Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

University of Richmond

Law Enforcement and Corrections

Articles 1 - 3 of 3

Full-Text Articles in Law

Katz V. United States: Back To The Future?, Michael Vitiello Jan 2018

Katz V. United States: Back To The Future?, Michael Vitiello

University of Richmond Law Review

No abstract provided.


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill Jan 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law‘S Need To Evolve, Justin Hill

Law Student Publications

This comment explores how broader shifts in Fourth Amendment doctrine may affect the government's collection of Cell Site Location Information (CSLI) moving forward. It consists of three parts. Part I examines the technological underpinnings of cellular networks. The issue is frequently litigated, but few in the legal community have a real grasp on the technology. A nuanced understanding of the technology is crucial when examining the accuracy of CSLI or how the third-party doctrine ought to apply. This comment consolidates and simplifies the technical workings of cellular networks to enable better and more informed answers. Last, drawing on this understanding, …


The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins May 2010

The Anatomy Of A Search: Intrusiveness And The Fourth Amendment, Renée Mcdonald Hutchins

University of Richmond Law Review

In this essay, I contend that when evaluating the constitutionality of enhanced surveillance devices, the existing test for assessing the occurrence of a Fourth Amendment search should be modified. Specifically, I suggest that intrusiveness should be unambiguously adopted by the Court as the benchmark for assessing and defining the existence of a search under the Fourth Amendment. Moreover, intrusiveness should be clearly defined to require an examination of two factors: the functionality of a challenged form of surveillance and the potential for disclosure created by the device.