Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Scanning Iphones To Save Children: Apple’S On-Device Hashing Algorithm Should Survive A Fourth Amendment Challenge, Timothy Gernand Dec 2022

Scanning Iphones To Save Children: Apple’S On-Device Hashing Algorithm Should Survive A Fourth Amendment Challenge, Timothy Gernand

Dickinson Law Review (2017-Present)

When Apple announced it would combat the growth of child sexual abuse material (CSAM) on its platform by scanning all its users’ devices without their consent, many of its loyal customers felt betrayed. With tech companies such as Google and Facebook arranging their business models around selling their customers’ personal information, Apple customers saw the company’s focus on privacy as a refreshing alternative. However, as Apple itself privately acknowledged, this emphasis on privacy had led to it becoming a haven for CSAM. Despite the reputational damage it would incur with its customers, Apple resolved to confront CSAM on its platform …


Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano Dec 2022

Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano

Washington Law Review

Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …


The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker Oct 2022

The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker

Northwestern University Law Review

The Supreme Court has made social cost a core concept relevant to the calculation of Fourth Amendment remedies but has never explained the concept’s meaning. The Court limits the availability of both the exclusionary rule and civil damages because of their “substantial social costs.” According to the Court, these costs primarily consist of letting the lawbreaker go free by excluding evidence or deterring effective police practices that would lead to more criminal apprehension and prosecution. But recent calls for systemic police reform by social movements have a different view of social cost. So too do calls for reforming qualified immunity. …


Constitutional Law—Fourth Amendment—Warrantless Key-Test Searches In Residential Door Locks, Jacob Hill Oct 2022

Constitutional Law—Fourth Amendment—Warrantless Key-Test Searches In Residential Door Locks, Jacob Hill

University of Arkansas at Little Rock Law Review

No abstract provided.


Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado Apr 2022

Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado

Faculty Scholarship

In 1996, the U.S. Supreme Court decided Whren v. United States—a unanimous opinion in which the Court effectively constitutionalized racial profiling. Despite its enduring consequences, Whren remains good law today. This Article rewrites the opinion. We do so, in part, to demonstrate how one might incorporate racial justice concerns into Fourth Amendment jurisprudence, a body of law that has long elided and marginalized the racialized dimensions of policing. A separate aim is to reveal the “false necessity” of the Whren outcome. The fact that Whren was unanimous, and that even progressive Justices signed on, might lead one to conclude that …


A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher Apr 2022

A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher

Notre Dame Law Review

Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …


The Broken Fourth Amendment Oath, Laurent Sacharoff Mar 2022

The Broken Fourth Amendment Oath, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

The Fourth Amendment requires that warrants be supported by “Oath or affirmation.” Under current doctrine, a police officer may swear the oath to obtain a warrant merely by repeating the account of an informant. This Article shows, however, that the Fourth Amendment, as originally understood, required that the real accuser with personal knowledge swear the oath.

That real-accuser requirement persisted for nearly two centuries. Almost all federal courts and most state courts from 1850 to 1960 held that the oath, by its very nature, required a witness with personal knowledge. Only in 1960 did the Supreme Court hold in Jones …


The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith Feb 2022

The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith

Arkansas Law Review

When thirteen-year-old Savana Redding arrived at school one autumn day in 2003, she was not expecting to be pulled out of her math class and strip searched. But, that is exactly what happened after the assistant principal suspected her of possessing and distributing “prescription-strength ibuprofen” and “over-the-counter. . .naproxen” after receiving information from another student. After Savana consented to a search of her backpack and other belongings—a search which turned up no evidence of drug possession—the assistant principal asked the school nurse and administrative assistant to search Savana’s clothes. To do this, the school officials asked Savana “to remove her …


Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary Jan 2022

Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary

Seattle Journal of Technology, Environmental & Innovation Law

The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?

Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …


Girls, Assaulted, I. India Thusi Jan 2022

Girls, Assaulted, I. India Thusi

Northwestern University Law Review

Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …


Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf Jan 2022

Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf

Faculty Scholarship

When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?

The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …


Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti Jan 2022

Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti

Articles by Maurer Faculty

The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.

Such an approach presupposes that property law is not itself circular. If …


A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind Jan 2022

A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind

Journal Articles

The Supreme Court has described Entick v. Carrington (1765) as “the true and ultimate expression of constitutional law” for the Founding generation. For more than 250 years, judges and commentators have read that case for guidance about the rule of law, executive authority, and the original meaning of the Fourth and Fifth Amendments. But we have been reading a flawed version. This Article publishes, for the first time, a previously unknown manuscript report of Entick v. Carrington. We explain why this version is more reliable than other reports of the case, and how this new discovery challenges prevailing assumptions about …