Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

PDF

Science and Technology Law

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 74

Full-Text Articles in Law

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson Apr 2024

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson

Pepperdine Law Review

The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …


The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Emory Law Journal

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible.

Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan Oct 2023

Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan

Articles

This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …


Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones Apr 2023

Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones

Honors Projects

DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.


Surveillance Technologies And Constitutional Law, Christopher Slobogin, Sarah Brayne Jan 2023

Surveillance Technologies And Constitutional Law, Christopher Slobogin, Sarah Brayne

Vanderbilt Law School Faculty Publications

This review focuses on government use of technology to observe, collect, or record potential criminal activity in real-time, as contrasted with “transaction surveillance” that involves government efforts to access already-existing records and exploit Big Data, topics that have been the focus of previous reviews (Brayne 2018, Ridgeway 2018). Even so limited, surveillance technologies come in many guises, including closed-circuit television, automated license plate and facial readers, aerial cameras, and GPS tracking. Also classifiable as surveillance technology are devices such as thermal and electromagnetic imagers that can “see” through walls and clothing. Finally, surveillance includes wiretapping and other forms of communication …


On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl Jan 2023

On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl

Indiana Law Journal

Police use of electronic warrant (“e-warrant”) technology has increased significantly in recent years. E-warrant technology allows law enforcement to submit, and magistrate judges to review and approve, warrant applications on computers, smartphones, and tablets, often without any direct communication. Police officers report that they favor e-warrants over their traditional, paper counterparts because they save officers a significant amount of time in applying for warrants by eliminating the need to appear in-person before a magistrate. Legal scholars have almost uniformly praised e-warrant technology as well, arguing that use of these systems will increase the number of warrants issued throughout the United …


Evolving Privacy Protections For Emerging Machine Learning Data Under Carpenter V. United States, Emily Nicolella Jan 2023

Evolving Privacy Protections For Emerging Machine Learning Data Under Carpenter V. United States, Emily Nicolella

FIU Law Review

The Fourth Amendment’s third-party doctrine eliminates an individual’s reasonable expectation of privacy in information they willingly turn over to third parties. Government scrutiny of this information is not considered a search under the Fourth Amendment and is therefore not given constitutional protections. In the 2018 case Carpenter v. United States, the Supreme Court created an exception to the third-party doctrine. In Carpenter, a case involving the warrantless use of cell site location information (CSLI) in a criminal investigation, the Court held that individuals do have a reasonable expectation of privacy regarding CSLI. According to Chief Justice Roberts, despite the necessary …


Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano Dec 2022

Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano

Washington Law Review

Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …


Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


Criminal Procedure—Technology In The Modern Era: The Implications Of Carpenter V. United States And The Limits Of The Third-Party Doctrine As To Cell Phone Data Gathered Through Real-Time Tracking, Stingrays, And Cell Tower Dumps, Deepali Lal Jun 2022

Criminal Procedure—Technology In The Modern Era: The Implications Of Carpenter V. United States And The Limits Of The Third-Party Doctrine As To Cell Phone Data Gathered Through Real-Time Tracking, Stingrays, And Cell Tower Dumps, Deepali Lal

University of Arkansas at Little Rock Law Review

No abstract provided.


The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict Apr 2022

The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict

Washington and Lee Law Review

Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.

Courts rarely, if ever, examine FRT’s role in establishing …


Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell Oct 2021

Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell

St. Mary's Law Journal

Abstract forthcoming.


New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll Mar 2021

New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll

Journal of the National Association of Administrative Law Judiciary

The Fourth Amendment protects individual’s right to privacy from unwarranted searches and seizures, but the analysis for when the Fourth Amendment applies has become more complicated as new technology is developed. E-scooters are a new piece of technology which may implicate the Fourth Amendment. Cities across the country are beginning to require the mobility companies which provide e-scooter services to turn over location data in order to receive an operating permit. This article first provides a background of the Fourth Amendment, then provides details regarding the new city regulations. The article includes a discussion of the privacy concerns as well …


Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


No Longer Innocent Until Proven Guilty: How Ohio Violates The Fourth Amendment Through Familial Dna Searches Of Felony Arrestees, Jordan Mason Nov 2020

No Longer Innocent Until Proven Guilty: How Ohio Violates The Fourth Amendment Through Familial Dna Searches Of Felony Arrestees, Jordan Mason

Cleveland State Law Review

In 2013, the United States Supreme Court legalized DNA collection of all felony arrestees upon arrest through its decision in Maryland v. King. Since then, the State of Ohio has broadened the use of arrestee DNA by subjecting it to familial DNA searches. Ohio’s practice of conducting familial DNA searches of arrestee DNA violates the Fourth Amendment because arrestees have a reasonable expectation of privacy in the information that is extracted from a familial DNA search and it fails both the totality of the circumstances and the special needs tests. Further, these tests go against the intention of the …


Preservation Requests And The Fourth Amendment, Armin Tadayon Oct 2020

Preservation Requests And The Fourth Amendment, Armin Tadayon

Seattle University Law Review

Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …


Transnational Government Hacking, Jennifer Daskal Jan 2020

Transnational Government Hacking, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden Jun 2019

Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden

Washington and Lee Law Review

This Note proceeds as follows: Part II offers a brief overview of what text messages are and what they are not. Part III covers the history of intangible personal property law and reviews the evolution of “cybertrespass” claims. Part IV explores the judiciary and the Fourth Amendment’s failure to protect text messages. Finally, Part V evaluates whether text messages constitute property and the practical implications of this finding.


Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones May 2019

Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones

Cleveland State Law Review

Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson Jan 2019

The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …


The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey Jan 2019

The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey

Faculty Scholarship

Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …


Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral Dec 2018

Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral

University of Miami Business Law Review

No abstract provided.


Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy Aug 2018

Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy

Washington and Lee Law Review Online

In recent years body-worn cameras have been championed by community groups, scholars, and the courts as a potential check on police misconduct. Such has been the enthusiasm for body-worn cameras that, in a relatively short time, they have been rolled out to police departments across the country. Perhaps because of the optimism surrounding these devices there has been little consideration of the Fourth Amendment issues they pose, especially when they are coupled with facial recognition technology (FRT). There is one particular context in which police use of FRT equipped body-worn cameras is especially concerning: public protests. This Comment constitutes the …


Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu Jan 2018

Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu

Scholarly Articles

To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …


Katz V. United States: Back To The Future?, Michael Vitiello Jan 2018

Katz V. United States: Back To The Future?, Michael Vitiello

University of Richmond Law Review

No abstract provided.


Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf Jan 2018

Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf

Scholarly Works

This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?

The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …