Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Fourth Amendment (550)
- Constitutional Law (448)
- Criminal Procedure (271)
- Criminal Law (264)
- Privacy Law (129)
-
- Law Enforcement and Corrections (105)
- Civil Rights and Discrimination (86)
- Evidence (80)
- Supreme Court of the United States (75)
- Science and Technology Law (71)
- Courts (63)
- Law and Society (53)
- Internet Law (52)
- Jurisprudence (47)
- State and Local Government Law (41)
- National Security Law (32)
- First Amendment (29)
- Law and Race (28)
- Judges (24)
- Computer Law (23)
- Social and Behavioral Sciences (23)
- Fourteenth Amendment (20)
- Legal History (20)
- Legislation (18)
- Communications Law (17)
- Litigation (16)
- Health Law and Policy (15)
- Education Law (14)
- Legal Remedies (14)
- Institution
-
- Selected Works (107)
- Touro University Jacob D. Fuchsberg Law Center (89)
- Cleveland State University (59)
- SelectedWorks (52)
- Fordham Law School (42)
-
- Maurer School of Law: Indiana University (37)
- Vanderbilt University Law School (37)
- American University Washington College of Law (30)
- Boston University School of Law (23)
- The University of Akron (22)
- St. Mary's University (19)
- University of Maryland Francis King Carey School of Law (18)
- University of South Carolina (18)
- Washington and Lee University School of Law (18)
- Northern Illinois University (17)
- Pepperdine University (17)
- Seattle University School of Law (17)
- Florida State University College of Law (16)
- University of Richmond (16)
- George Washington University Law School (15)
- Penn State Law (15)
- University of Oklahoma College of Law (15)
- New York Law School (14)
- University of Florida Levin College of Law (14)
- Northwestern Pritzker School of Law (13)
- University of Michigan Law School (13)
- Chicago-Kent College of Law (12)
- The Catholic University of America, Columbus School of Law (12)
- University of Pittsburgh School of Law (11)
- Loyola Marymount University and Loyola Law School (10)
- Publication Year
- Publication
-
- Touro Law Review (79)
- Faculty Scholarship (48)
- Journal Articles (30)
- Fordham Law Review (29)
- Articles (25)
-
- Articles in Law Reviews & Other Academic Journals (20)
- Vanderbilt Law School Faculty Publications (20)
- Indiana Law Journal (19)
- Akron Law Review (18)
- Faculty Publications (18)
- Articles by Maurer Faculty (16)
- Northern Illinois University Law Review (16)
- Seattle University Law Review (16)
- GW Law Faculty Publications & Other Works (15)
- Pepperdine Law Review (15)
- UF Law Faculty Publications (14)
- Scholarly Publications (13)
- Scholarly Works (13)
- NYLS Law Review (12)
- United States Supreme Court (12)
- Chicago-Kent Law Review (11)
- Cleveland State Law Review (11)
- Newspaper Coverage (11)
- Oklahoma Law Review (11)
- Vanderbilt Law Review (11)
- St. Mary's Law Journal (10)
- ExpressO (9)
- Fordham Urban Law Journal (9)
- Law Faculty Scholarship (9)
- Loyola of Los Angeles Law Review (9)
- Publication Type
- File Type
Articles 1 - 30 of 1055
Full-Text Articles in Law
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Faculty Scholarship
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.
Privacy nicks come from the …
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Honors Projects
DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.
A Square Double Helix In A Round Hole: Forensic Genetic Genealogy Searches And The Fourth Amendment, Matthew Sweat
A Square Double Helix In A Round Hole: Forensic Genetic Genealogy Searches And The Fourth Amendment, Matthew Sweat
Georgia State University Law Review
A forensic genetic genealogy search (FGGS) involves law enforcement’s use of consumer DNA databases to generate leads to solve cold cases. As a result of more modern technological processes, the DNA profiles kept in consumer databases are far more revealing than the DNA profiles stored in the FBI’s Combined DNA Index System (CODIS). Accordingly, each DNA profile in a consumer database can be used to identify hundreds of relatives related to the DNA’s contributor.
The government’s use of consumer DNA databases to locate the perpetrators of horrific, unsolved crimes has generated fans and critics. Supporters of FGGSs argue that, in …
Policing & The Problem Of Physical Restraint, Steven Arrigg Koh
Policing & The Problem Of Physical Restraint, Steven Arrigg Koh
Faculty Scholarship
The Fourth Amendment of the U.S. Constitution prohibits unreasonable “seizures” and thus renders unlawful police use of excessive force. On one hand, this definition is expansive. In the U.S. Supreme Court’s 2021 Term, in Torres v. Madrid, the Court clarified that a “seizure” includes any police application of physical force to the body with intent to restrain. Crucially, Chief Justice Roberts’ majority opinion emphasized that police may seize even when merely laying “the end of a finger” on a layperson’s body. And yet, the Supreme Court’s Fourth Amendment totality-of-the-circumstances reasonableness balancing test is notoriously imprecise—a “factbound morass,” in the famous …
The Right To Data Encryption, Steven W. Schlesinger, Dr. Shlomit Yanisky-Ravid
The Right To Data Encryption, Steven W. Schlesinger, Dr. Shlomit Yanisky-Ravid
San Diego Law Review
Technology drives our society, and we are data-dependent as a people. Though the legal system in the United States lacks neither basic protections nor methods to address data protection-related issues, this Article proposes an essential and more robust alternative.
This Article introduces the prevalence and reliance on data and stored information, noting the growing need for a better balance between enabling users’ ability to access encryption tools and the threats and concerns from a governmental perspective for malicious use of encryption tools for criminal and terror purposes.
The Article first recounts a brief history of encryption, focusing on its growing …
Forgotten "People": Reviving Textualism In The Fourth Amendment, Peter C. Douglas
Forgotten "People": Reviving Textualism In The Fourth Amendment, Peter C. Douglas
San Diego Law Review
For more than a century, the Supreme Court has struggled to develop a coherent and sustainable theory of the Fourth Amendment. Before the ink is dry on a new Fourth Amendment opinion, it is cabined, abrogated, or outright overruled. As one scholar has commented, the “evolution of Fourth Amendment doctrine over the past century bears a striking resemblance to Hamlet’s descent into insanity.” While the Court vacillates between “theories” of the Fourth Amendment that might bring clarity to a difficult body of constitutional law, the rights it bespeaks lie vulnerable and unprotected. This Article argues that the problem flows from …
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
The Carpenter Test As A Transformation Of Fourth Amendment Law, Matthew Tokson
Utah Law Faculty Scholarship
For over fifty years, the Fourth Amendment’s scope has been largely dictated by the Katz test, which applies the Amendment’s protections only when the government has violated a person’s “reasonable expectation of privacy.” This vague standard is one of the most criticized doctrines in all of American law, and its lack of coherence has made Fourth Amendment search law notoriously confusing. Things have become even more complex following the Supreme Court’s landmark decision in Carpenter v. United States, which has spawned its own alternative test for determining the Fourth Amendment’s scope. The emerging Carpenter test looks to the revealing nature …
Scanning Iphones To Save Children: Apple’S On-Device Hashing Algorithm Should Survive A Fourth Amendment Challenge, Timothy Gernand
Scanning Iphones To Save Children: Apple’S On-Device Hashing Algorithm Should Survive A Fourth Amendment Challenge, Timothy Gernand
Dickinson Law Review (2017-Present)
When Apple announced it would combat the growth of child sexual abuse material (CSAM) on its platform by scanning all its users’ devices without their consent, many of its loyal customers felt betrayed. With tech companies such as Google and Facebook arranging their business models around selling their customers’ personal information, Apple customers saw the company’s focus on privacy as a refreshing alternative. However, as Apple itself privately acknowledged, this emphasis on privacy had led to it becoming a haven for CSAM. Despite the reputational damage it would incur with its customers, Apple resolved to confront CSAM on its platform …
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Washington Law Review
Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …
The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker
The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker
Northwestern University Law Review
The Supreme Court has made social cost a core concept relevant to the calculation of Fourth Amendment remedies but has never explained the concept’s meaning. The Court limits the availability of both the exclusionary rule and civil damages because of their “substantial social costs.” According to the Court, these costs primarily consist of letting the lawbreaker go free by excluding evidence or deterring effective police practices that would lead to more criminal apprehension and prosecution. But recent calls for systemic police reform by social movements have a different view of social cost. So too do calls for reforming qualified immunity. …
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Legal Implications Of A Ubiquitous Metaverse And A Web3 Future, Jon M. Garon
Legal Implications Of A Ubiquitous Metaverse And A Web3 Future, Jon M. Garon
Marquette Law Review
The metaverse is understood to be an immersive virtual world serving as the locus for all forms of work, education, and entertainment experiences. Depicted in books, movies, and games, the metaverse has the potential not just to supplement real-world experiences but to substantially supplant them. This Article explores the rapid emergence and evolution of the Web3 technologies at the heart of the metaverse movement. Web3 itself is a paradigmatic shift in internet commerce.
Criminal Procedure—Technology In The Modern Era: The Implications Of Carpenter V. United States And The Limits Of The Third-Party Doctrine As To Cell Phone Data Gathered Through Real-Time Tracking, Stingrays, And Cell Tower Dumps, Deepali Lal
University of Arkansas at Little Rock Law Review
No abstract provided.
Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado
Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado
Faculty Scholarship
In 1996, the U.S. Supreme Court decided Whren v. United States—a unanimous opinion in which the Court effectively constitutionalized racial profiling. Despite its enduring consequences, Whren remains good law today. This Article rewrites the opinion. We do so, in part, to demonstrate how one might incorporate racial justice concerns into Fourth Amendment jurisprudence, a body of law that has long elided and marginalized the racialized dimensions of policing. A separate aim is to reveal the “false necessity” of the Whren outcome. The fact that Whren was unanimous, and that even progressive Justices signed on, might lead one to conclude that …
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
Notre Dame Law Review
Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
Washington and Lee Law Review
Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.
Courts rarely, if ever, examine FRT’s role in establishing …
Wrongfully Charged, Golden Gate University School Of Law
Wrongfully Charged, Golden Gate University School Of Law
Golden Gate University Race, Gender, Sexuality and Social Justice Law Journal
On January 10, 2020, a San Francisco Superior Court judge, at the request of a San Francisco Police officer, issued an arrest warrant in connection with a residential burglary. Mot. Suppress Evid. Off’d Against Def. Prelim. Hr’g, 6:1-2. The warrant listed suspects to be arrested and described a residence in Oakland that was to be searched. Id. at 3:5-13. The San Francisco Police Department sent a special operations unit to execute the warrant. Id. at 10:13-22. When the officers arrived at the house, they found the suspect as well as other individuals in the house.
One of those individuals was …
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
Arkansas Law Review
When thirteen-year-old Savana Redding arrived at school one autumn day in 2003, she was not expecting to be pulled out of her math class and strip searched. But, that is exactly what happened after the assistant principal suspected her of possessing and distributing “prescription-strength ibuprofen” and “over-the-counter. . .naproxen” after receiving information from another student. After Savana consented to a search of her backpack and other belongings—a search which turned up no evidence of drug possession—the assistant principal asked the school nurse and administrative assistant to search Savana’s clothes. To do this, the school officials asked Savana “to remove her …
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
Girls, Assaulted, I. India Thusi
Girls, Assaulted, I. India Thusi
Northwestern University Law Review
Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …
Preservation Letters And Fourth Amendment Seizures: A Response To Professor Kerr, Michael L. Levy
Preservation Letters And Fourth Amendment Seizures: A Response To Professor Kerr, Michael L. Levy
Saint Louis University Law Journal
The Stored Communications Act (18 U.S.C. § 2701 et seq.) requires an Internet Service Provider to preserve the contents of a user account upon receiving a request from a government agency. The maximum period of preservation is 180 days. However, the government agency cannot get access to the copy, unless it presents proper legal process, usually a search warrant. During this time, the user has complete access to their account. In a recent article, Professor Orin Kerr has advanced a thesis that copying pursuant to the government’s preservation requests under the Stored Communications Act is a Fourth Amendment seizure. This …
Criminal Justice Secrets, Meghan J. Ryan
Criminal Justice Secrets, Meghan J. Ryan
Faculty Journal Articles and Book Chapters
The American criminal justice system is cloaked in secrecy. The government employs covert surveillance operations. Grand-jury proceedings are hidden from public view. Prosecutors engage in closed-door plea-bargaining and bury exculpatory evidence. Juries convict defendants on secret evidence. Jury deliberations are a black box. And jails and prisons implement clandestine punishment practices. Although there are some justifications for this secrecy, the ubiquitous nature of it is contrary to this nation’s Founders’ steadfast belief in the transparency of criminal justice proceedings. Further, the pervasiveness of secrecy within today’s criminal justice system raises serious constitutional concerns. The accumulation of secrecy and the aggregation …
Equality In The Streets: Using Proportionality Analysis To Regulate Street Policing, Christopher Slobogin
Equality In The Streets: Using Proportionality Analysis To Regulate Street Policing, Christopher Slobogin
Vanderbilt Law School Faculty Publications
The racially disparate impact and individual and collective costs of stop and frisk, misdemeanor arrests, and pretextual traffic stops have been well documented. Less widely noticed is the contrast between Supreme Court case law permitting these practices and the Court's recent tendency to strictly regulate technologically enhanced searches that occur outside the street policing setting and that--coincidentally or not--happen to be more likely to affect the middle class. If, as the Court has indicated, electronic tracking and searches of digital records require probable cause that evidence of crime will be found, stops and frisks should also require probable cause that …
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
Faculty Articles
Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Articles by Maurer Faculty
The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.
Such an approach presupposes that property law is not itself circular. If …
Smart Meters As A Catalyst For Privacy Law, Matthew Tokson
Smart Meters As A Catalyst For Privacy Law, Matthew Tokson
Utah Law Faculty Scholarship
Smart utility meters raise several puzzling legal questions—and answering them can help point the way toward the future of Fourth Amendment and civil privacy law. This forum essay addresses two such issues: use restrictions on collected data, and voluntary data disclosure.
First, more than any other current technology, smart meters compel the development of use restrictions on collected data. The benefits of smart meters are potentially enormous, such that categorically prohibiting public utilities from collecting smart meter data is likely beyond the pale. Yet allowing law enforcement agents to obtain detailed or intimate data about the home without a warrant …
Girls, Assaulted, India Thusi
Girls, Assaulted, India Thusi
Articles by Maurer Faculty
Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …
Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin
Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin
Scholarly Works
As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …
A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind
A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind
Journal Articles
The Supreme Court has described Entick v. Carrington (1765) as “the true and ultimate expression of constitutional law” for the Founding generation. For more than 250 years, judges and commentators have read that case for guidance about the rule of law, executive authority, and the original meaning of the Fourth and Fifth Amendments. But we have been reading a flawed version. This Article publishes, for the first time, a previously unknown manuscript report of Entick v. Carrington. We explain why this version is more reliable than other reports of the case, and how this new discovery challenges prevailing assumptions about …
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Georgia Law Review
The Fourth Amendment of the U.S. Constitution protects people “against unreasonable searches and seizures.” The private search doctrine provides a notable exception to the Fourth Amendment, providing that the government may reconstruct a search previously performed by a private party without first obtaining a warrant. The U.S. Supreme Court developed the private search doctrine prior to the advent of the internet; however, modern technology has changed the way that individuals live. What was once done entirely in private is now done alongside ever-present third parties, such as cell phones and virtual assistants.
Facebook and other social media sites complicate Fourth …