warrant requirement. Criminal …
Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson
Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …
Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance
Student Surveillance, Racial Inequalities, And Implicit Racial Bias, Jason P. Nance
UF Law Faculty Publications
In the wake of high-profile incidents of school violence, school officials have increased their reliance on a host of surveillance measures to maintain order and control in their schools. Paradoxically, such practices can foster hostile environments that may lead to even more disorder and dysfunction. These practices may also contribute to the so-called “school-to-prison pipeline” by pushing more students out of school and into the juvenile justice system. However, not all students experience the same level of surveillance. This Article presents data on school surveillance practices, including an original empirical analysis of restricted data recently released by the U.S. Department …
The Fourth Amendment In A Digital World, Laura K. Donohue
The Fourth Amendment In A Digital World, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …