Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (9)
- Selected Works (8)
- Penn State Law (5)
- Washington and Lee University School of Law (5)
- Chicago-Kent College of Law (4)
-
- Pepperdine University (4)
- Cleveland State University (3)
- University of Miami Law School (3)
- Boston University School of Law (2)
- Fordham Law School (2)
- Lincoln Memorial University - Duncan School of Law (2)
- Maurer School of Law: Indiana University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Arkansas at Little Rock William H. Bowen School of Law (2)
- University of Pittsburgh School of Law (2)
- Bridgewater College (1)
- California Western School of Law (1)
- Emory University School of Law (1)
- Florida International University College of Law (1)
- Georgetown University Law Center (1)
- Georgia State University College of Law (1)
- Seattle University School of Law (1)
- SelectedWorks (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- The University of Akron (1)
- University of Colorado Law School (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pennsylvania Carey Law School (1)
- Publication Year
- Publication
-
- Articles in Law Reviews & Other Academic Journals (9)
- Faculty Scholarship (5)
- Journal Articles (5)
- Chicago-Kent Law Review (4)
- David Kaye (4)
-
- Articles (3)
- Cleveland State Law Review (3)
- Pepperdine Law Review (3)
- Catholic University Journal of Law and Technology (2)
- Charles E. MacLean (2)
- University of Arkansas at Little Rock Law Review (2)
- University of Miami Law Review (2)
- Washington and Lee Law Review (2)
- Akron Law Review (1)
- All Faculty Scholarship (1)
- Articles by Maurer Faculty (1)
- Danielle Keats Citron (1)
- David C. Gray (1)
- Emory Law Journal (1)
- FIU Law Review (1)
- Fordham Urban Law Journal (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Georgia State University Law Review (1)
- Honors Projects (1)
- Indiana Law Journal (1)
- John W. Nelson (1)
- Journal of Civil Rights and Economic Development (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Margaret Hu (1)
- Renée M. Hutchins (1)
- Publication Type
Articles 1 - 30 of 74
Full-Text Articles in Law
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson
Pepperdine Law Review
The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …
The Automated Fourth Amendment, Maneka Sinha
The Automated Fourth Amendment, Maneka Sinha
Emory Law Journal
Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible.
Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Faculty Scholarship
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.
Privacy nicks come from the …
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Articles
This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Privacy And Property: Constitutional Concerns Of Dna Dragnet Testing, E. Wyatt Jones
Honors Projects
DNA dragnets have attracted both public and scholarly criticisms that have yet to be resolved by the Courts. This review will introduce a modern understanding of DNA analysis, a complete introduction to past and present Fourth and Fourteenth Amendment jurisprudence, and existing suggestions concerning similar issues in legal scholarship. Considering these contexts, this review concludes that a focus on privacy and property at once, with a particular sensitivity to the inseverable relationship between the two interests, is Constitutionally consistent with precedent and the most workable means of answering the question at hand.
Surveillance Technologies And Constitutional Law, Christopher Slobogin, Sarah Brayne
Surveillance Technologies And Constitutional Law, Christopher Slobogin, Sarah Brayne
Vanderbilt Law School Faculty Publications
This review focuses on government use of technology to observe, collect, or record potential criminal activity in real-time, as contrasted with “transaction surveillance” that involves government efforts to access already-existing records and exploit Big Data, topics that have been the focus of previous reviews (Brayne 2018, Ridgeway 2018). Even so limited, surveillance technologies come in many guises, including closed-circuit television, automated license plate and facial readers, aerial cameras, and GPS tracking. Also classifiable as surveillance technology are devices such as thermal and electromagnetic imagers that can “see” through walls and clothing. Finally, surveillance includes wiretapping and other forms of communication …
On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl
On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl
Indiana Law Journal
Police use of electronic warrant (“e-warrant”) technology has increased significantly in recent years. E-warrant technology allows law enforcement to submit, and magistrate judges to review and approve, warrant applications on computers, smartphones, and tablets, often without any direct communication. Police officers report that they favor e-warrants over their traditional, paper counterparts because they save officers a significant amount of time in applying for warrants by eliminating the need to appear in-person before a magistrate. Legal scholars have almost uniformly praised e-warrant technology as well, arguing that use of these systems will increase the number of warrants issued throughout the United …
Evolving Privacy Protections For Emerging Machine Learning Data Under Carpenter V. United States, Emily Nicolella
Evolving Privacy Protections For Emerging Machine Learning Data Under Carpenter V. United States, Emily Nicolella
FIU Law Review
The Fourth Amendment’s third-party doctrine eliminates an individual’s reasonable expectation of privacy in information they willingly turn over to third parties. Government scrutiny of this information is not considered a search under the Fourth Amendment and is therefore not given constitutional protections. In the 2018 case Carpenter v. United States, the Supreme Court created an exception to the third-party doctrine. In Carpenter, a case involving the warrantless use of cell site location information (CSLI) in a criminal investigation, the Court held that individuals do have a reasonable expectation of privacy regarding CSLI. According to Chief Justice Roberts, despite the necessary …
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Beware What You Google: Fourth Amendment Constitutionality Of Keyword Warrants, Chelsa Camille Edano
Washington Law Review
Many Americans have potentially had their privacy rights invaded through invisible, widespread police searches. In recent years, local and federal governments have compelled Google and other search engine companies to produce the personal information of users who have conducted a search query related to a crime. By using keyword warrants, the government can conduct a dragnet search for suspects, imposing suspicion on users and exposing their personal information. The keyword warrant is a symptom of the erosion of the Fourth Amendment protection against suspicionless searches. Not only is scholarship scarce on keyword warrants, but also instances of these warrants are …
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Criminal Procedure—Technology In The Modern Era: The Implications Of Carpenter V. United States And The Limits Of The Third-Party Doctrine As To Cell Phone Data Gathered Through Real-Time Tracking, Stingrays, And Cell Tower Dumps, Deepali Lal
University of Arkansas at Little Rock Law Review
No abstract provided.
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict
Washington and Lee Law Review
Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.
Courts rarely, if ever, examine FRT’s role in establishing …
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
Alexa Hears With Her Little Ears—But Does She Have The Privilege?, Lauren Chlouber Howell
St. Mary's Law Journal
Abstract forthcoming.
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
New Technology And The Right To Privacy: Do E-Scooters Implicate The Fourth Amendment?, Alexander P. Carroll
Journal of the National Association of Administrative Law Judiciary
The Fourth Amendment protects individual’s right to privacy from unwarranted searches and seizures, but the analysis for when the Fourth Amendment applies has become more complicated as new technology is developed. E-scooters are a new piece of technology which may implicate the Fourth Amendment. Cities across the country are beginning to require the mobility companies which provide e-scooter services to turn over location data in order to receive an operating permit. This article first provides a background of the Fourth Amendment, then provides details regarding the new city regulations. The article includes a discussion of the privacy concerns as well …
Facial Recognition And The Fourth Amendment, Andrew Ferguson
Facial Recognition And The Fourth Amendment, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.
This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …
No Longer Innocent Until Proven Guilty: How Ohio Violates The Fourth Amendment Through Familial Dna Searches Of Felony Arrestees, Jordan Mason
Cleveland State Law Review
In 2013, the United States Supreme Court legalized DNA collection of all felony arrestees upon arrest through its decision in Maryland v. King. Since then, the State of Ohio has broadened the use of arrestee DNA by subjecting it to familial DNA searches. Ohio’s practice of conducting familial DNA searches of arrestee DNA violates the Fourth Amendment because arrestees have a reasonable expectation of privacy in the information that is extracted from a familial DNA search and it fails both the totality of the circumstances and the special needs tests. Further, these tests go against the intention of the …
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
Transnational Government Hacking, Jennifer Daskal
Transnational Government Hacking, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden
Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden
Washington and Lee Law Review
This Note proceeds as follows: Part II offers a brief overview of what text messages are and what they are not. Part III covers the history of intangible personal property law and reviews the evolution of “cybertrespass” claims. Part IV explores the judiciary and the Fourth Amendment’s failure to protect text messages. Finally, Part V evaluates whether text messages constitute property and the practical implications of this finding.
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cell Phones Are Orwell's Telescreen: The Need For Fourth Amendment Protection In Real-Time Cell Phone Location Information, Matthew Devoy Jones
Cleveland State Law Review
Courts are divided as to whether law enforcement can collect cell phone location information in real-time without a warrant under the Fourth Amendment. This Article argues that Carpenter v. United States requires a warrant under the Fourth Amendment prior to law enforcement’s collection of real-time cell phone location information. Courts that have required a warrant prior to the government’s collection of real-time cell phone location information have considered the length of surveillance. This should not be a factor. The growing prevalence and usage of cell phones and cell phone technology, the original intent of the Fourth Amendment, and United States …
Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.
Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.
Journal of Civil Rights and Economic Development
(Excerpt)
Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson
The Exclusionary Rule In The Age Of Blue Data, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
In Herring v. United States, Chief Justice John Roberts reframed the Supreme Court’s understanding of the exclusionary rule: “As laid out in our cases, the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.” The open question remains: how can defendants demonstrate sufficient recurring or systemic negligence to warrant exclusion? The Supreme Court has never answered the question, although the absence of systemic or recurring problems has figured prominently in two recent exclusionary rule decisions. Without the ability to document recurring failures, or patterns of police misconduct, courts can dismiss …
The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey
The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey
Faculty Scholarship
Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …
Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral
Evolving Autonomous Vehicle Technology And The Erosion Of Privacy, Raquel Toral
University of Miami Business Law Review
No abstract provided.
Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy
Chilling: The Constitutional Implications Of Body-Worn Cameras And Facial Recognition Technology At Public Protests, Julian R. Murphy
Washington and Lee Law Review Online
In recent years body-worn cameras have been championed by community groups, scholars, and the courts as a potential check on police misconduct. Such has been the enthusiasm for body-worn cameras that, in a relatively short time, they have been rolled out to police departments across the country. Perhaps because of the optimism surrounding these devices there has been little consideration of the Fourth Amendment issues they pose, especially when they are coupled with facial recognition technology (FRT). There is one particular context in which police use of FRT equipped body-worn cameras is especially concerning: public protests. This Comment constitutes the …
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Scholarly Articles
To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …
Katz V. United States: Back To The Future?, Michael Vitiello
Katz V. United States: Back To The Future?, Michael Vitiello
University of Richmond Law Review
No abstract provided.
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Game Of Drones: Rolling The Dice With Unmanned Aerial Vehicles And Privacy, Rebecca L. Scharf
Scholarly Works
This Article offers a practical three-part test for courts and law enforcement to utilize when faced with drone and privacy issues. Specifically addressing the question: how should courts analyze the Fourth Amendment’s protection against ‘unreasonable searches’ in the context of drones?
The Supreme Court’s Fourth Amendment jurisprudence produced an intricate framework to address issues arising out of the intersection of technology and privacy interests. In prominent decisions, including United States v. Katz, California v. Ciraolo, Kyllo v. United States, and most notably, United States v. Jones, the Court focused on whether the use of a single …