Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (9)
- Civil Rights and Discrimination (7)
- Criminal Law (5)
- Fourth Amendment (5)
- Science and Technology Law (4)
-
- Internet Law (3)
- Courts (2)
- Criminal Procedure (2)
- Evidence (2)
- Litigation (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- Animal Law (1)
- Biodiversity (1)
- Climate (1)
- Dispute Resolution and Arbitration (1)
- Energy Policy (1)
- Energy and Utilities Law (1)
- Environmental Law (1)
- Environmental Policy (1)
- Environmental Sciences (1)
- First Amendment (1)
- Forest Management (1)
- Forest Sciences (1)
- Indigenous, Indian, and Aboriginal Law (1)
- Jurisdiction (1)
- Land Use Law (1)
- Law Enforcement and Corrections (1)
- Law and Society (1)
- Institution
-
- Selected Works (5)
- SelectedWorks (4)
- The University of San Francisco (3)
- BLR (1)
- Boston University School of Law (1)
-
- Cleveland State University (1)
- George Washington University Law School (1)
- Notre Dame Law School (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Colorado Law School (1)
- University of Maryland Francis King Carey School of Law (1)
- University of the District of Columbia School of Law (1)
- Vanderbilt University Law School (1)
- Publication
-
- University of San Francisco Law Review (3)
- Faculty Scholarship (2)
- Journal Articles (2)
- Susan Freiwald (2)
- Aaron S Lowenstein (1)
-
- Donald J. Kochan (1)
- Erin Espedal (1)
- ExpressO (1)
- GW Law Faculty Publications & Other Works (1)
- John G. New (1)
- John W. Nelson (1)
- Journal of Law and Health (1)
- Katherine J. Strandburg (1)
- Shenequa L. Grey (1)
- The Future of Natural Resources Law and Policy (Summer Conference, June 6-8) (1)
- Touro Law Review (1)
- Vanderbilt Law School Faculty Publications (1)
- Publication Type
- File Type
Articles 1 - 22 of 22
Full-Text Articles in Law
Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg
Surveillance Of Emergent Associations: Freedom Of Association In A Network Society, Katherine J. Strandburg
Katherine J. Strandburg
Recent events have combined to bring of the prospect of using communications traffic data to ferret out suspect groups and investigate their membership and structure to the forefront of debate. While such “relational surveillance” has been around for years, efforts are being made to update traffic analysis to incorporate insights from “social network analysis” -- a means of analyzing relational structures developed by sociologists.1-13 Interest in employing social network analysis for law enforcement purposes was given a huge boost after September 11, 2001 when attention focused on tracking terrorist networks.5,7,9,11,12,14-17 Traffic data, when stored, aggregated, and analyzed using sophisticated computer …
Revisiting The Application Of The Exclusionary Rule To The Good Faith Exceptions In Light Of Hudson V. Michigan, Shenequa L. Grey
Revisiting The Application Of The Exclusionary Rule To The Good Faith Exceptions In Light Of Hudson V. Michigan, Shenequa L. Grey
Shenequa L. Grey
In Hudson v. Michigan, 126 S. Ct. 2159 (2006), the United States Supreme Court overruled decades of precedent and held that evidence obtained in violation of the “knock and announce” rule was admissible in the prosecutions case in chief against the defendant even though this evidence was technically unconstitutionally obtained. In doing so, the Court upheld the knock and announce rule, but strictly applied a “cost/benefit analysis” to conclude that the “exclusionary rule” was not applicable in this context. This analysis is consistent with other exceptions to the exclusionary rule established by the Court as well as with the “good …
Law Casebook Description And Table Of Contents: Constitutional Environmental And Natural Resources Law [Outline], Jim May, Robin Craig
Law Casebook Description And Table Of Contents: Constitutional Environmental And Natural Resources Law [Outline], Jim May, Robin Craig
The Future of Natural Resources Law and Policy (Summer Conference, June 6-8)
6 pages.
"James May, Widener University School of Law" -- Agenda
Search And Seizure On Steroids: United States V. Comprehensive Drug Testing And Its Consequences For Private Information Stored On Commercial Electronic Databases, Aaron S. Lowenstein
Search And Seizure On Steroids: United States V. Comprehensive Drug Testing And Its Consequences For Private Information Stored On Commercial Electronic Databases, Aaron S. Lowenstein
Aaron S Lowenstein
This article critiques the Ninth Circuit’s recent decision in United States v. Comprehensive Drug Testing. This case received some attention because it stems from the investigation into the use of steroids in Major League Baseball. It should have received much more attention, however, because of its troubling expansion of the government’s authority to access our private digital information without a warrant.
Executing a search warrant for information stored on a computer database poses special problems. Because targets of government investigations can easily conceal incriminating digital evidence, investigators often must search an entire computer hard drive in order to effectively execute …
If You Could Read My Mind: Implications Of Neurological Evidence For Twenty-First Century Criminal Jurisprudence, John G. New
If You Could Read My Mind: Implications Of Neurological Evidence For Twenty-First Century Criminal Jurisprudence, John G. New
John G. New
The advent of new technologies has permitted cognitive neuroscientists to explore the neural mechanisms underlying deceptive behaviors. Lawyers and law enforcement entities have shown great interest in exploring the legal consequences of employing such technologies; indeed such interest extends back to the days of phrenology and the advent of polygraphy. This article recounts current advances in the development of “truth telling” technologies, particularly functional magnetic resonance imaging (fMRI) and Brain Fingerprinting and recent attempts to introduce the latter into court as scientific evidence. The second part of the article explores the challenges to constitutional jurisprudence, especially to the Fifth and …
Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton
Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton
Erin Espedal
Emerging surveillance technologies now allow operators to collect information located within the brain of an individual, allow the collection of forensic evidence regarding cerebral and cognitive processes, and are even beginning to be able to predict human intentions. While science has not yet produced a mind-reading machine per se, the devices referred to as “cognitive camera technologies” are substantial steps in the direction of that inevitable result. One such technique, a proprietary method called Brain Fingerprinting, is used as an example of the strong trend towards increasingly invasive and ever more powerful surveillance methods, and provides an entrée to a …
Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione
Hudson And Samson: The Roberts Court Confronts Privacy, Dignity, And The Fourth Amendment, John D. Castiglione
ExpressO
This article critically analyzes Samson v. California and Hudson v. Michigan, which were the Roberts Court's first major Fourth Amendment decisions. In Samson, the Court upheld a California law allowing government officials to search parolees without any suspicion of wrongdoing. In Hudson, to the surprise of almost every observer, the Court held that knock-and-announce violations do not carry with them a remedy of exclusion. What was most notable about Hudson was not only that it rejected what every state and every federal court, save one, believed to be the proper remedy for knock-and-announce violations, but that it called into question …
Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson
Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson
John W. Nelson
Our laptops are capable of containing large amounts of personal, private, intimate, and confidential information. At the same time, the power of the government to search us and our possessions is at its zenith during a border crossing. How should our laptops be treated during these border crossings?
This Note examines the background of the border search exception and the privacy interests we each have in our laptop computers. This Note argues that searches of our laptop computers should be viewed as highly intrusive in nature because of the ability to quickly sort through vast amounts of intimate and private …
The Liberal Assault On The Fourth Amendment, Christopher Slobogin
The Liberal Assault On The Fourth Amendment, Christopher Slobogin
Vanderbilt Law School Faculty Publications
As construed by the Supreme Court, the Fourth Amendment's reasonableness requirement regulates overt, non-regulatory government searches of homes, cars, and personal effects-and virtually nothing else. This essay is primarily about how we got to this point. It is fashionable to place much of the blame for today's law on the Warren Court's adoption of the malleable expectation of privacy concept as the core value protected by the Fourth Amendment. But this diagnosis fails to explain why even the more liberal justices have often gone along with many of the privacy-diminishing holdings of the Court. This essay argues that three other …
Stunning Trends In Shocking Crimes: A Comprehensive Analysis Of Taser Weapons, Shaun H. Kedir
Stunning Trends In Shocking Crimes: A Comprehensive Analysis Of Taser Weapons, Shaun H. Kedir
Journal of Law and Health
In 2001, Westminster, Colorado police officers were dispatched to the home of a suicidal thirteen year-old girl who had barricaded herself in a bathroom. The young girl was mutilating her wrist with two butcher knives. When police officers forced their way into the bathroom, the emotionally disturbed girl charged at them with the two butcher knives while screaming, "Kill me! Kill me!." One of the officers deployed a Taser M26, a hand held conductive energy weapon, which fires two barbed darts up to a distance of thirty-five feet that then deliver an electric shock of 50,000 volts. The officer's Taser …
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Tied Up In Knotts? Gps And The Fourth Amendment, Renee Mcdonald Hutchins
Journal Articles
Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …
Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins
Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins
Faculty Scholarship
Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Journal Articles
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
University of San Francisco Law Review
This Article examines what procedural hurdles the government must overcome in order to compel service providers to turn over digital communications. Specifcally, Warshak v. United States raises these very questions because it asks the Sixth Circuit to determine what showing a court should require of the Government, under the Stored Communications Act. This article also examines whether those statutory requirements under the SCA satisfy the Fourth Amendment to the Constitution.
Companies Positioned In The Middle:Municipal Wireless And Its Impact On Privacy And Free Speech, Nicole Alexandra Ozer
Companies Positioned In The Middle:Municipal Wireless And Its Impact On Privacy And Free Speech, Nicole Alexandra Ozer
University of San Francisco Law Review
When a city institutes a municipal wireless system, it is building a new communications infrastructure on behalf of its residents. Like our rights to privacy in our public telephone communications, individuals have the right to a municipal wireless network that respects privacy and free speech, allowing users to explore all that the Internet offers without worrying where information about their online activities will end up or how it will be used or abused. Cities have a duty to protect the privacy and free speech rights of their residents, and safeguards for these rights must be priorities, not afterthoughts.
Only The Doj Knows: The Secret Law Of Electronic Surveillance, Kevin S. Bankston
Only The Doj Knows: The Secret Law Of Electronic Surveillance, Kevin S. Bankston
University of San Francisco Law Review
This Article examines a troubling pattern in the application of federal law enforcement surveillance statutes-namely, those portions of the Electronic Communications Privacy Act of 1986 (the "ECPA") sometimes known as the Pen Register Statute ("PRS") and the Stored Communications Act- ("SCA")-whereby federal prosecutors secretly and routinely obtain court authorization for surveillance that Congress did not intend and which may violate the Fourth Amendment.
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Section 1983 Civil Rights Litigation In The October 2005 Term, Martin Schwartz
Touro Law Review
No abstract provided.
The First Amendment As Criminal Procedure, Daniel J. Solove
The First Amendment As Criminal Procedure, Daniel J. Solove
GW Law Faculty Publications & Other Works
This Article explores the relationship between the First Amendment and criminal procedure. These two domains of constitutional law have long existed as separate worlds, rarely interacting with each other despite the fact that many instances of government information gathering can implicate First Amendment freedoms of speech, association, and religion. The Fourth and Fifth Amendments used to provide considerable protection for First Amendment interests, as in the famous 1886 case Boyd v. United States, in which the Supreme Court held that the government was prohibited from seizing a person's private papers. Over time, however, Fourth and Fifth Amendment protection has shifted, …
Police Interrogation During Traffic Stops: More Questions Than Answers, Tracey Maclin
Police Interrogation During Traffic Stops: More Questions Than Answers, Tracey Maclin
Faculty Scholarship
This short paper focuses on whether the Fourth Amendment permits police, during a routine traffic stop, to arbitrarily question motorists about subjects unrelated to the purpose of the traffic stop. The paper was prompted by a recent Ninth Circuit ruling, United States v. Mendez, 476 F.3d 1077 (9th Cir. 2007), which was authored by Judge Stephen Reinhardt.
Prior to Mendez, the Ninth Circuit had taken the position that the Fourth Amendment barred police from questioning motorists about subjects unrelated to the purpose of a traffic stop, unless there was independent suspicion for such questioning. This rule was based on the …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
A First Principles Approach To Communications' Privacy, Susan Freiwald
A First Principles Approach To Communications' Privacy, Susan Freiwald
Susan Freiwald
Symposium Introduction -- Miranda At 40: Applications In A Post-Enron, Post-9/11 World, Donald J. Kochan
Symposium Introduction -- Miranda At 40: Applications In A Post-Enron, Post-9/11 World, Donald J. Kochan
Donald J. Kochan
The groundbreaking case of Miranda v. Arizona raise[d] questions which go to the roots of our concepts of American criminal jurisprudence: the restraints society must observe consistent with the Federal Constitution in prosecuting individuals for crime. This Introduction to the 2007 Chapman Law Review Symposium summarizes the contemporary examination of Miranda's influence, past and present, along with the continuing debate today. The experiences and precedents that have evolved in the past 40 years helps to explore the evolution of the criminal law and procedural dictates set forth in Miranda. Complications with custodial interrogation - and the impulses and incentives involved …