Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion Oct 2005

The Revamped Fisa: Striking A Better Balance Between The Government's Need To Protect Itself And The 4th Amendment, J. Christopher Champion

Vanderbilt Law Review

The investigations of the 9/11 terrorist attacks highlighted a series of lapses in intelligence-sharing within the federal government regarding terrorist operations. One area closely examined by Congress,' the judiciary, and many legal and political commentators is the appropriate scope of intelligence collection within the United States "concerning foreign threats to the nation's security" ("foreign intelligence"). Domestic intelligence collection is a particularly complex sphere of national security as gathering intelligence on American soil requires balancing the privacy rights of individuals guaranteed by the Fourth Amendment against the nation's need to protect itself.

The Foreign Intelligence Surveillance Act of 1978 ("FISA") governs …


Reconciling Consent Searches And Fourth Amendment Jurisprudence: Incorporating Privacy Into The Test For Valid Consent Searches, David J. Housholder May 2005

Reconciling Consent Searches And Fourth Amendment Jurisprudence: Incorporating Privacy Into The Test For Valid Consent Searches, David J. Housholder

Vanderbilt Law Review

The Fourth Amendment states: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Perhaps the most significant exception to the requirements of the Fourth Amendment is the consent search, which requires no warrant, exigent circumstances, probable cause, or reasonable suspicion.

Some scholars have suggested that the Supreme Court's voluntariness standard for determining consensual searches misperceives …


The Unconstitutionality Of "Hold Until Cleared": Reexamining Material Witness Detentions In The Wake Of The September 11th Dragnet, Ricardo J. Bascuas Apr 2005

The Unconstitutionality Of "Hold Until Cleared": Reexamining Material Witness Detentions In The Wake Of The September 11th Dragnet, Ricardo J. Bascuas

Vanderbilt Law Review

On March 11, 2004, terrorists affiliated with the Al Qaida networkl detonated bombs on four commuter trains in Madrid, Spain, killing 191 people and injuring 2,000 others. Hours later, the Spanish National Police (SNP) recovered a fingerprint from a bag of detonators found in a stolen van parked at a station from which three of the bombed trains departed. The SNP requested assistance from the United States Federal Bureau of Investigation to identify the owner of the print. FBI experts concluded that the print belonged to Brandon Mayfield, a U.S. citizen living in a suburb of Portland, Oregon, and the …


Transaction Surveillance By The Government, Christopher Slobogin Jan 2005

Transaction Surveillance By The Government, Christopher Slobogin

Vanderbilt Law School Faculty Publications

This symposium article is the second of two on regulation of government efforts to obtain recorded information for criminal prosecutions. More specifically, it explores the scope and regulation of "transaction surveillance," which it defines as government attempts to access already existing records, either physically or through data banks, and government efforts to obtain, in real-time or otherwise, "catalogic data" (the identifying signals of a transaction, such as the address of an email recipient). Transaction surveillance is a potent way of discovering and making inferences about a person's activities, character and identity. Yet, despite a bewildering array of statutorily created authorization …