Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

PDF

Privacy Law

Institution
Publication Year
Publication
Publication Type

Articles 121 - 143 of 143

Full-Text Articles in Law

Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard Apr 2011

Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard

All Faculty Scholarship

In 1984, at the height of the Reagan-era war on drugs, the Supreme Court created a bright-line exception to Fourth Amendment protection by declaring that no person had a reasonable expectation of privacy in an area defined as an open field. When it created the exception, the Court ignored positive law and its own jurisprudence that the Fourth Amendment protects people, not places. The open fields doctrine allows law enforcement officers to enter posted, private areas that are not part of a house or its curtilage for brief surveillance. The Supreme Court has never “extended the open fields doctrine to …


Along For The Ride: Gps And The Fourth Amendment, Stephen A. Josey Jan 2011

Along For The Ride: Gps And The Fourth Amendment, Stephen A. Josey

Vanderbilt Journal of Entertainment & Technology Law

With the advent of new technologies, the line as to where the Fourth Amendment forbids certain police behavior and when it does not has become increasingly blurred. Recently, the issue of whether police may use Global Positioning System (GPS) tracking devices to track individuals for prolonged periods of time without first securing a search warrant has crept its way into the limelight. The various circuits have arrived at different conclusions, and the question has now found its way onto the US Supreme Court's docket. After analyzing and weighing both Supreme Court case law and public policy considerations, this Note concludes …


Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan Jan 2011

Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan

Vanderbilt Journal of Entertainment & Technology Law

The advent of new communications technologies has generated debate over the applicability of the Fourth Amendment's warrant requirement to communications sent through, and stored in, technologies not anticipated by the Framers. In 1986, Congress responded to perceived gaps in the protections of the warrant requirement as applied to newer technologies, such as email, by passing the Stored Communications Act (SCA). As originally enacted, the SCA attempted to balance the interests of law enforcement against individual privacy rights by dictating the mechanisms by which the government could compel a particular service provider to disclose communications stored on behalf of its customers. …


Big Brother Is Watching: The Reality Show You Didn't Audition For, Amy Dillard Jan 2011

Big Brother Is Watching: The Reality Show You Didn't Audition For, Amy Dillard

Oklahoma Law Review

No abstract provided.


Privacy Implications Of Smart Meters, Cheryl Dancey Balough Dec 2010

Privacy Implications Of Smart Meters, Cheryl Dancey Balough

Chicago-Kent Law Review

Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …


Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker Jan 2010

Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker

NYLS Law Review

No abstract provided.


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza Jan 2009

Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza

Articles & Chapters

Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …


The 'High Crime Area' Question: Requiring Verifiable And Quantifiable Evidence For Fourth Amendment Reasonable Suspicion Analysis, Andrew Ferguson, Damien Bernache Jan 2008

The 'High Crime Area' Question: Requiring Verifiable And Quantifiable Evidence For Fourth Amendment Reasonable Suspicion Analysis, Andrew Ferguson, Damien Bernache

Articles in Law Reviews & Other Academic Journals

This article proposes a legal framework to analyze the "high crime area" concept in Fourth Amendment reasonable suspicion challenges.Under existing Supreme Court precedent, reviewing courts are allowed to consider that an area is a "high crime area" as a factor to evaluate the reasonableness of a Fourth Amendment stop. See Illinois v. Wardlow, 528 U.S. 119 (2000). However, the Supreme Court has never defined a "high crime area" and lower courts have not reached consensus on a definition. There is no agreement on what a "high-crime area" is, whether it has geographic boundaries, whether it changes over time, whether it …


Government Data Mining And The Fourth Amendment, Christopher Slobogin Jan 2008

Government Data Mining And The Fourth Amendment, Christopher Slobogin

Vanderbilt Law School Faculty Publications

The government's ability to obtain and analyze recorded information about its citizens through the process known as data mining has expanded enormously over the past decade. Although the best-known government data mining operation (Total Information Awareness, more recently dubbed Terrorism Information Awareness) supposedly no longer exists, large-scale data mining by federal agencies devoted to enforcing criminal and counter-terrorism laws has continued unabated. This paper addresses three puzzles about data mining. First, when data mining is undertaken by the government, does it implicate the Fourth Amendment? Second, does the analysis change when data mining is undertaken by private entities which then …


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Thermal Imaging And The Fourth Amendment: The Role Of The Katz Test In The Aftermath Of Kyllo V. United States, Gregory Gomez Jan 2003

Thermal Imaging And The Fourth Amendment: The Role Of The Katz Test In The Aftermath Of Kyllo V. United States, Gregory Gomez

NYLS Law Review

No abstract provided.


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …


Technologically-Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards, Christopher Slobogin Jan 1997

Technologically-Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards, Christopher Slobogin

Vanderbilt Law School Faculty Publications

As the name implies, the American Bar Association's Tentative Draft Standards Concerning Technologically-Assisted Physical Surveillance is a work in progress...Final approval by the ABA hierarchy is still some time away, so feedback could have an impact. Indeed, it is anticipated that the content of at least some of the standards will change prior to their submission to the House of Delegates...The work of the Task Force on Technology and Law Enforcement has persuasively demonstrated that some regulatory structure governing the use of physical surveillance technology is necessary. This work provides a model for future attempts to establish guidelines for other …


Response: The Problems With Privacy's Problem, Louis Michael Seidman Mar 1995

Response: The Problems With Privacy's Problem, Louis Michael Seidman

Michigan Law Review

A Response to William J. Stuntz's "Privacy's Problem and the Law of Criminal Procedure"


Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz Mar 1995

Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz

Michigan Law Review

Part I of this article addresses the connection between privacy-based limits on police authority and substantive limits on government power as a general matter. Part II briefly addresses the effects of that connection on Fourth and Fifth Amendment law, both past and present. Part ID suggests that privacy protection has a deeper problem: it tends to obscure more serious harms that attend police misconduct, harms that flow not from information disclosure but from the police use of force. The upshot is that criminal procedure would be better off with less attention to privacy, at least as privacy is defined in …


Reply, William J. Stuntz Mar 1995

Reply, William J. Stuntz

Michigan Law Review

A Reply to Louis Michael Seidman's Response


Constitutional Posture Of Canine Sniffs, Lina Shahin Jan 1993

Constitutional Posture Of Canine Sniffs, Lina Shahin

Touro Law Review

No abstract provided.


Anticipatory Search Warrants: The Supreme Court's Opportunity To Reexamine The Framework Of The Fourth Amendment, David P. Mitchell Nov 1991

Anticipatory Search Warrants: The Supreme Court's Opportunity To Reexamine The Framework Of The Fourth Amendment, David P. Mitchell

Vanderbilt Law Review

The Fourth Amendment to the United States Constitution prohibits "unreasonable searches and seizures," and provides that "no War-rants shall issue, but upon probable cause."' Although its language is relatively clear, the application of the Fourth Amendment has created more controversy than the application of perhaps any other constitutional amendment.' Given the questions raised by a police-endorsed practice of anticipatory search warrants,' the search and seizure debate is far from over.

An anticipatory search warrant is a warrant based on a showing of probable cause that particular evidence of a crime will exist at a specific location in the future. Challenges …


The Impact Of Smith V. Maryland On The Law Of Pen Registers, Mark Bialek Sep 1981

The Impact Of Smith V. Maryland On The Law Of Pen Registers, Mark Bialek

Antioch Law Journal

In Smith v. Maryland,' the Supreme Court was presented with the question of whether the installation and use of a pen register2 constitutes a "search" under the fourth amendment.3 The pen register is a device which can be used to determine the telephone numbers dialed from a phone under investigation or the number of rings on calls coming into the phone. The question was raised by petitioner Michael Lee Smith, who was convicted of robbery, at least in part, based on evidence obtained from the installation and use of a pen register.4 Smith claimed that the use of a pen …


Capacity To Contest A Search And Seizure: The Passing Of Old Rules And Some Suggestions For New Ones, Christopher Slobogin Jan 1981

Capacity To Contest A Search And Seizure: The Passing Of Old Rules And Some Suggestions For New Ones, Christopher Slobogin

Vanderbilt Law School Faculty Publications

Professor Slobogin examines recent Supreme Court decisions involving standing to challenge search and seizure violations, and argues that the Court's commitment to a "totality of the circumstances" approach has permitted erosion of fourth amendment protections. After concluding that these decisions provide little guidance to lower courts, Professor Slobogin offers a set of principles which will aid in analyzing the Court's direction.


Political Surveillance And The Fourth Amendment, Alan Meisel Jan 1973

Political Surveillance And The Fourth Amendment, Alan Meisel

Articles

The United States District Court case has left the scope of the warrant protection of the fourth amendment considerably clearer and broader. The door left ajar in Katz has been firmly fastened shut by the Court leaving only the traditional exceptions to the warrant requirement, which are based upon practical necessity, and the still unconfronted question of the power of the executive to conduct warrantless surveillances of foreign agents in national security cases." It is also clear that courts are no less competent to evaluate the appropriateness of a search and seizure in an internal security case than in a …