Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Law

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller Nov 2017

Keeping The Government's Hands Off Our Bodies: Mapping A Feminist Legal Theory Approach To Privacy In Cross-Gender Prison Searches, Teresa A. Miller

Teresa A. Miller

The power of privacy is diminishing in the prison setting, and yet privacy is the legal theory prisoners rely upon most to resist searches by correctional officers. Incarcerated women in particular rely upon privacy to shield them from the kind of physical contact that male guards have been known to abuse. The kind of privacy that protects prisoners from searches by guards of the opposite sex derives from several sources, depending on the factual circumstances. Although some form of bodily privacy is embodied in the First, Fourth, Eighth, and Fourteenth Amendments, prisoners challenging the constitutionality of cross-gender searches most commonly …


Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller Nov 2017

Sex & Surveillance: Gender, Privacy & The Sexualization Of Power In Prison, Teresa A. Miller

Teresa A. Miller

In prison, surveillance is power and power is sexualized. Sex and surveillance, therefore, are profoundly linked. Whereas numerous penal scholars from Bentham to Foucault have theorized the force inherent in the visual monitoring of prisoners, the sexualization of power and the relationship between sex and surveillance is more academically obscure. This article criticizes the failure of federal courts to consider the strong and complex relationship between sex and surveillance in analyzing the constitutionality of prison searches, specifically, cross-gender searches. The analysis proceeds in four parts. Part One introduces the issues posed by sex and surveillance. Part Two describes the sexually …


Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky Jun 2017

Law Enforcement And Criminal Law Decisions, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye Mar 2016

On The 'Considered Analysis' Of Collecting Dna Before Conviction, David H. Kaye

David Kaye

For nearly a decade, DNA-on-arrest laws eluded scrutiny in the courts. For another five years, they withstood a gathering storm of constitutional challenges. In Maryland v. King, however, Maryland's highest court reasoned that usually fingerprints provide everything police need to establish the true identity of an individual before trial and that the state's interest in finding the perpetrators of crimes by trawling databases of DNA profiles is too "generalized" to support "a warrantless, suspicionless search." The U.S. Supreme Court reacted forcefully. Chief Justice Roberts stayed the Maryland judgment, writing that "given the considered analysis of courts on the other side …


Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye Mar 2016

Maryland V. King: Per Se Unreasonableness, The Golden Rule, And The Future Of Dna Databases, David H. Kaye

David Kaye

In Maryland v. King, the Supreme Court applied a balancing test to uphold a Maryland statute mandating preconviction collection and analysis of DNA from individuals charged with certain crimes. The DNA profiles are limited to an inherited set of DNA sequences that are not known to be functional and that are tokens of individual identity. This invited online essay examines two aspects of an article on the case by Professor Erin Murphy. I question the claim that the case is pivotal in a conceivable abandonment of the per se rule that warrantless, suspicionless searches are unconstitutional unless they fall …


Drawing Lines: Unrelated Probable Cause As A Prerequisite To Early Dna Collection, David H. Kaye Mar 2016

Drawing Lines: Unrelated Probable Cause As A Prerequisite To Early Dna Collection, David H. Kaye

David Kaye

Swabbing the inside of a cheek has become part of the custodial arrest process in many jurisdictions. The majority view (thus far) is that routinely collecting DNA before conviction (and analyzing it, recording the results, and comparing them to DNA profiles from crime-scene databases) is consistent with Fourth Amendment protections against unreasonable searches and seizures. However, some judges and commentators have argued that DNA sampling in advance of a determination by a judge or grand jury of probable cause for the arrest or charge is unconstitutional. This essay shows that this demand is largely unfounded. Either warrantless, suspicionless DNA collection …


Dalla Traccia Di Sangue All'identikit Facciale, Charles E. Maclean Mar 2015

Dalla Traccia Di Sangue All'identikit Facciale, Charles E. Maclean

Charles E. MacLean

Assessment of dilemmas inherent in using DNA phenotyping methods to generate a physical likeness of a crime suspect based only on DNA shed at the crime scene.


The First 48: Ending The Use Of Categorically Unconstitutional Investigative Holds In Violation Of County Of Riverside V. Mclaughlin, Daniel A. Horwitz Dec 2014

The First 48: Ending The Use Of Categorically Unconstitutional Investigative Holds In Violation Of County Of Riverside V. Mclaughlin, Daniel A. Horwitz

Daniel A. Horwitz

This Article critiques the holding adopted by a growing number of courts that law enforcement may delay a warrantless arrestee’s constitutional right to receive a judicial determination of probable cause for up to forty-eight hours following an arrest as long as a judge or magistrate ultimately determines that the arrest itself was supported by probable cause. Although this issue has largely escaped review within academic literature, the practice of employing investigative detentions against warrantless arrestees is widespread among law enforcement. Of note, whether such investigative detentions comport with the Fourth Amendment has also generated a circuit split between the Eighth …


Deadly Force In Memphis: Tennessee V. Garner, John H. Blume Dec 2014

Deadly Force In Memphis: Tennessee V. Garner, John H. Blume

John H. Blume

On October 3, 1974, officers Hymon and Wright of the Memphis Police Department responded to a call about a burglary in progress. When they arrived at the address, a woman standing in the door told the officers that she had heard glass breaking and that someone was breaking into the house next door. Officer Hymon went around the near side of the house. When he reached the backyard, he saw someone run from the back of the house. With his flashlight, he found a person crouched next to a fence at the back of the yard, some thirty to forty …


School Surveillance And The Fourth Amendment, Jason P. Nance Nov 2014

School Surveillance And The Fourth Amendment, Jason P. Nance

Jason P. Nance

In the aftermath of several highly-publicized incidents of school violence, public school officials have increasingly turned to intense surveillance methods to promote school safety. The current jurisprudence interpreting the Fourth Amendment generally permits school officials to employ a variety of strict measures, separately or in conjunction, even when their use creates a prison-like environment for students. Yet, not all schools rely on such strict measures. Recent empirical evidence suggests that low-income and minority students are much more likely to experience intense security conditions in their school than other students, even after taking into account factors such as neighborhood crime, school …


'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino Sep 2014

'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino

Laurie B. Serafino

Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …


Section 1983 Civil Rights Litigation From The October 2006 Term, Martin Schwartz Jun 2014

Section 1983 Civil Rights Litigation From The October 2006 Term, Martin Schwartz

Martin A. Schwartz

No abstract provided.


You Booze, You Bruise, You Lose: Analyzing The Constitutionality Of Florida’S Involuntary Blood Draw Statute In The Wake Of Missouri V. Mcneely, Francisco D. Zornosa Mar 2014

You Booze, You Bruise, You Lose: Analyzing The Constitutionality Of Florida’S Involuntary Blood Draw Statute In The Wake Of Missouri V. Mcneely, Francisco D. Zornosa

Francisco D Zornosa

No abstract provided.


Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello Jan 2014

Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”


Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean Jan 2014

Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean

Charles E. MacLean

The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”

This article calls upon Congress, and to a lesser extent, state legislatures, to control that …


The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr. Jan 2014

The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.

Albert E Poirier Jr.

The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.


Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid Dec 2013

Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid

Melanie M. Reid

One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …


The "Not A Search" Game, John F. Stinneford Dec 2013

The "Not A Search" Game, John F. Stinneford

John F. Stinneford

No abstract provided.


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Border Searches In The Age Of Terrorism, Robert M. Bloom Oct 2013

Border Searches In The Age Of Terrorism, Robert M. Bloom

Robert Bloom

This article will first explore the history of border searches. It will look to the reorganization of the border enforcement apparatus resulting from 9/11 as well as the intersection of the Fourth Amendment and border searches generally. Then, it will analyze the Supreme Court's last statement on border searches in the Flores-Montano27 decision, including what impact this decision has had on the lower courts. Finally, the article will focus on Fourth Amendment cases involving terrorism concerns after 9/11, as a means of drawing some conclusions about the effect the emerging emphasis on terrorism and national security concerns will likely have …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

David C. Gray

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Aug 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Danielle Keats Citron

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jul 2013

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

Fletcher N. Baldwin

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier Apr 2013

Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier

Jason Forcier

The right to privacy has and will remain a hotly contested debate about American liberties. In 2012, a 3-0 decision by the Sixth Circuit Court of Appeals, in United States v. Melvin Skinner, the court held that there is no “reasonable expectation of privacy in the data given off by. . . cellphone[s].” Given today’s explosion of cellular technology and use of smart phones, is it unreasonable to believe a person should remain secure in their "person" and “effects," as guaranteed under the Fourth Amendment, from unreasonable searches and seizures? Furthermore, with police requiring only a subpoena to a obtain …


The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman Apr 2013

The Piranha Is As Deadly As The Shark: A Case For The Limitation On Deceptive Practices In Dna Collection, Brett A. Bauman

Brett A Bauman

Police deception tactics are utilized throughout the United States as a way to catch unsuspecting criminals. Although criticized in many respects, most deceptive police techniques are not only legal, but are actually encouraged. DNA collection and analysis is no exception—techniques are frequently used by law enforcement officers in an attempt to collect a suspect’s genetic specimen in the interest of solving crimes. While law enforcement officers typically have the best interests of society in mind, the current practices employed by officers to collect suspects’ DNA violate the Fourth Amendment. The Fourth Amendment provides protection against unreasonable searches and seizures, and …


Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Bowman Mar 2013

Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Bowman

Mary N. Bowman

Full Disclosure: Cognitive Science, Informants, and Search Warrant Scrutiny

By Mary Nicol Bowman

This article posits that cognitive biases play a significant role in the gap between the rhetoric regarding Fourth Amendment protection and actual practices regarding search warrant scrutiny, particularly for search warrants based on informants’ tips. Specifically, this article examines the ways in which implicit bias, tunnel vision, priming, and hindsight bias can affect search warrants. These biases can affect each stage of the search warrant process, including targeting decisions, the drafting process, the magistrate’s decision whether to grant the warrant, and post-search review by trial and appellate …


The Right To Quantitative Privacy, David Gray, Danielle Citron Dec 2012

The Right To Quantitative Privacy, David Gray, Danielle Citron

David C. Gray

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron Dec 2012

The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


Border Searches In The Age Of Terrorism, Robert M. Bloom Oct 2011

Border Searches In The Age Of Terrorism, Robert M. Bloom

Robert M. Bloom

This article will first explore the history of border searches. It will look to the reorganization of the border enforcement apparatus resulting from 9/11 as well as the intersection of the Fourth Amendment and border searches generally. Then, it will analyze the Supreme Court's last statement on border searches in the Flores-Montano27 decision, including what impact this decision has had on the lower courts. Finally, the article will focus on Fourth Amendment cases involving terrorism concerns after 9/11, as a means of drawing some conclusions about the effect the emerging emphasis on terrorism and national security concerns will likely have …