Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Law

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


Policing & The Problem Of Physical Restraint, Steven Arrigg Koh Feb 2023

Policing & The Problem Of Physical Restraint, Steven Arrigg Koh

Faculty Scholarship

The Fourth Amendment of the U.S. Constitution prohibits unreasonable “seizures” and thus renders unlawful police use of excessive force. On one hand, this definition is expansive. In the U.S. Supreme Court’s 2021 Term, in Torres v. Madrid, the Court clarified that a “seizure” includes any police application of physical force to the body with intent to restrain. Crucially, Chief Justice Roberts’ majority opinion emphasized that police may seize even when merely laying “the end of a finger” on a layperson’s body. And yet, the Supreme Court’s Fourth Amendment totality-of-the-circumstances reasonableness balancing test is notoriously imprecise—a “factbound morass,” in the famous …


Policing "Bad" Mothers, I. Bennett Capers Jan 2023

Policing "Bad" Mothers, I. Bennett Capers

Faculty Scholarship

Jessamine Chan’s The School for Good Mothers — a speculative novel about a mother who abandons her child for a few hours and is required to attend a school for good mothers to regain custody — may not be a great book, but it is a good yarn, and a page turner, and thought-provoking. Thought-provoking, because to measure her fitness to be a mother, the protagonist is assigned a robot doppelganger of her child — one that is sentient, one that seems almost real, one that might even pass the Turing test, and one that she is required not only …


Are Police Officers Bayesians? Police Updating In Investigative Stops, Jeffrey A. Fagan, Lila J.E. Nojima Jan 2023

Are Police Officers Bayesians? Police Updating In Investigative Stops, Jeffrey A. Fagan, Lila J.E. Nojima

Faculty Scholarship

Theories of rational behavior assume that actors make decisions where the benefits of their acts exceed their costs or losses. If those expected costs and benefits change over time, behavior will change accordingly as actors learn and internalize the parameters of success and failure. In the context of proactive policing, police stops that achieve any of several goals — constitutional compliance, stops that lead to “good” arrests or summonses, stops that lead to seizures of weapons, drugs, or other contraband, or stops that produce good will and citizen cooperation — should signal to officers the features of a stop that …


Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado Apr 2022

Rewriting Whren V. United States, Jonathan Feingold, Devon Carbado

Faculty Scholarship

In 1996, the U.S. Supreme Court decided Whren v. United States—a unanimous opinion in which the Court effectively constitutionalized racial profiling. Despite its enduring consequences, Whren remains good law today. This Article rewrites the opinion. We do so, in part, to demonstrate how one might incorporate racial justice concerns into Fourth Amendment jurisprudence, a body of law that has long elided and marginalized the racialized dimensions of policing. A separate aim is to reveal the “false necessity” of the Whren outcome. The fact that Whren was unanimous, and that even progressive Justices signed on, might lead one to conclude that …


Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf Jan 2022

Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf

Faculty Scholarship

When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?

The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …


Ending Cps Home Searches' Evasion Of The Fourth Amendment, Joshua Gupta-Kagan Jan 2022

Ending Cps Home Searches' Evasion Of The Fourth Amendment, Joshua Gupta-Kagan

Faculty Scholarship

Every year, Child Protective Service (CPS) agencies investigate about 3 million families around the country for alleged neglect or abuse of their children. Under agency policies, all of those millions of investigations include searches of families’ homes. CPS investigators knock on the door (usually unannounced), look in every room of the house, open kitchen cabinets, sometimes inspect children’s bodies, and generally look for any evidence of child maltreatment. Yet CPS agencies rarely seek a warrant, and typically act as if that is unnecessary. (P. 18 & n.86.)


Tear Gas + Water Hoses + Dispersal Orders: The Fourth Amendment Endorses Brutality In Protest Policing, Karen Pita Loor May 2020

Tear Gas + Water Hoses + Dispersal Orders: The Fourth Amendment Endorses Brutality In Protest Policing, Karen Pita Loor

Faculty Scholarship

Thirty years ago, in Graham v. Connor, the Supreme Court determined that excessive-force claims against police should proceed via the Fourth Amendment, which theoretically protects an individual against unreasonable seizures. However, the Court showed extreme deference to law enforcement’s use of force by using a permissive reasonableness analysis that bestows on police great leeway to make quick split-second decisions in tense and rapidly evolving circumstances. The result is a test that, from its inception, has been too forgiving of police violence and misconduct. This lax reasonableness standard, along with qualified immunity principles, has shielded police from § 1983 civil rights …


A Third-Party Doctrine For Digital Metadata, H. Brian Holland Apr 2020

A Third-Party Doctrine For Digital Metadata, H. Brian Holland

Faculty Scholarship

For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …


Lawful Searches Incident To Unlawful Arrests: A Reform Proposal, Mark A. Summers Dec 2019

Lawful Searches Incident To Unlawful Arrests: A Reform Proposal, Mark A. Summers

Faculty Scholarship

No abstract provided.


When Protest Is The Disaster: Constitutional Implications Of State And Local Emergency Power, Karen Pita Loor Oct 2019

When Protest Is The Disaster: Constitutional Implications Of State And Local Emergency Power, Karen Pita Loor

Faculty Scholarship

The President’s use of emergency authority has recently ignited concern among civil rights groups over national executive emergency power. However, state and local emergency authority can also be dangerous and deserves similar attention. This article demonstrates that, just as we watch over the national executive, we must be wary of and check on state and local executives — and their emergency management law enforcement actors — when they react in crisis mode. This paper exposes and critiques state executives’ use of emergency power and emergency management mechanisms to suppress grassroots political activity and suggests avenues to counter that abuse. I …


The Public Information Fallacy, Woodrow Hartzog Mar 2019

The Public Information Fallacy, Woodrow Hartzog

Faculty Scholarship

The concept of privacy in “public” information or acts is a perennial topic for debate. It has given privacy law fits. People struggle to reconcile the notion of protecting information that has been made public with traditional accounts of privacy. As a result, successfully labeling information as public often functions as a permission slip for surveillance and personal data practices. It has also given birth to a significant and persistent misconception — that public information is an established and objective concept.

In this article, I argue that the “no privacy in public” justification is misguided because nobody knows what “public” …


Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin Jan 2019

Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin

Faculty Scholarship

No discerning student of the Supreme Court would contend that Justice Anthony Kennedy broadly interpreted the Fourth Amendment during his thirty years on the Court. His majority opinions in Maryland v. King, Drayton v. United States and his willingness to join the three key sections of Justice Scalia’s opinion in Hudson v. Maryland, which held that suppression is never a remedy for knock-and-announce violations, are just a few examples of Justice Kennedy’s narrow view of the Fourth Amendment.

In light of his previous votes in search and seizure cases, surprisingly Justice Kennedy, in what would be his final Fourth Amendment …


The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey Jan 2019

The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey

Faculty Scholarship

Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …


A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland Sep 2018

A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland

Faculty Scholarship

For nearly 200 years, an individual’s personal papers enjoyed near-absolute protection from government search and seizure. That is no longer the case. With the widespread adoption of cloud-based information processing and storage services, the third-party doctrine operates to effectively strip our digital papers of meaningful Fourth Amendment protections.

This Article presents a new approach to reconciling current third-party doctrine with the technological realities of modern personal information processing. Our most sensitive data is now processed and stored on cloud computing systems owned and operated by third parties. Although we may consider these services to be private and generally secure, the …


Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov Jan 2018

Police Ignorance And Mistake Of Law Under The Fourth Amendment, Eang L. Ngov

Faculty Scholarship

No abstract provided.


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso

Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …


Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog Jan 2018

Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog

Faculty Scholarship

From a privacy perspective, the movement towards police body cameras seems ominous. The prospect of a surveillance device capturing massive amounts of data concerning people’s most vulnerable moments is daunting. These concerns are compounded by the fact that there is little consensus and few hard rules on how and for whom these systems should be built and used. But in many ways, this blank slate is a gift. Law and policy makers are not burdened by the weight of rules and technologies created in a different time for a different purpose. These surveillance and data technologies will be modern. Many …


Reconsidering Constitutional Protection For Health Information Privacy, Wendy K. Mariner Feb 2016

Reconsidering Constitutional Protection For Health Information Privacy, Wendy K. Mariner

Faculty Scholarship

What kinds of health information should be reported to government for civil purposes? Several competing trends encourage efforts to reassess the scope of constitutional protection for health information: the social and commercial value of health information; the amount of data held by third parties, from health care providers to internet servers; critiques of the third party doctrine exception to Fourth Amendment protection; and concerns about the loss of privacy. This article describes a variety of civil purposes for which health information is collected today. A close analysis of cases applying the third party doctrine, administrative search principles, and the special …


Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin Nov 2015

Government Analysis Of Shed Dna Is A Search Under The Fourth Amendment, Tracey Maclin

Faculty Scholarship

This article addresses whether the Fourth Amendment is implicated when police surreptitiously collect and analyze a person’s involuntarily shed DNA.

Law enforcement officers will often obtain shed or abandoned DNA samples from persons who they suspect have committed crimes, but lack sufficient evidence to arrest or detain such persons. When utilizing abandoned or shed DNA for criminal investigative purposes, there are two state actions which arguably trigger Fourth Amendment protection. First, the collection of the biological material which contains a person’s DNA might be considered a search under the amendment. Courts, however, have uniformly rejected this argument. For example, when …


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


Following The Script: Narratives Of Suspicion In Terry Stops In Street Policing, Jeffery Fagan, Amanda Geller Jan 2015

Following The Script: Narratives Of Suspicion In Terry Stops In Street Policing, Jeffery Fagan, Amanda Geller

Faculty Scholarship

Regulation of Terry stops of pedestrians by police requires articulation of the reasonable and individualized bases of suspicion that motivate their actions. Nearly five decades after Terry, courts have found it difficult to articulate the boundaries or parameters of reasonable suspicion. The behavior and appearances of individuals combine with the social and spatial contexts in which police observe them to create an algebra of suspicion. Police can proceed to approach and temporarily detain a person at a threshold of suspicion that courts have been unable and perhaps unwilling to articulate. The result has been sharp tensions within Fourth Amendment …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Faculty Scholarship

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


The Right To Quantitative Privacy, Danielle K. Citron, David Gray Nov 2013

The Right To Quantitative Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


Fighting Cyber-Crime After United States V. Jones, Danielle K. Citron, David Gray, Liz Rinehart Jul 2013

Fighting Cyber-Crime After United States V. Jones, Danielle K. Citron, David Gray, Liz Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray Apr 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, Danielle K. Citron, David Gray

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


A Spectacular Non Sequitur: The Supreme Court's Contemporary Fourth Amendment Exclusionary Rule Jurisprudence, David C. Gray Jan 2013

A Spectacular Non Sequitur: The Supreme Court's Contemporary Fourth Amendment Exclusionary Rule Jurisprudence, David C. Gray

Faculty Scholarship

Much of the Supreme Court’s contemporary Fourth Amendment exclusionary rule jurisprudence is constructed upon an analytic mistake that H.L.A. Hart described in another context as a “spectacular non sequitur.” That path to irrelevance is paved by the Court’s recent insistence that the sole justification for excluding evidence seized in violation of the Fourth Amendment is the prospect of deterring law enforcement officers. This deterrence-only approach ignores or rejects more principled justifications that inspired the rule at its genesis and have sustained it through the majority of its history and development. More worrisome, however, is the conceptual insufficiency of deterrence considerations …


Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik Jan 2013

Neurotechnologies At The Intersection Of Criminal Procedure And Constitutional Law, Amanda C. Pustilnik

Faculty Scholarship

The rapid development of neurotechnologies poses novel constitutional issues for criminal law and criminal procedure. These technologies can identify directly from brain waves whether a person is familiar with a stimulus like a face or a weapon, can model blood flow in the brain to indicate whether a person is lying, and can even interfere with brain processes themselves via high-powered magnets to cause a person to be less likely to lie to an investigator. These technologies implicate the constitutional privilege against compelled, self-incriminating speech under the Fifth Amendment and the right to be free of unreasonable search and seizure …


The Fight To Frame Privacy, Woodrow Hartzog Jan 2013

The Fight To Frame Privacy, Woodrow Hartzog

Faculty Scholarship

The resolution of a debate often hinges on how the problem being debated is presented. In psychology and related disciplines, this method of issue presentation is known as framing. Framing theory holds that even small changes in the presentation of an issue or event can produce significant changes of opinion. Framing has become increasingly important in discussions about privacy and security. In his new book, "Nothing to Hide: The False Tradeoff Between Privacy and Security," Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that …