Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Touro University Jacob D. Fuchsberg Law Center (71)
- Cleveland State University (41)
- Selected Works (36)
- Maurer School of Law: Indiana University (25)
- Florida State University College of Law (15)
-
- American University Washington College of Law (14)
- Seattle University School of Law (14)
- Pepperdine University (13)
- SelectedWorks (12)
- The University of Akron (12)
- University of Pittsburgh School of Law (9)
- Vanderbilt University Law School (9)
- Northwestern Pritzker School of Law (8)
- St. Mary's University (8)
- University of Maryland Francis King Carey School of Law (8)
- Duke Law (7)
- New York Law School (7)
- Boston University School of Law (6)
- Loyola Marymount University and Loyola Law School (6)
- University of Baltimore Law (6)
- University of Michigan Law School (6)
- University of Pennsylvania Carey Law School (6)
- University of Richmond (6)
- University of Washington School of Law (6)
- Washington and Lee University School of Law (6)
- Chicago-Kent College of Law (5)
- Fordham Law School (5)
- The Catholic University of America, Columbus School of Law (5)
- University of Arkansas at Little Rock William H. Bowen School of Law (5)
- University of Colorado Law School (5)
- Publication Year
- Publication
-
- Touro Law Review (64)
- Indiana Law Journal (17)
- Faculty Scholarship (16)
- Seattle University Law Review (13)
- Scholarly Publications (12)
-
- United States Supreme Court (12)
- All Faculty Scholarship (11)
- Pepperdine Law Review (11)
- Articles (10)
- Newspaper Coverage (10)
- Scholarly Works (9)
- Akron Law Review (8)
- Articles by Maurer Faculty (7)
- Duke Journal of Constitutional Law & Public Policy Sidebar (7)
- Eighth Judicial District of Ohio, Court of Appeals, Cuyahoga County (7)
- Faculty Publications (7)
- NYLS Law Review (7)
- Northwestern University Law Review (7)
- Vanderbilt Law School Faculty Publications (7)
- Cuyahoga County Court of Common Pleas (6)
- Loyola of Los Angeles Law Review (6)
- American University Law Review (5)
- Articles in Law Reviews & Other Academic Journals (5)
- Chicago-Kent Law Review (5)
- David C. Gray (5)
- St. Mary's Law Journal (5)
- UF Law Faculty Publications (5)
- Washington Law Review (5)
- ExpressO (4)
- Journal Articles (4)
- Publication Type
- File Type
Articles 1 - 30 of 470
Full-Text Articles in Law
The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum
The Modern Border: The Government Can Search . . . Anything?, Abigail Nusbaum
FIU Law Review
The evolution of modern technology has introduced new obstacles in interpreting the Fourth Amendment’s application to searches of peoples’ effects. Specifically, the longstanding exception to the Fourth Amendment permitting searches at the international border in the absence of probable cause does not so neatly apply to forensic searches of cell phones. Consequently, a circuit split has emerged on two aspects of the issue: the scope of the border exception and the requisite level of suspicion within that exception. The Supreme Court should find that forensic cell phone searches at the international border implicate Fourth Amendment privacy interests, requiring the border …
Reasonable In Time, Unreasonable In Scope: Maximizing Fourth Amendment Protections Under Rodriguez V. United States, Thomas Heiden
Reasonable In Time, Unreasonable In Scope: Maximizing Fourth Amendment Protections Under Rodriguez V. United States, Thomas Heiden
Washington Law Review
In Rodriguez v. United States, the Supreme Court held that a law enforcement officer may not conduct a drug dog sniff after the completion of a routine traffic stop because doing so extends the stop without reasonable suspicion in violation of the Fourth Amendment’s prohibition on unreasonable seizures. Tracing the background of Rodriguez from the Supreme Court’s landmark decision in Terry v. Ohio, this Comment argues that Rodriguez is best understood as a reaction to the continued erosion of Fourth Amendment protections in the investigative stop context. Based on that understanding, this Comment argues for a strict reading of Rodriguez, …
Private Police Regulation And The Exclusionary Remedy: How Washington Can Eliminate The Public/Private Distinction, Jared Rothenberg
Private Police Regulation And The Exclusionary Remedy: How Washington Can Eliminate The Public/Private Distinction, Jared Rothenberg
Washington Law Review
Private security forces such as campus police, security guards, loss prevention officers, and the like are not state actors covered by the Fourth Amendment’s prohibition against unreasonable searches and seizures nor the Fifth Amendment’s Miranda protections. As members of the umbrella category of “private police,” these private law enforcement agents often obtain evidence, detain individuals, and elicit confessions in a manner that government actors cannot, which can then be lawfully turned over to the government. Though the same statutory law governing private citizens (assault, false imprisonment, trespass, etc.) also regulates private police conduct, private police conduct is not bound by …
Per Curiam Signals In The Supreme Court's Shadow Docket, Zina Makar
Per Curiam Signals In The Supreme Court's Shadow Docket, Zina Makar
Washington Law Review
Lower courts and litigants depend a great deal on the Supreme Court to articulate and communicate signals regarding how to interpret existing doctrine. Signals are at their strongest and most reliable when they originate from the Court’s merits docket. More recently, the Court has been increasingly relying on its orders docket—colloquially referred to as its “shadow docket”—to communicate with lower courts by summarily reversing and correcting errors in interpretation without briefing or oral argument.
Over the past decade the Roberts Court has granted certiorari to summarily reverse a growing number of qualified immunity cases, issuing over a dozen unsigned per …
Was Atwater V. Lago Vista Decided Correctly? The Fourth Amendment's Shadow And Simulacra Of Police Brutality And The American Dream, Charles Lincoln
Was Atwater V. Lago Vista Decided Correctly? The Fourth Amendment's Shadow And Simulacra Of Police Brutality And The American Dream, Charles Lincoln
Barry Law Review
No abstract provided.
The Fourth Amendment In A Digital Age: Defining Boundaries In Law Enforcement Surveillance Of The Home, Josh Hoffman, Jared Xia
The Fourth Amendment In A Digital Age: Defining Boundaries In Law Enforcement Surveillance Of The Home, Josh Hoffman, Jared Xia
Brigham Young University Prelaw Review
As our country enters a new digital age, emerging technologies have increased the ability of law enforcement to monitor American citizens more closely. The tracking of suspects through thermal imaging, video monitoring, and cell phone GPSs are just a few examples of the unlocked potential now available to investigating authorities. When directed at the home, these technologies allow for unprecedented encroachment of our most intimate sphere of daily life. With this accelerating prevalence of technology in surveillance practices comes the need to reassess what boundaries the Fourth Amendment defines for our privacy. This paper explores the application of the Reasonable …
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Honors Projects
DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.
A Square Double Helix In A Round Hole: Forensic Genetic Genealogy Searches And The Fourth Amendment, Matthew Sweat
A Square Double Helix In A Round Hole: Forensic Genetic Genealogy Searches And The Fourth Amendment, Matthew Sweat
Georgia State University Law Review
A forensic genetic genealogy search (FGGS) involves law enforcement’s use of consumer DNA databases to generate leads to solve cold cases. As a result of more modern technological processes, the DNA profiles kept in consumer databases are far more revealing than the DNA profiles stored in the FBI’s Combined DNA Index System (CODIS). Accordingly, each DNA profile in a consumer database can be used to identify hundreds of relatives related to the DNA’s contributor.
The government’s use of consumer DNA databases to locate the perpetrators of horrific, unsolved crimes has generated fans and critics. Supporters of FGGSs argue that, in …
Gone Fishing: Casting A Wide Net Using Geofence Warrants, Ryan Tursi
Gone Fishing: Casting A Wide Net Using Geofence Warrants, Ryan Tursi
Washington Law Review
Technology companies across the country receive requests from law enforcement agencies for cell phone location information near the scenes of crimes. These requests rely on the traditional warrant process and are known as geofence warrants, or reverse location search warrants. By obtaining location information, law enforcement can identify potential suspects or persons of interest who were near the scene of a crime when they have no leads. But the use of this investigative technique is controversial, as it threatens to intrude upon the privacy of innocent bystanders who had the misfortune of being nearby when the crime took place. Innocent …
On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl
On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl
Indiana Law Journal
Police use of electronic warrant (“e-warrant”) technology has increased significantly in recent years. E-warrant technology allows law enforcement to submit, and magistrate judges to review and approve, warrant applications on computers, smartphones, and tablets, often without any direct communication. Police officers report that they favor e-warrants over their traditional, paper counterparts because they save officers a significant amount of time in applying for warrants by eliminating the need to appear in-person before a magistrate. Legal scholars have almost uniformly praised e-warrant technology as well, arguing that use of these systems will increase the number of warrants issued throughout the United …
Surveillance Technologies And Constitutional Law, Christopher Slobogin, Sarah Brayne
Surveillance Technologies And Constitutional Law, Christopher Slobogin, Sarah Brayne
Vanderbilt Law School Faculty Publications
This review focuses on government use of technology to observe, collect, or record potential criminal activity in real-time, as contrasted with “transaction surveillance” that involves government efforts to access already-existing records and exploit Big Data, topics that have been the focus of previous reviews (Brayne 2018, Ridgeway 2018). Even so limited, surveillance technologies come in many guises, including closed-circuit television, automated license plate and facial readers, aerial cameras, and GPS tracking. Also classifiable as surveillance technology are devices such as thermal and electromagnetic imagers that can “see” through walls and clothing. Finally, surveillance includes wiretapping and other forms of communication …
The Fourth Amendment's Constitutional Home, Gerald S. Dickinson
The Fourth Amendment's Constitutional Home, Gerald S. Dickinson
Articles
The home enjoys omnipresent status in American constitutional law. The Bill of Rights, peculiarly, has served as the central refuge for special protections to the home. This constitutional sanctuary has elicited an intriguing textual and doctrinal puzzle. A distinct thread has emerged that runs through the first five amendments delineating the home as a zone where rights emanating from speech, smut, gods, guns, soldiers, searches, sex, and self-incrimination enjoy special protections. However, the thread inexplicably unravels upon arriving at takings. There, the constitutional text omits and the Supreme Court’s doctrine excludes a special zone of safeguards to the home. This …
Scanning Iphones To Save Children: Apple’S On-Device Hashing Algorithm Should Survive A Fourth Amendment Challenge, Timothy Gernand
Scanning Iphones To Save Children: Apple’S On-Device Hashing Algorithm Should Survive A Fourth Amendment Challenge, Timothy Gernand
Dickinson Law Review (2017-Present)
When Apple announced it would combat the growth of child sexual abuse material (CSAM) on its platform by scanning all its users’ devices without their consent, many of its loyal customers felt betrayed. With tech companies such as Google and Facebook arranging their business models around selling their customers’ personal information, Apple customers saw the company’s focus on privacy as a refreshing alternative. However, as Apple itself privately acknowledged, this emphasis on privacy had led to it becoming a haven for CSAM. Despite the reputational damage it would incur with its customers, Apple resolved to confront CSAM on its platform …
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Washington Law Review
Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …
The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker
The Fourth Amendment And The Problem Of Social Cost, Thomas P. Crocker
Northwestern University Law Review
The Supreme Court has made social cost a core concept relevant to the calculation of Fourth Amendment remedies but has never explained the concept’s meaning. The Court limits the availability of both the exclusionary rule and civil damages because of their “substantial social costs.” According to the Court, these costs primarily consist of letting the lawbreaker go free by excluding evidence or deterring effective police practices that would lead to more criminal apprehension and prosecution. But recent calls for systemic police reform by social movements have a different view of social cost. So too do calls for reforming qualified immunity. …
Constitutional Law—Fourth Amendment—Warrantless Key-Test Searches In Residential Door Locks, Jacob Hill
Constitutional Law—Fourth Amendment—Warrantless Key-Test Searches In Residential Door Locks, Jacob Hill
University of Arkansas at Little Rock Law Review
No abstract provided.
Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado
Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado
Faculty Scholarship
In 1996, the U.S. Supreme Court decided Whren v. United States—a unanimous opinion in which the Court effectively constitutionalized racial profiling. Despite its enduring consequences, Whren remains good law today. This Article rewrites the opinion. We do so, in part, to demonstrate how one might incorporate racial justice concerns into Fourth Amendment jurisprudence, a body of law that has long elided and marginalized the racialized dimensions of policing. A separate aim is to reveal the “false necessity” of the Whren outcome. The fact that Whren was unanimous, and that even progressive Justices signed on, might lead one to conclude that …
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
A Solution For The Third-Party Doctrine In A Time Of Data Sharing, Contact Tracing, And Mass Surveillance, Tonja Jacobi, Dustin Stonecipher
Notre Dame Law Review
Today, information is shared almost constantly. People share their DNA to track their ancestry or for individualized health information; they instruct Alexa to purchase products or provide directions; and, now more than ever, they use videoconferencing technology in their homes. According to the third-party doctrine, the government can access all such information without a warrant or without infringing on Fourth Amendment privacy protections. This exposure of vast amounts of highly personal data to government intrusion is permissible because the Supreme Court has interpreted the third-party doctrine as a per se rule. However, that interpretation rests on an improper understanding of …
The Broken Fourth Amendment Oath, Laurent Sacharoff
The Broken Fourth Amendment Oath, Laurent Sacharoff
Sturm College of Law: Faculty Scholarship
The Fourth Amendment requires that warrants be supported by “Oath or affirmation.” Under current doctrine, a police officer may swear the oath to obtain a warrant merely by repeating the account of an informant. This Article shows, however, that the Fourth Amendment, as originally understood, required that the real accuser with personal knowledge swear the oath.
That real-accuser requirement persisted for nearly two centuries. Almost all federal courts and most state courts from 1850 to 1960 held that the oath, by its very nature, required a witness with personal knowledge. Only in 1960 did the Supreme Court hold in Jones …
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
The Problem Of Qualified Immunity In K-12 Schools, Sarah Smith
Arkansas Law Review
When thirteen-year-old Savana Redding arrived at school one autumn day in 2003, she was not expecting to be pulled out of her math class and strip searched. But, that is exactly what happened after the assistant principal suspected her of possessing and distributing “prescription-strength ibuprofen” and “over-the-counter. . .naproxen” after receiving information from another student. After Savana consented to a search of her backpack and other belongings—a search which turned up no evidence of drug possession—the assistant principal asked the school nurse and administrative assistant to search Savana’s clothes. To do this, the school officials asked Savana “to remove her …
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
Girls, Assaulted, I. India Thusi
Girls, Assaulted, I. India Thusi
Northwestern University Law Review
Girls who are incarcerated share a common trait: They have often experienced multiple forms of sexual assault, at the hands of those close to them and at the hands of the state. The #MeToo movement has exposed how powerful people and institutions have facilitated pervasive sexual violence. However, there has been little attention paid to the ways that incarceration perpetuates sexual exploitation. This Article focuses on incarcerated girls and argues that the state routinely sexually assaults girls by mandating invasive, nonconsensual searches. Unwanted touching and display of private parts are common features of life before and after incarceration—from the sexual …
A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind
A New Report Of Entick V. Carrington (1765), Christian Burset, T. T. Arvind
Journal Articles
The Supreme Court has described Entick v. Carrington (1765) as “the true and ultimate expression of constitutional law” for the Founding generation. For more than 250 years, judges and commentators have read that case for guidance about the rule of law, executive authority, and the original meaning of the Fourth and Fifth Amendments. But we have been reading a flawed version. This Article publishes, for the first time, a previously unknown manuscript report of Entick v. Carrington. We explain why this version is more reliable than other reports of the case, and how this new discovery challenges prevailing assumptions about …
Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf
Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf
Faculty Scholarship
When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?
The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Escaping Circularity: The Fourth Amendment And Property Law, João Marinotti
Articles by Maurer Faculty
The Supreme Court’s “reasonable expectation of privacy” test under the Fourth Amendment has often been criticized as circular, and hence subjective and unpredictable. The Court is presumed to base its decisions on society’s expectations of privacy, while society’s expectations of privacy are themselves presumed to be based on the Court’s judgements. As a solution to this problem, property law has been repeatedly propounded as an allegedly independent, autonomous area of law from which the Supreme Court can glean reasonable expectations of privacy without falling back into tautological reasoning.
Such an approach presupposes that property law is not itself circular. If …
Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters
Fourth Amendment Limits On Extensive Quarantine Surveillance, Benjamin Wolters
Duke Journal of Constitutional Law & Public Policy Sidebar
The devastation wreaked by the COVID-19 pandemic spurred innovations in technology and public policy. Many countries rushed to implement extensive quarantines, and some introduced disease surveillance, including location tracking to enforce quarantines. Though the United States has never implemented high-tech quarantine surveillance, such technology will certainly be available for the next disease outbreak.
Absent significant doctrinal change, the Fourth Amendment likely bars some, but not all, forms of quarantine surveillance. Quarantine surveillance probably constitutes a Fourth Amendment “search” that generally must be backed by probable cause. This probable cause requirement, and its subcomponent of individualized suspicion, likely applies differently to …
Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward
Restoring Causality In Attenuation: Establishing The Breadth Of A Fourth Amendment Violation, Bryan H. Ward
West Virginia Law Review
When the police violate a suspect’s Fourth Amendment rights, what often follows is the discovery of incriminating evidence. Sometimes the evidence is discovered directly after the Fourth Amendment violation. In other situations, the evidence comes by a more indirect route and may occur long after the original Fourth Amendment violation. Courts struggle when trying to decide if the discovery of this indirectly obtained evidence was caused by the police misconduct. This causal question is important because causality acts as a limiting principle when deciding when to apply the exclusionary rule. A basic view of the exclusionary rule suggests that evidence …
The Second Amendment In A Carceral State, Alice Ristroph
The Second Amendment In A Carceral State, Alice Ristroph
Northwestern University Law Review
No abstract provided.
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
Bitcoin Searches And Preserving The Third-Party Doctrine, Christine A. Cortez
St. Mary's Law Journal
Abstract forthcoming.
Preview—United States V. Cooley: What Will Happen To The Thinnest Blue Line?, Jo J. Phippin
Preview—United States V. Cooley: What Will Happen To The Thinnest Blue Line?, Jo J. Phippin
Public Land & Resources Law Review
The Supreme Court of the United States ("Supreme Court") will hear oral arguments in this matter on Tuesday, March 23, 2021. This case presents the narrow issue of whether a tribal police officer has the authority to investigate and detain a non-Indian on a public right-of-way within a reservation for a suspected violation of state or federal law. The lower courts, holding that tribes have no such authority, granted James Cooley’s motion to suppress evidence. The Supreme Court must decide whether the lower courts erred in so deciding. While the issue before the Supreme Court is itself narrow, it has …