Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

The Fallacy Of A Colorblind Consent Search Doctrine, Beau C. Tremitiere Nov 2017

The Fallacy Of A Colorblind Consent Search Doctrine, Beau C. Tremitiere

Northwestern University Law Review

Most searches conducted by police officers are “consensual” and thus beyond the reach of the Fourth Amendment. However, such searches violate the Fourth Amendment when, under the totality of circumstances, consent appears to be a product of coercion—that is, when the consent was involuntary. In 1980, in Mendenhall v. United States, the Supreme Court identified race as a relevant factor courts should consider but failed to explain precisely why race was relevant. After decades of mistreatment and state-sanctioned violence, distrust of law enforcement was rampant in communities of color, and the Mendenhall Court correctly intuited (but failed to describe) the …


A Look At The Fourth Amendment Implications Of Drone Surveillance By Law Enforcement Today, Mary Mara Oct 2017

A Look At The Fourth Amendment Implications Of Drone Surveillance By Law Enforcement Today, Mary Mara

ConLawNOW

This paper will examine the current state of drone technology and its increasing prevalence in private and public settings. As police agencies seek to incorporate this new technology into their crime-fighting arsenal, serious Fourth Amendment privacy considerations arise. Although a national debate rages in this country about the impact of modern technology on privacy rights, Congress, the Federal Aviation Authority (FAA), and the Supreme Court have yet to weigh in on the Fourth Amendment implications of warrantless drone surveillance by law enforcement. Furthermore, while some states have attempted to step into the breach by passing legislation which limits the use …


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston Mar 2017

The Private Search Doctrine And The Evolution Of Fourth Amendment Jurisprudence In The Face Of New Technology: A Broad Or Narrow Exception?, Adam A. Bereston

Catholic University Law Review

The advent of new technology has presented courts with unique challenges when analyzing searches and seizures under the Fourth Amendment. Out of necessity, the application of the Fourth Amendment has evolved to address privacy issues stemming from modern technology that could not have been anticipated by the Amendment’s drafters. As part of this evolution, the Supreme Court devised the “private search” doctrine, which upholds the constitutionality of warrantless police searches of items that were previously searched by a private party, so long as the police search does not exceed the scope of the private-party search. However, courts have struggled to …


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque Mar 2017

Preventing An Air Panopticon: A Proposal For Reasonable Legal Restrictions On Aerial Surveillance, Jake Laperruque

University of Richmond Law Review

No abstract provided.


Liberty At The Cost Of Constitutional Protections: Undocumented Immigrants And Fourth Amendment Rights, Linet Suárez Feb 2017

Liberty At The Cost Of Constitutional Protections: Undocumented Immigrants And Fourth Amendment Rights, Linet Suárez

University of Miami Inter-American Law Review

The Supreme Court has issued many opinions indirectly addressing the Fourth amendment rights of undocumented immigrants. However, none of these opinions answer the questions that matter most: do undocumented immigrants have Fourth Amendment protections and if so, what are they. These questions have increasingly become more important because advances in technology facilitate intrusive searches and seizures by law enforcement officers. This article will specifically focus on the Department of Homeland Security and its use of GPS ankle bracelets to monitor undocumented immigrants. This article compares existing Supreme Court opinions concerning undocumented immigrants and Fourth Amendment rights in the technological age. …


Ithink My Electronic Data Is Secure, But Is It: A Constitutional Analysis Of In Re The Search Of An Apple Iphone, Shira Bloom Jan 2017

Ithink My Electronic Data Is Secure, But Is It: A Constitutional Analysis Of In Re The Search Of An Apple Iphone, Shira Bloom

Touro Law Review

No abstract provided.


Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen Jan 2017

Stingrays, Triggerfish, And Hailstroms, Oh My: The Fourth Amendment Implications Of The Increasing Government Use Of Cell-Site Simulators, Jenna Jonassen

Touro Law Review

No abstract provided.


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell Jan 2017

First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell

St. Mary's Law Journal

Abstract forthcoming.