Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Law

Are Police Officers Bayesians? Police Updating In Investigative Stops, Jeffrey A. Fagan, Lila J.E. Nojima Jan 2023

Are Police Officers Bayesians? Police Updating In Investigative Stops, Jeffrey A. Fagan, Lila J.E. Nojima

Faculty Scholarship

Theories of rational behavior assume that actors make decisions where the benefits of their acts exceed their costs or losses. If those expected costs and benefits change over time, behavior will change accordingly as actors learn and internalize the parameters of success and failure. In the context of proactive policing, police stops that achieve any of several goals — constitutional compliance, stops that lead to “good” arrests or summonses, stops that lead to seizures of weapons, drugs, or other contraband, or stops that produce good will and citizen cooperation — should signal to officers the features of a stop that …


Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado Apr 2022

Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado

Faculty Scholarship

In 1996, the U.S. Supreme Court decided Whren v. United States—a unanimous opinion in which the Court effectively constitutionalized racial profiling. Despite its enduring consequences, Whren remains good law today. This Article rewrites the opinion. We do so, in part, to demonstrate how one might incorporate racial justice concerns into Fourth Amendment jurisprudence, a body of law that has long elided and marginalized the racialized dimensions of policing. A separate aim is to reveal the “false necessity” of the Whren outcome. The fact that Whren was unanimous, and that even progressive Justices signed on, might lead one to conclude that …


Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf Jan 2022

Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf

Faculty Scholarship

When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?

The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …


Tear Gas + Water Hoses + Dispersal Orders: The Fourth Amendment Endorses Brutality In Protest Policing, Karen Pita Loor May 2020

Tear Gas + Water Hoses + Dispersal Orders: The Fourth Amendment Endorses Brutality In Protest Policing, Karen Pita Loor

Faculty Scholarship

Thirty years ago, in Graham v. Connor, the Supreme Court determined that excessive-force claims against police should proceed via the Fourth Amendment, which theoretically protects an individual against unreasonable seizures. However, the Court showed extreme deference to law enforcement’s use of force by using a permissive reasonableness analysis that bestows on police great leeway to make quick split-second decisions in tense and rapidly evolving circumstances. The result is a test that, from its inception, has been too forgiving of police violence and misconduct. This lax reasonableness standard, along with qualified immunity principles, has shielded police from § 1983 civil rights …


A Third-Party Doctrine For Digital Metadata, H. Brian Holland Apr 2020

A Third-Party Doctrine For Digital Metadata, H. Brian Holland

Faculty Scholarship

For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …


Lawful Searches Incident To Unlawful Arrests: A Reform Proposal, Mark A. Summers Dec 2019

Lawful Searches Incident To Unlawful Arrests: A Reform Proposal, Mark A. Summers

Faculty Scholarship

No abstract provided.


The Public Information Fallacy, Woodrow Hartzog Mar 2019

The Public Information Fallacy, Woodrow Hartzog

Faculty Scholarship

The concept of privacy in “public” information or acts is a perennial topic for debate. It has given privacy law fits. People struggle to reconcile the notion of protecting information that has been made public with traditional accounts of privacy. As a result, successfully labeling information as public often functions as a permission slip for surveillance and personal data practices. It has also given birth to a significant and persistent misconception — that public information is an established and objective concept.

In this article, I argue that the “no privacy in public” justification is misguided because nobody knows what “public” …


Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin Jan 2019

Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin

Faculty Scholarship

No discerning student of the Supreme Court would contend that Justice Anthony Kennedy broadly interpreted the Fourth Amendment during his thirty years on the Court. His majority opinions in Maryland v. King, Drayton v. United States and his willingness to join the three key sections of Justice Scalia’s opinion in Hudson v. Maryland, which held that suppression is never a remedy for knock-and-announce violations, are just a few examples of Justice Kennedy’s narrow view of the Fourth Amendment.

In light of his previous votes in search and seizure cases, surprisingly Justice Kennedy, in what would be his final Fourth Amendment …


The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey Jan 2019

The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey

Faculty Scholarship

Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …


A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland Sep 2018

A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland

Faculty Scholarship

For nearly 200 years, an individual’s personal papers enjoyed near-absolute protection from government search and seizure. That is no longer the case. With the widespread adoption of cloud-based information processing and storage services, the third-party doctrine operates to effectively strip our digital papers of meaningful Fourth Amendment protections.

This Article presents a new approach to reconciling current third-party doctrine with the technological realities of modern personal information processing. Our most sensitive data is now processed and stored on cloud computing systems owned and operated by third parties. Although we may consider these services to be private and generally secure, the …


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso

Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …


Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov Jan 2018

Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov

Faculty Scholarship

No abstract provided.


Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog Jan 2018

Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog

Faculty Scholarship

From a privacy perspective, the movement towards police body cameras seems ominous. The prospect of a surveillance device capturing massive amounts of data concerning people’s most vulnerable moments is daunting. These concerns are compounded by the fact that there is little consensus and few hard rules on how and for whom these systems should be built and used. But in many ways, this blank slate is a gift. Law and policy makers are not burdened by the weight of rules and technologies created in a different time for a different purpose. These surveillance and data technologies will be modern. Many …


Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin Nov 2015

Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin

Faculty Scholarship

This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA.

Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


Following The Script: Narratives Of Suspicion In Terry Stops In Street Policing, Jeffery Fagan, Amanda Geller Jan 2015

Following The Script: Narratives Of Suspicion In Terry Stops In Street Policing, Jeffery Fagan, Amanda Geller

Faculty Scholarship

Regulation of Terry stops of pedestrians by police requires articulation of the reasonable and individualized bases of suspicion that motivate their actions. Nearly five decades after Terry, courts have found it difficult to articulate the boundaries or parameters of reasonable suspicion. The behavior and appearances of individuals combine with the social and spatial contexts in which police observe them to create an algebra of suspicion. Police can proceed to approach and temporarily detain a person at a threshold of suspicion that courts have been unable and perhaps unwilling to articulate. The result has been sharp tensions within Fourth Amendment …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Faculty Scholarship

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


The Right To Quantitative Privacy, Danielle K. Citron, David Gray Nov 2013

The Right To Quantitative Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray Apr 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


A Spectacular Non Sequitur: The Supreme Court's Contemporary Fourth Amendment Exclusionary Rule Jurisprudence, David C. Gray Jan 2013

A Spectacular Non Sequitur: The Supreme Court's Contemporary Fourth Amendment Exclusionary Rule Jurisprudence, David C. Gray

Faculty Scholarship

Much of the Supreme Court’s contemporary Fourth Amendment exclusionary rule jurisprudence is constructed upon an analytic mistake that H.L.A. Hart described in another context as a “spectacular non sequitur.” That path to irrelevance is paved by the Court’s recent insistence that the sole justification for excluding evidence seized in violation of the Fourth Amendment is the prospect of deterring law enforcement officers. This deterrence-only approach ignores or rejects more principled justifications that inspired the rule at its genesis and have sustained it through the majority of its history and development. More worrisome, however, is the conceptual insufficiency of deterrence considerations …


Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik Jan 2013

Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik

Faculty Scholarship

The rapid development of neurotechnologies poses novel constitutional issues for criminal law and criminal procedure. These technologies can identify directly from brain waves whether a person is familiar with a stimulus like a face or a weapon, can model blood flow in the brain to indicate whether a person is lying, and can even interfere with brain processes themselves via high-powered magnets to cause a person to be less likely to lie to an investigator. These technologies implicate the constitutional privilege against compelled, self-incriminating speech under the Fifth Amendment and the right to be free of unreasonable search and seizure …


The Fight To Frame Privacy, Woodrow Hartzog Jan 2013

The Fight To Frame Privacy, Woodrow Hartzog

Faculty Scholarship

The resolution of a debate often hinges on how the problem being debated is presented. In psychology and related disciplines, this method of issue presentation is known as framing. Framing theory holds that even small changes in the presentation of an issue or event can produce significant changes of opinion. Framing has become increasingly important in discussions about privacy and security. In his new book, "Nothing to Hide: The False Tradeoff Between Privacy and Security," Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that …


Maryland V. King: Terry V. Ohio Redux, Tracey Maclin Jan 2013

Maryland V. King: Terry V. Ohio Redux, Tracey Maclin

Faculty Scholarship

In Maryland v. King, the Supreme Court addressed whether forensic testing of DNA samples taken from persons arrested for violent felonies violated the Fourth Amendment. The purpose behind DNA testing laws is obvious: collecting and analyzing DNA samples advances the capacity of law enforcement to solve both "cold cases" and future crimes when the government has evidence of the perpetrator's DNA from the crime scene.

In a 5-4 decision, the Court, in an opinion by Justice Kennedy, upheld Maryland's DNA testing statute, and presumably the similar laws of twenty-seven other states and the federal government.

Although Justice Kennedy's opinion suggests …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


The Supreme Court's Contemporary Silver Platter Doctrine, David C. Gray, Meagan Cooper, David Mcaloon Jan 2012

The Supreme Court's Contemporary Silver Platter Doctrine, David C. Gray, Meagan Cooper, David Mcaloon

Faculty Scholarship

In a line of cases beginning with United States v. Calandra, the Court has created a series of exceptions to the Fourth Amendment exclusionary rule that permit illegally seized evidence to be admitted in litigation forums collateral to criminal trials. This “collateral use” exception allows the government to profit from Fourth Amendment violations in grand jury investigations, civil tax suits, habeas proceedings, immigration removal procedures, and parole revocation hearings. In this essay we argue that these collateral use exceptions raise serious conceptual and practical concerns. The core of our critique is that the collateral use exception reconstitutes a version of …


No More Chipping Away: The Roberts Court Uses An Axe To Take Out The Fourth Amendment Exclusionary Rule, Tracey Maclin, Jennifer Marie Rader Jan 2012

No More Chipping Away: The Roberts Court Uses An Axe To Take Out The Fourth Amendment Exclusionary Rule, Tracey Maclin, Jennifer Marie Rader

Faculty Scholarship

This article considers the current status of the Fourth Amendment exclusionary rule under the Roberts Court, as well as what the future holds for the rule. Despite Justice Kennedy’s 2006 declaration that “the continued operation of the exclusionary rule, as settled and defined by our precedents, is not in doubt,” this Article demonstrates why this is not the case. Kennedy’s statement is noteworthy and has been accorded substantial weight primarily because it was made at a time when it was thought that four Justices (Chief Justice Roberts, and Justices Scalia, Thomas, and Alito) were prepared to announce the demise of …


Notes On Borrowing And Convergence, Robert L. Tsai, Nelson Tebbe Oct 2011

Notes On Borrowing And Convergence, Robert L. Tsai, Nelson Tebbe

Faculty Scholarship

This is a response to Jennifer E. Laurin, "Trawling for Herring: Lessons in Doctrinal Borrowing and Convergence," 111 Colum. L. Rev. 670 (2011), which analyzes the Supreme Court's resort to tort-based concepts to limit the reach of the Fourth Amendment's exclusionary rule. We press three points. First, there are differences between a general and specific critique of constitutional borrowing. Second, the idea of convergence as a distinct phenomenon from borrowing has explanatory potential and should be further explored. Third, to the extent convergence occurs, it matters whether concerns of judicial administration or political reconstruction are driving doctrinal changes.


Framing The Fourth, Tracey Maclin Apr 2011

Framing The Fourth, Tracey Maclin

Faculty Scholarship

History is again an important element of the Supreme Court’s Fourth Amendment analysis. In Wyoming v. Houghton, Justice Scalia’s opinion for the Court announced that a historical inquiry is the starting point for every Fourth Amendment case. William Cuddihy’s book on the origins and original meaning of the Fourth Amendment will undoubtedly assist the Justices (and everyone else) in understanding the history of search and seizure law.

Cuddihy’s historical analysis is unprecedented. As Justice O’Connor has described it, Cuddihy’s work is “one of the most exhaustive analyses of the original meaning of the Fourth Amendment ever undertaken.” Cuddihy reviewed thousands …


School Children And Parolees: Not So Special Anymore, Edwin Butterfoss Jan 2011

School Children And Parolees: Not So Special Anymore, Edwin Butterfoss

Faculty Scholarship

The Fourth Amendment special needs exception may be one of the Court’s most puzzling doctrines. Since its origin, the Court has struggled to define its limits and its place in the Court’s suspicionless search and seizure jurisprudence. At times the Court has suggested that the exception is the only route to upholding a search or seizure in the absence of individualized suspicion, while at other times it has stated that it is just one of a limited number of exceptions to the requirement of individualized suspicion. Historically, while the application of the special needs exception has been unpredictable, one thing …