Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Vanderbilt University Law School (10)
- Boston University School of Law (9)
- Selected Works (8)
- Touro University Jacob D. Fuchsberg Law Center (6)
- American University Washington College of Law (5)
-
- New York Law School (5)
- SJ Quinney College of Law, University of Utah (5)
- Pepperdine University (4)
- Seattle University School of Law (4)
- The Catholic University of America, Columbus School of Law (4)
- The University of Akron (4)
- University of Miami Law School (4)
- University of Michigan Law School (4)
- University of Oklahoma College of Law (4)
- University of Pittsburgh School of Law (4)
- University of the District of Columbia School of Law (4)
- Chicago-Kent College of Law (3)
- St. John's University School of Law (3)
- St. Mary's University (3)
- University of Baltimore Law (3)
- University of Colorado Law School (3)
- University of Georgia School of Law (3)
- University of Maryland Francis King Carey School of Law (3)
- University of Washington School of Law (3)
- Washington and Lee University School of Law (3)
- Cleveland State University (2)
- Maurer School of Law: Indiana University (2)
- Northwestern Pritzker School of Law (2)
- SelectedWorks (2)
- University of Massachusetts School of Law (2)
- Publication Year
- Publication
-
- Faculty Scholarship (14)
- Articles (6)
- Articles in Law Reviews & Other Academic Journals (5)
- Touro Law Review (5)
- Utah Law Faculty Scholarship (5)
-
- Vanderbilt Law School Faculty Publications (5)
- Akron Law Review (4)
- Pepperdine Law Review (4)
- Vanderbilt Journal of Entertainment & Technology Law (4)
- Chicago-Kent Law Review (3)
- Faculty Publications (3)
- Michigan Law Review (3)
- NYLS Law Review (3)
- Oklahoma Journal of Law and Technology (3)
- Publications (3)
- Seattle University Law Review (3)
- St. John's Law Review (3)
- St. Mary's Law Journal (3)
- Adam Lamparello (2)
- All Faculty Scholarship (2)
- Articles & Chapters (2)
- Catholic University Journal of Law and Technology (2)
- Catholic University Law Review (2)
- Cleveland State Law Review (2)
- Danielle Keats Citron (2)
- David C. Gray (2)
- Georgia Law Review (2)
- Journal Articles (2)
- Law Faculty Scholarship (2)
- Northwestern University Law Review (2)
- Publication Type
Articles 121 - 143 of 143
Full-Text Articles in Law
Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard
Big Brother Is Watching: The Reality Show You Didn't Audition For, J. Amy Dillard
All Faculty Scholarship
In 1984, at the height of the Reagan-era war on drugs, the Supreme Court created a bright-line exception to Fourth Amendment protection by declaring that no person had a reasonable expectation of privacy in an area defined as an open field. When it created the exception, the Court ignored positive law and its own jurisprudence that the Fourth Amendment protects people, not places. The open fields doctrine allows law enforcement officers to enter posted, private areas that are not part of a house or its curtilage for brief surveillance. The Supreme Court has never “extended the open fields doctrine to …
Along For The Ride: Gps And The Fourth Amendment, Stephen A. Josey
Along For The Ride: Gps And The Fourth Amendment, Stephen A. Josey
Vanderbilt Journal of Entertainment & Technology Law
With the advent of new technologies, the line as to where the Fourth Amendment forbids certain police behavior and when it does not has become increasingly blurred. Recently, the issue of whether police may use Global Positioning System (GPS) tracking devices to track individuals for prolonged periods of time without first securing a search warrant has crept its way into the limelight. The various circuits have arrived at different conclusions, and the question has now found its way onto the US Supreme Court's docket. After analyzing and weighing both Supreme Court case law and public policy considerations, this Note concludes …
Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan
Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan
Vanderbilt Journal of Entertainment & Technology Law
The advent of new communications technologies has generated debate over the applicability of the Fourth Amendment's warrant requirement to communications sent through, and stored in, technologies not anticipated by the Framers. In 1986, Congress responded to perceived gaps in the protections of the warrant requirement as applied to newer technologies, such as email, by passing the Stored Communications Act (SCA). As originally enacted, the SCA attempted to balance the interests of law enforcement against individual privacy rights by dictating the mechanisms by which the government could compel a particular service provider to disclose communications stored on behalf of its customers. …
Big Brother Is Watching: The Reality Show You Didn't Audition For, Amy Dillard
Big Brother Is Watching: The Reality Show You Didn't Audition For, Amy Dillard
Oklahoma Law Review
No abstract provided.
Privacy Implications Of Smart Meters, Cheryl Dancey Balough
Privacy Implications Of Smart Meters, Cheryl Dancey Balough
Chicago-Kent Law Review
Many people worry about the erosion of privacy in our society given developments in technology, but that loss of privacy may take a quantum leap as electric "smart meters" make it possible for strangers to know on a real-time basis what is occurring in our houses and apartments. Perhaps the greatest concern is that current laws and regulations do not fully protect us from this unprecedented threat to two of our most basic rights—to be left alone in our own homes and to control personal information. Utility companies across the country are replacing conventional electric meters with smart meters designed …
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins
The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renee Mcdonald Hutchins
Journal Articles
For more than two months beginning in late December of 2005, police officers in New York State continuously monitored the location and movements of Scott Weaver's van using a surreptitiously attached global positioning system ("GPS") device, known as a "Qball."' The reason Weaver was targeted for police surveillance has never been disclosed. 2 In addition, law enforcement made no attempt to justify the heightened scrutiny of Weaver by seeking the pre-authorization of a warrant from a neutral magistrate.3 Rather, for sixty-five days, the police subjected Weaver to intense surveillance without oversight, interruption, or explanation. 4 More than a year after …
Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker
Discipline In Schools After Safford Unified School District #1 V. Redding, Dennis D. Parker
NYLS Law Review
No abstract provided.
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Publications
In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).
Citing the scholarship that has criticized the third-party …
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Islam's Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza
Articles & Chapters
Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the FourthAmendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists of …
The 'High Crime Area' Question: Requiring Verifiable And Quantifiable Evidence For Fourth Amendment Reasonable Suspicion Analysis, Andrew Ferguson, Damien Bernache
The 'High Crime Area' Question: Requiring Verifiable And Quantifiable Evidence For Fourth Amendment Reasonable Suspicion Analysis, Andrew Ferguson, Damien Bernache
Articles in Law Reviews & Other Academic Journals
This article proposes a legal framework to analyze the "high crime area" concept in Fourth Amendment reasonable suspicion challenges.Under existing Supreme Court precedent, reviewing courts are allowed to consider that an area is a "high crime area" as a factor to evaluate the reasonableness of a Fourth Amendment stop. See Illinois v. Wardlow, 528 U.S. 119 (2000). However, the Supreme Court has never defined a "high crime area" and lower courts have not reached consensus on a definition. There is no agreement on what a "high-crime area" is, whether it has geographic boundaries, whether it changes over time, whether it …
Government Data Mining And The Fourth Amendment, Christopher Slobogin
Government Data Mining And The Fourth Amendment, Christopher Slobogin
Vanderbilt Law School Faculty Publications
The government's ability to obtain and analyze recorded information about its citizens through the process known as data mining has expanded enormously over the past decade. Although the best-known government data mining operation (Total Information Awareness, more recently dubbed Terrorism Information Awareness) supposedly no longer exists, large-scale data mining by federal agencies devoted to enforcing criminal and counter-terrorism laws has continued unabated. This paper addresses three puzzles about data mining. First, when data mining is undertaken by the government, does it implicate the Fourth Amendment? Second, does the analysis change when data mining is undertaken by private entities which then …
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Journal Articles
Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …
Thermal Imaging And The Fourth Amendment: The Role Of The Katz Test In The Aftermath Of Kyllo V. United States, Gregory Gomez
Thermal Imaging And The Fourth Amendment: The Role Of The Katz Test In The Aftermath Of Kyllo V. United States, Gregory Gomez
NYLS Law Review
No abstract provided.
The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog
The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog
Faculty Scholarship
Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …
Technologically-Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards, Christopher Slobogin
Technologically-Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards, Christopher Slobogin
Vanderbilt Law School Faculty Publications
As the name implies, the American Bar Association's Tentative Draft Standards Concerning Technologically-Assisted Physical Surveillance is a work in progress...Final approval by the ABA hierarchy is still some time away, so feedback could have an impact. Indeed, it is anticipated that the content of at least some of the standards will change prior to their submission to the House of Delegates...The work of the Task Force on Technology and Law Enforcement has persuasively demonstrated that some regulatory structure governing the use of physical surveillance technology is necessary. This work provides a model for future attempts to establish guidelines for other …
Response: The Problems With Privacy's Problem, Louis Michael Seidman
Response: The Problems With Privacy's Problem, Louis Michael Seidman
Michigan Law Review
A Response to William J. Stuntz's "Privacy's Problem and the Law of Criminal Procedure"
Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz
Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz
Michigan Law Review
Part I of this article addresses the connection between privacy-based limits on police authority and substantive limits on government power as a general matter. Part II briefly addresses the effects of that connection on Fourth and Fifth Amendment law, both past and present. Part ID suggests that privacy protection has a deeper problem: it tends to obscure more serious harms that attend police misconduct, harms that flow not from information disclosure but from the police use of force. The upshot is that criminal procedure would be better off with less attention to privacy, at least as privacy is defined in …
Reply, William J. Stuntz
Reply, William J. Stuntz
Michigan Law Review
A Reply to Louis Michael Seidman's Response
Constitutional Posture Of Canine Sniffs, Lina Shahin
Constitutional Posture Of Canine Sniffs, Lina Shahin
Touro Law Review
No abstract provided.
Anticipatory Search Warrants: The Supreme Court's Opportunity To Reexamine The Framework Of The Fourth Amendment, David P. Mitchell
Anticipatory Search Warrants: The Supreme Court's Opportunity To Reexamine The Framework Of The Fourth Amendment, David P. Mitchell
Vanderbilt Law Review
The Fourth Amendment to the United States Constitution prohibits "unreasonable searches and seizures," and provides that "no War-rants shall issue, but upon probable cause."' Although its language is relatively clear, the application of the Fourth Amendment has created more controversy than the application of perhaps any other constitutional amendment.' Given the questions raised by a police-endorsed practice of anticipatory search warrants,' the search and seizure debate is far from over.
An anticipatory search warrant is a warrant based on a showing of probable cause that particular evidence of a crime will exist at a specific location in the future. Challenges …
The Impact Of Smith V. Maryland On The Law Of Pen Registers, Mark Bialek
The Impact Of Smith V. Maryland On The Law Of Pen Registers, Mark Bialek
Antioch Law Journal
In Smith v. Maryland,' the Supreme Court was presented with the question of whether the installation and use of a pen register2 constitutes a "search" under the fourth amendment.3 The pen register is a device which can be used to determine the telephone numbers dialed from a phone under investigation or the number of rings on calls coming into the phone. The question was raised by petitioner Michael Lee Smith, who was convicted of robbery, at least in part, based on evidence obtained from the installation and use of a pen register.4 Smith claimed that the use of a pen …
Capacity To Contest A Search And Seizure: The Passing Of Old Rules And Some Suggestions For New Ones, Christopher Slobogin
Capacity To Contest A Search And Seizure: The Passing Of Old Rules And Some Suggestions For New Ones, Christopher Slobogin
Vanderbilt Law School Faculty Publications
Professor Slobogin examines recent Supreme Court decisions involving standing to challenge search and seizure violations, and argues that the Court's commitment to a "totality of the circumstances" approach has permitted erosion of fourth amendment protections. After concluding that these decisions provide little guidance to lower courts, Professor Slobogin offers a set of principles which will aid in analyzing the Court's direction.
Political Surveillance And The Fourth Amendment, Alan Meisel
Political Surveillance And The Fourth Amendment, Alan Meisel
Articles
The United States District Court case has left the scope of the warrant protection of the fourth amendment considerably clearer and broader. The door left ajar in Katz has been firmly fastened shut by the Court leaving only the traditional exceptions to the warrant requirement, which are based upon practical necessity, and the still unconfronted question of the power of the executive to conduct warrantless surveillances of foreign agents in national security cases." It is also clear that courts are no less competent to evaluate the appropriateness of a search and seizure in an internal security case than in a …