Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

PDF

First Amendment

Institution
Publication Year
Publication
Publication Type

Articles 1 - 28 of 28

Full-Text Articles in Law

Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan Jan 2022

Regulatory Constitutional Law: Protecting Immigrant Free Speech Without Relying On The First Amendment, Michael Kagan

Georgia Law Review

The Supreme Court has long deprived immigrants of the full protection of substantive constitutional rights, including the right to free speech, leaving undocumented immigrants exposed to detention and deportation if they earn the government’s ire through political speech. The best remedy for this would be for the Supreme Court to reconsider its approach. This Essay offers an interim alternative borrowed from an analogous problem that arises under the Fourth Amendment. Under the Constitution, the Supreme Court has indicated that illegally obtained evidence may be suppressed in a removal proceeding only if the Fourth Amendment violation was “egregious.” Yet, some circuit …


The Fourth Amendment’S Forgotten Free-Speech Dimensions, Aya Gruber Jan 2021

The Fourth Amendment’S Forgotten Free-Speech Dimensions, Aya Gruber

Publications

No abstract provided.


Preservation Requests And The Fourth Amendment, Armin Tadayon Oct 2020

Preservation Requests And The Fourth Amendment, Armin Tadayon

Seattle University Law Review

Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …


The Fourth Amendment At Home, Thomas P. Crocker Oct 2020

The Fourth Amendment At Home, Thomas P. Crocker

Indiana Law Journal

A refuge, a domain of personal privacy, and the seat of familial life, the home holds a special place in Fourth Amendment jurisprudence. Supreme Court opinions are replete with statements affirming the special status of the home. Fourth Amendment text places special emphasis on securing protections for the home in addition to persons, papers, and effects against unwarranted government intrusion. Beyond the Fourth Amendment, the home has a unique place within constitutional structure. The home receives privacy protections in addition to sheltering other constitutional values protected by the Due Process Clause and the First Amendment. For example, under the Due …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy Aug 2018

Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy

Washington and Lee Law Review Online

In recent years body-worn cameras have been championed by community groups, scholars, and the courts as a potential check on police misconduct. Such has been the enthusiasm for body-worn cameras that, in a relatively short time, they have been rolled out to police departments across the country. Perhaps because of the optimism surrounding these devices there has been little consideration of the Fourth Amendment issues they pose, especially when they are coupled with facial recognition technology (FRT). There is one particular context in which police use of FRT equipped body-worn cameras is especially concerning: public protests. This Comment constitutes the …


Ithink My Electronic Data Is Secure, But Is It: A Constitutional Analysis Of In Re The Search Of An Apple Iphone, Shira Bloom Jan 2017

Ithink My Electronic Data Is Secure, But Is It: A Constitutional Analysis Of In Re The Search Of An Apple Iphone, Shira Bloom

Touro Law Review

No abstract provided.


United States District Court, Southern District Of New York, People For The Ethical Treatment Of Animals V. Giuliani, Melissa Murphy Mar 2016

United States District Court, Southern District Of New York, People For The Ethical Treatment Of Animals V. Giuliani, Melissa Murphy

Touro Law Review

No abstract provided.


The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele Jan 2015

The Pond Betwixt: Differences In The U.S.-Eu Data Protection/Safe Harbor Negotiation, Richard J. Peltz-Steele

Faculty Publications

This article analyzes the differing perspectives that animate US and EU conceptions of privacy in the context of data protection. It begins by briefly reviewing the two continental approaches to data protection and then explains how the two approaches arise in a context of disparate cultural traditions with respect to the role of law in society. In light of those disparities, Underpinning contemporary data protection regulation is the normative value that both US and EU societies place on personal privacy. Both cultures attribute modern privacy to the famous Warren-Brandeis article in 1890, outlining a "right to be let alone." But …


Dystopian Constitutionalism, Thomas P. Crocker Jan 2015

Dystopian Constitutionalism, Thomas P. Crocker

Faculty Publications

This article describes and defends the distinctive role and rich tradition of using contrastive dystopian states in constitutional theory and practice. As constitutional tradition going back to the founding, U.S. constitutional analysis was replete with arguments about what practices would lead to an undesirable state of tyranny. In more recent constitutional history, the use of contrasting examples of the “police state,” totalitarianism, or Orwellian references have been prevalent in Supreme Court opinions across doctrinal domains, most recently making a prominent appearance at oral argument in the Fourth Amendment case, United States v. Jones. In contrast to more comprehensive constitutional theories, …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski Oct 2014

Beyond The Schoolhouse Gates: The Unprecedented Expansion Of School Surveillance Authority Under Cyberbulling Laws, Emily Suski

Faculty Publications

For several years, states have grappled with the problem of cyberbullying and its sometimes devastating effects. Because cyberbullying often occurs between students, most states have understandably looked to schools to help address the problem. To that end, schools in forty-six states have the authority to intervene when students engage in cyberbullying. This solution seems all to the good unless a close examination of the cyberbullying laws and their implications is made. This Article explores some of the problematic implications of the cyberbullying laws. More specifically, it focuses on how the cyberbullying laws allow schools unprecedented surveillance authority over students. This …


Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz Jun 2014

Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz

Martin A. Schwartz

No abstract provided.


Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman May 2014

Criminal Procedure Decisions From The October 2006 Term, Susan N. Herman

Touro Law Review

No abstract provided.


The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa Jan 2014

The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa

Pepperdine Law Review

No abstract provided.


The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D. Jun 2013

The Not-So-Simple Saga Of Edward And Barack..., Michael I. Niman Ph.D.

Michael I Niman Ph.D.

It reads like a political thriller. An NSA spook, Edward Snowden, meets his conscience, blows the whistle on a massive secret attack on the Fourth Amendment, and is pursued globally by an obsessed president. Spice things up with a bit of character development cross-pollinated with a history lesson. First there’s Darth President. His administration has earned the distinction of invoking the Espionage Act of 1917 (a constitutionally questionable World War One relic) more than all other presidents in the previous 96 years combined—by a factor of two. The Obama administration has charged eight people under the act. All previous administrations …


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


Substance And Method In The Year 2000, Akhil Reed Amar Oct 2012

Substance And Method In The Year 2000, Akhil Reed Amar

Pepperdine Law Review

No abstract provided.


New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo Jun 2012

New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Criminal Procedure And The Racial Profiling Issue For Professor Gates And Sergeant Crowley, L. Darnell Weeden Apr 2011

Criminal Procedure And The Racial Profiling Issue For Professor Gates And Sergeant Crowley, L. Darnell Weeden

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz Jan 2007

Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz

Touro Law Review

No abstract provided.


Raiding Islam: Searches That Target Religious Institutions, John G. Douglass Jan 2004

Raiding Islam: Searches That Target Religious Institutions, John G. Douglass

Law Faculty Publications

On the morning of March 20, 2002, while television cameras recorded the events for the evening news, dozens of federal agents entered and searched the offices of several Islamic educational and religious organizations in Northern Virginia. The agents were searching, it appears, for evidence that those organizations contributed money to international groups known to have sponsored terrorist acts. By most public accounts, the targeted institutions were regarded as moderate and progressive voices in American Islam. For that reason, the searches sent shock waves through the American Muslim community. Muslims who had supported the Administration's domestic war on terrorism began to …


Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar Dec 2003

Say Cheese: The Constitutionality Of State-Mandated Airtime On Public Broadcasting Stations In Wisconsin, Andrew D. Cotlar

Federal Communications Law Journal

Last year, the State of Wisconsin passed legislation which would require statechartered public broadcasting television networks to carry political advertising for candidates free of charge. In this article, Andrew Cotlar raises many concerns about the wisdom of such legislation and the impact this trend may have on public broadcasters throughout the nation. The author begins by analyzing the current position of the law on political access requirements, at both federal and state levels, and then argues that the public television stations should continue to be free to exercise substantial editorial discretion. The Article proceeds to critique the Wisconsin statute as …


'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang Jan 2001

'Suitable Targets'? Parallels And Connections Between 'Hate Crimes' And 'Driving While Black', Lu-In Wang

Articles

While hate crimes may tend to be less routine and more violent than discriminatory traffic stops, closer examination of each shows the need to complicate our understanding of both. The work of social scientists who have studied racial profiling reveals striking similarities and connections between these two practices. In particular, both hate crimes and racial profiling tend to be condemned only at extremes, in situations where they appear to be irrational and excessive, but overlooked in cases where they seem logical or are expected. The tendency to see only the most extreme cases as problematic, however, fails to recognize that …


What's In A Word? A Comparative Analysis Of Article I, § 12 Of The New York State Constitution And The Fourth Amendment To The United States Constitution As Interpreted By The New York Court Of Appeals And The United States Supreme Court, Douglas Holden Wigdor Jan 1998

What's In A Word? A Comparative Analysis Of Article I, § 12 Of The New York State Constitution And The Fourth Amendment To The United States Constitution As Interpreted By The New York Court Of Appeals And The United States Supreme Court, Douglas Holden Wigdor

Touro Law Review

No abstract provided.


Webster V. Doe, Lewis F. Powell, Jr. Oct 1987

Webster V. Doe, Lewis F. Powell, Jr.

Supreme Court Case Files

No abstract provided.


Prior Restraint Of Expression Through The Private Search Doctrine, Edward J. Eberle Jan 1983

Prior Restraint Of Expression Through The Private Search Doctrine, Edward J. Eberle

Law Faculty Scholarship

No abstract provided.


Bell V. Wolfish, Lewis F. Powell, Jr. Oct 1978

Bell V. Wolfish, Lewis F. Powell, Jr.

Supreme Court Case Files

No abstract provided.