Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- David Kaye (3)
- Brian Gallini (2)
- Charles E. MacLean (2)
- Danielle Keats Citron (2)
- David C. Gray (2)
-
- Teresa A. Miller (2)
- Adam Lamparello (1)
- Albert E Poirier Jr. (1)
- Brett A Bauman (1)
- Daniel A. Horwitz (1)
- Donald J. Kochan (1)
- Erwin Chemerinsky (1)
- Fletcher N. Baldwin (1)
- Francisco D Zornosa (1)
- Greg Sergienko (1)
- Jason Forcier (1)
- Jason P. Nance (1)
- John F. Stinneford (1)
- John H. Blume (1)
- John W. Nelson (1)
- Laurie B. Serafino (1)
- Martin A. Schwartz (1)
- Mary N. Bowman (1)
- Melanie M. Reid (1)
- Patricia L. Bellia (1)
- Robert Bloom (1)
- Robert M. Bloom (1)
- Wesley M Oliver (1)
Articles 1 - 30 of 35
Full-Text Articles in Law
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller
Teresa A. Miller
The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller
Teresa A. Miller
In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …
Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky
Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky
Erwin Chemerinsky
No abstract provided.
On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye
On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye
David Kaye
For nearly a decade, DNA-on-arrest laws eluded scrutiny in the courts. For another five years, they withstood a gathering storm of constitutional challenges. In Maryland v. King, however, Maryland's highest court reasoned that usually fingerprints provide everything police need to establish the true identity of an individual before trial and that the state's interest in finding the perpetrators of crimes by trawling databases of DNA profiles is too "generalized" to support "a warrantless, suspicionless search." The U.S. Supreme Court reacted forcefully. Chief Justice Roberts stayed the Maryland judgment, writing that "given the considered analysis of courts on the other side …
Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye
Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye
David Kaye
In Maryland v. King, the Supreme Court applied a balancing test to uphold a Maryland statute mandating preconviction collection and analysis of DNA from individuals charged with certain crimes. The DNA profiles are limited to an inherited set of DNA sequences that are not known to be functional and that are tokens of individual identity. This invited online essay examines two aspects of an article on the case by Professor Erin Murphy. I question the claim that the case is pivotal in a conceivable abandonment of the per se rule that warrantless, suspicionless searches are unconstitutional unless they fall …
Drawing Lines: Unrelated Probable Cause As A Prerequisite To Early Dna Collection, David H. Kaye
Drawing Lines: Unrelated Probable Cause As A Prerequisite To Early Dna Collection, David H. Kaye
David Kaye
Swabbing the inside of a cheek has become part of the custodial arrest process in many jurisdictions. The majority view (thus far) is that routinely collecting DNA before conviction (and analyzing it, recording the results, and comparing them to DNA profiles from crime-scene databases) is consistent with Fourth Amendment protections against unreasonable searches and seizures. However, some judges and commentators have argued that DNA sampling in advance of a determination by a judge or grand jury of probable cause for the arrest or charge is unconstitutional. This essay shows that this demand is largely unfounded. Either warrantless, suspicionless DNA collection …
Dalla Traccia Di Sangue All'identikit Facciale, Charles E. Maclean
Dalla Traccia Di Sangue All'identikit Facciale, Charles E. Maclean
Charles E. MacLean
Assessment of dilemmas inherent in using DNA phenotyping methods to generate a physical likeness of a crime suspect based only on DNA shed at the crime scene.
The First 48: Ending The Use Of Categorically Unconstitutional Investigative Holds In Violation Of County Of Riverside V. Mclaughlin, Daniel A. Horwitz
The First 48: Ending The Use Of Categorically Unconstitutional Investigative Holds In Violation Of County Of Riverside V. Mclaughlin, Daniel A. Horwitz
Daniel A. Horwitz
Deadly Force In Memphis: Tennessee V. Garner, John H. Blume
Deadly Force In Memphis: Tennessee V. Garner, John H. Blume
John H. Blume
On October 3, 1974, officers Hymon and Wright of the Memphis Police Department responded to a call about a burglary in progress. When they arrived at the address, a woman standing in the door told the officers that she had heard glass breaking and that someone was breaking into the house next door. Officer Hymon went around the near side of the house. When he reached the backyard, he saw someone run from the back of the house. With his flashlight, he found a person crouched next to a fence at the back of the yard, some thirty to forty …
School Surveillance And The Fourth Amendment, Jason P. Nance
School Surveillance And The Fourth Amendment, Jason P. Nance
Jason P. Nance
In the aftermath of several highly-publicized incidents of school violence, public school officials have increasingly turned to intense surveillance methods to promote school safety. The current jurisprudence interpreting the Fourth Amendment generally permits school officials to employ a variety of strict measures, separately or in conjunction, even when their use creates a prison-like environment for students. Yet, not all schools rely on such strict measures. Recent empirical evidence suggests that low-income and minority students are much more likely to experience intense security conditions in their school than other students, even after taking into account factors such as neighborhood crime, school …
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
Laurie B. Serafino
Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …
Section 1983 Civil Rights Litigation From The October 2006 Term, Martin Schwartz
Section 1983 Civil Rights Litigation From The October 2006 Term, Martin Schwartz
Martin A. Schwartz
No abstract provided.
You Booze, You Bruise, You Lose: Analyzing The Constitutionality Of Florida’S Involuntary Blood Draw Statute In The Wake Of Missouri V. Mcneely, Francisco D. Zornosa
You Booze, You Bruise, You Lose: Analyzing The Constitutionality Of Florida’S Involuntary Blood Draw Statute In The Wake Of Missouri V. Mcneely, Francisco D. Zornosa
Francisco D Zornosa
No abstract provided.
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Adam Lamparello
Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Charles E. MacLean
The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”
This article calls upon Congress, and to a lesser extent, state legislatures, to control that …
The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.
The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.
Albert E Poirier Jr.
The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Melanie M. Reid
One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …
The "Not A Search" Game, John F. Stinneford
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Patricia L. Bellia
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
Border Searches In The Age Of Terrorism, Robert M. Bloom
Border Searches In The Age Of Terrorism, Robert M. Bloom
Robert Bloom
This article will first explore the history of border searches. It will look to the reorganization of the border enforcement apparatus resulting from 9/11 as well as the intersection of the Fourth Amendment and border searches generally. Then, it will analyze the Supreme Court's last statement on border searches in the Flores-Montano27 decision, including what impact this decision has had on the lower courts. Finally, the article will focus on Fourth Amendment cases involving terrorism concerns after 9/11, as a means of drawing some conclusions about the effect the emerging emphasis on terrorism and national security concerns will likely have …
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
David C. Gray
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Danielle Keats Citron
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …
Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky
Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky
Fletcher N. Baldwin
Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …
Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier
Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier
Jason Forcier
The right to privacy has and will remain a hotly contested debate about American liberties. In 2012, a 3-0 decision by the Sixth Circuit Court of Appeals, in United States v. Melvin Skinner, the court held that there is no “reasonable expectation of privacy in the data given off by. . . cellphone[s].” Given today’s explosion of cellular technology and use of smart phones, is it unreasonable to believe a person should remain secure in their "person" and “effects," as guaranteed under the Fourth Amendment, from unreasonable searches and seizures? Furthermore, with police requiring only a subpoena to a obtain …
The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman
The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman
Brett A Bauman
Police deception tactics are utilized throughout the United States as a way to catch unsuspecting criminals. Although criticized in many respects, most deceptive police techniques are not only legal, but are actually encouraged. DNA collection and analysis is no exception—techniques are frequently used by law enforcement officers in an attempt to collect a suspect’s genetic specimen in the interest of solving crimes. While law enforcement officers typically have the best interests of society in mind, the current practices employed by officers to collect suspects’ DNA violate the Fourth Amendment. The Fourth Amendment provides protection against unreasonable searches and seizures, and …
Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Bowman
Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Bowman
Mary N. Bowman
Full Disclosure: Cognitive Science, Informants, and Search Warrant Scrutiny
By Mary Nicol Bowman
This article posits that cognitive biases play a significant role in the gap between the rhetoric regarding Fourth Amendment protection and actual practices regarding search warrant scrutiny, particularly for search warrants based on informants’ tips. Specifically, this article examines the ways in which implicit bias, tunnel vision, priming, and hindsight bias can affect search warrants. These biases can affect each stage of the search warrant process, including targeting decisions, the drafting process, the magistrate’s decision whether to grant the warrant, and post-search review by trial and appellate …
The Right To Quantitative Privacy, David Gray, Danielle Citron
The Right To Quantitative Privacy, David Gray, Danielle Citron
David C. Gray
We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …
The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron
The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron
Danielle Keats Citron
We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …
Border Searches In The Age Of Terrorism, Robert M. Bloom
Border Searches In The Age Of Terrorism, Robert M. Bloom
Robert M. Bloom
This article will first explore the history of border searches. It will look to the reorganization of the border enforcement apparatus resulting from 9/11 as well as the intersection of the Fourth Amendment and border searches generally. Then, it will analyze the Supreme Court's last statement on border searches in the Flores-Montano27 decision, including what impact this decision has had on the lower courts. Finally, the article will focus on Fourth Amendment cases involving terrorism concerns after 9/11, as a means of drawing some conclusions about the effect the emerging emphasis on terrorism and national security concerns will likely have …