Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Fourth Amendment

2007

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 23 of 23

Full-Text Articles in Law

Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg Dec 2007

Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg

Katherine J. Strandburg

Recent events have combined to bring of the prospect of using communications traffic data to ferret out suspect groups and investigate their membership and structure to the forefront of debate. While such “relational surveillance” has been around for years, efforts are being made to update traffic analysis to incorporate insights from “social network analysis” -- a means of analyzing relational structures developed by sociologists.1-13 Interest in employing social network analysis for law enforcement purposes was given a huge boost after September 11, 2001 when attention focused on tracking terrorist networks.5,7,9,11,12,14-17 Traffic data, when stored, aggregated, and analyzed using sophisticated computer …


Revisiting The Application Of The Exclusionary Rule To The Good Faith Exceptions In Light Of Hudson V. Michigan, Shenequa L. Grey Aug 2007

Revisiting The Application Of The Exclusionary Rule To The Good Faith Exceptions In Light Of Hudson V. Michigan, Shenequa L. Grey

Shenequa L. Grey

In Hudson v. Michigan, 126 S. Ct. 2159 (2006), the United States Supreme Court overruled decades of precedent and held that evidence obtained in violation of the “knock and announce” rule was admissible in the prosecutions case in chief against the defendant even though this evidence was technically unconstitutionally obtained. In doing so, the Court upheld the knock and announce rule, but strictly applied a “cost/benefit analysis” to conclude that the “exclusionary rule” was not applicable in this context. This analysis is consistent with other exceptions to the exclusionary rule established by the Court as well as with the “good …


Law Casebook Description And Table Of Contents: Constitutional Environmental And Natural Resources Law [Outline], Jim May, Robin Craig Jun 2007

Law Casebook Description And Table Of Contents: Constitutional Environmental And Natural Resources Law [Outline], Jim May, Robin Craig

The Future of Natural Resources Law and Policy (Summer Conference, June 6-8)

6 pages.

"James May, Widener University School of Law" -- Agenda


Search And Seizure On Steroids: United States V. Comprehensive Drug Testing And Its Consequences For Private Information Stored On Commercial Electronic Databases, Aaron S. Lowenstein May 2007

Search And Seizure On Steroids: United States V. Comprehensive Drug Testing And Its Consequences For Private Information Stored On Commercial Electronic Databases, Aaron S. Lowenstein

Aaron S Lowenstein

This article critiques the Ninth Circuit’s recent decision in United States v. Comprehensive Drug Testing. This case received some attention because it stems from the investigation into the use of steroids in Major League Baseball. It should have received much more attention, however, because of its troubling expansion of the government’s authority to access our private digital information without a warrant.

Executing a search warrant for information stored on a computer database poses special problems. Because targets of government investigations can easily conceal incriminating digital evidence, investigators often must search an entire computer hard drive in order to effectively execute …


If You Could Read My Mind: Implications Of Neurological Evidence For Twenty-First Century Criminal Jurisprudence, John G. New Apr 2007

If You Could Read My Mind: Implications Of Neurological Evidence For Twenty-First Century Criminal Jurisprudence, John G. New

John G. New

The advent of new technologies has permitted cognitive neuroscientists to explore the neural mechanisms underlying deceptive behaviors. Lawyers and law enforcement entities have shown great interest in exploring the legal consequences of employing such technologies; indeed such interest extends back to the days of phrenology and the advent of polygraphy. This article recounts current advances in the development of “truth telling” technologies, particularly functional magnetic resonance imaging (fMRI) and Brain Fingerprinting and recent attempts to introduce the latter into court as scientific evidence. The second part of the article explores the challenges to constitutional jurisprudence, especially to the Fifth and …


Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton Feb 2007

Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton

Erin Espedal

Emerging surveillance technologies now allow operators to collect information located within the brain of an individual, allow the collection of forensic evidence regarding cerebral and cognitive processes, and are even beginning to be able to predict human intentions. While science has not yet produced a mind-reading machine per se, the devices referred to as “cognitive camera technologies” are substantial steps in the direction of that inevitable result. One such technique, a proprietary method called Brain Fingerprinting, is used as an example of the strong trend towards increasingly invasive and ever more powerful surveillance methods, and provides an entrée to a …


Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione Feb 2007

Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione

ExpressO

This article critically analyzes Samson v. California and Hudson v. Michigan, which were the Roberts Court's first major Fourth Amendment decisions. In Samson, the Court upheld a California law allowing government officials to search parolees without any suspicion of wrongdoing. In Hudson, to the surprise of almost every observer, the Court held that knock-and-announce violations do not carry with them a remedy of exclusion. What was most notable about Hudson was not only that it rejected what every state and every federal court, save one, believed to be the proper remedy for knock-and-announce violations, but that it called into question …


Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins

Journal Articles

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Jan 2007

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

University of San Francisco Law Review

This Article examines what procedural hurdles the government must overcome in order to compel service providers to turn over digital communications. Specifcally, Warshak v. United States raises these very questions because it asks the Sixth Circuit to determine what showing a court should require of the Government, under the Stored Communications Act. This article also examines whether those statutory requirements under the SCA satisfy the Fourth Amendment to the Constitution.


Companies Positioned In The Middle:Municipal Wireless And Its Impact On Privacy And Free Speech, Nicole Alexandra Ozer Jan 2007

Companies Positioned In The Middle:Municipal Wireless And Its Impact On Privacy And Free Speech, Nicole Alexandra Ozer

University of San Francisco Law Review

When a city institutes a municipal wireless system, it is building a new communications infrastructure on behalf of its residents. Like our rights to privacy in our public telephone communications, individuals have the right to a municipal wireless network that respects privacy and free speech, allowing users to explore all that the Internet offers without worrying where information about their online activities will end up or how it will be used or abused. Cities have a duty to protect the privacy and free speech rights of their residents, and safeguards for these rights must be priorities, not afterthoughts.


Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson Jan 2007

Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson

John W. Nelson

Our laptops are capable of containing large amounts of personal, private, intimate, and confidential information. At the same time, the power of the government to search us and our possessions is at its zenith during a border crossing. How should our laptops be treated during these border crossings?

This Note examines the background of the border search exception and the privacy interests we each have in our laptop computers. This Note argues that searches of our laptop computers should be viewed as highly intrusive in nature because of the ability to quickly sort through vast amounts of intimate and private …


Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins

Faculty Scholarship

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Stunning Trends In Shocking Crimes: A Comprehensive Analysis Of Taser Weapons, Shaun H. Kedir Jan 2007

Stunning Trends In Shocking Crimes: A Comprehensive Analysis Of Taser Weapons, Shaun H. Kedir

Journal of Law and Health

In 2001, Westminster, Colorado police officers were dispatched to the home of a suicidal thirteen year-old girl who had barricaded herself in a bathroom. The young girl was mutilating her wrist with two butcher knives. When police officers forced their way into the bathroom, the emotionally disturbed girl charged at them with the two butcher knives while screaming, "Kill me! Kill me!." One of the officers deployed a Taser M26, a hand held conductive energy weapon, which fires two barbed darts up to a distance of thirty-five feet that then deliver an electric shock of 50,000 volts. The officer's Taser …


Only The Doj Knows: The Secret Law Of Electronic Surveillance, Kevin S. Bankston Jan 2007

Only The Doj Knows: The Secret Law Of Electronic Surveillance, Kevin S. Bankston

University of San Francisco Law Review

This Article examines a troubling pattern in the application of federal law enforcement surveillance statutes-namely, those portions of the Electronic Communications Privacy Act of 1986 (the "ECPA") sometimes known as the Pen Register Statute ("PRS") and the Stored Communications Act- ("SCA")-whereby federal prosecutors secretly and routinely obtain court authorization for surveillance that Congress did not intend and which may violate the Fourth Amendment.


The Liberal Assault On The Fourth Amendment, Christopher Slobogin Jan 2007

The Liberal Assault On The Fourth Amendment, Christopher Slobogin

Vanderbilt Law School Faculty Publications

As construed by the Supreme Court, the Fourth Amendment's reasonableness requirement regulates overt, non-regulatory government searches of homes, cars, and personal effects-and virtually nothing else. This essay is primarily about how we got to this point. It is fashionable to place much of the blame for today's law on the Warren Court's adoption of the malleable expectation of privacy concept as the core value protected by the Fourth Amendment. But this diagnosis fails to explain why even the more liberal justices have often gone along with many of the privacy-diminishing holdings of the Court. This essay argues that three other …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Jan 2007

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Journal Articles

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz Jan 2007

Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz

Touro Law Review

No abstract provided.


Electronic Surveillance Of Terrorism: The Intelligence/Law Enforcement Dilemma - A History, William Funk Jan 2007

Electronic Surveillance Of Terrorism: The Intelligence/Law Enforcement Dilemma - A History, William Funk

Faculty Articles

The Foreign Intelligence Surveillance Act (FISA) has been much in the news. Because the requirements for a judicial warrant under FISA do not require the traditional showings for electronic surveillance for law enforcement purposes, one of the issues relating to EISA is the extent to which surveillance under that Act may be undertaken for the purposes of criminal law enforcement, rather than for obtaining foreign counterintelligence or counterterrorism information. This issue became particularly salient after 9/11 when at the administration's urging Congress passed an amendment to KISA in the USA PATRIOT Act that eliminated the previous requirement that "the purpose" …


The First Amendment As Criminal Procedure, Daniel J. Solove Jan 2007

The First Amendment As Criminal Procedure, Daniel J. Solove

GW Law Faculty Publications & Other Works

This Article explores the relationship between the First Amendment and criminal procedure. These two domains of constitutional law have long existed as separate worlds, rarely interacting with each other despite the fact that many instances of government information gathering can implicate First Amendment freedoms of speech, association, and religion. The Fourth and Fifth Amendments used to provide considerable protection for First Amendment interests, as in the famous 1886 case Boyd v. United States, in which the Supreme Court held that the government was prohibited from seizing a person's private papers. Over time, however, Fourth and Fifth Amendment protection has shifted, …


Police Interrogation During Traffic Stops: More Questions Than Answers, Tracey Maclin Jan 2007

Police Interrogation During Traffic Stops: More Questions Than Answers, Tracey Maclin

Faculty Scholarship

This short paper focuses on whether the Fourth Amendment permits police, during a routine traffic stop, to arbitrarily question motorists about subjects unrelated to the purpose of the traffic stop. The paper was prompted by a recent Ninth Circuit ruling, United States v. Mendez, 476 F.3d 1077 (9th Cir. 2007), which was authored by Judge Stephen Reinhardt.

Prior to Mendez, the Ninth Circuit had taken the position that the Fourth Amendment barred police from questioning motorists about subjects unrelated to the purpose of a traffic stop, unless there was independent suspicion for such questioning. This rule was based on the …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Dec 2006

The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


A First Principles Approach To Communications' Privacy, Susan Freiwald Dec 2006

A First Principles Approach To Communications' Privacy, Susan Freiwald

Susan Freiwald

Under current doctrines, parties to a communication enjoy robust constitutional protection against government surveillance only when they have a reasonable expectation of privacy in those communications. This paper suggests that the surprising dearth of case law applying the reasonable expectations of privacy test to modern electronic communications reflects courts' discomfort with the test's necessarily normative analysis. That discomfort also likely explains courts' use of shortcuts based on Miller v. United States and Smith v. Maryland in those few cases that have considered online surveillance practices. In particular, the government has argued that a broad third party rule deprives electronic mail …


Symposium Introduction -- Miranda At 40: Applications In A Post-Enron, Post-9/11 World, Donald J. Kochan Dec 2006

Symposium Introduction -- Miranda At 40: Applications In A Post-Enron, Post-9/11 World, Donald J. Kochan

Donald J. Kochan

The groundbreaking case of Miranda v. Arizona raise[d] questions which go to the roots of our concepts of American criminal jurisprudence: the restraints society must observe consistent with the Federal Constitution in prosecuting individuals for crime. This Introduction to the 2007 Chapman Law Review Symposium summarizes the contemporary examination of Miranda's influence, past and present, along with the continuing debate today. The experiences and precedents that have evolved in the past 40 years helps to explore the evolution of the criminal law and procedural dictates set forth in Miranda. Complications with custodial interrogation - and the impulses and incentives involved …