Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Law

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern Sep 2019

The Positive Law Model Of The Fourth Amendment, William Baude, James Y. Stern

James Y. Stern

For fifty years, courts have used a “reasonable expectation of privacy” standard to define “searches” under the Fourth Amendment. As others have recognized, that doctrine is subjective, unpredictable, and conceptually confused, but viable alternatives have been slow to emerge. This Article supplies one.

We argue that Fourth Amendment protection should be anchored in background positive law. The touchstone of the search-and-seizure analysis should be whether government officials have done something forbidden to private parties. It is those actions that should be subjected to Fourth Amendment reasonableness review and the presumptive requirement to obtain a warrant. In short, Fourth Amendment protection …


In Defense Of The American Community Survey, Michael Lewyn Dec 2018

In Defense Of The American Community Survey, Michael Lewyn

Michael E Lewyn

This article critiques the constitutional and policy challenges to the American Community Survey (ACS), an annual survey conducted by the U.S. Census Bureau. Some commentators argue that because the ACS goes far beyond ascertaining the number of Americans, it goes beyond the proper scope of the Census Clause.

This article asserts, by contrast, that the public interests favoring the ACS outweigh any possible privacy concerns, and that precedent under the First and Fourth Amendments supports ACS inquiries. The article goes on to assert that because the Census has always asked a wide range of questions, ACS questions are authorized by …


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson Dec 2017

Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson

Stephen E Henderson

We finally have a federal ‘test case.’  In Carpenter v. United States, the Supreme Court is poised to set the direction of the Fourth Amendment in the digital age.  The case squarely presents how the twentieth-century third party doctrine will fare in contemporary times, and the stakes could not be higher.  This Article reviews the Carpenter case and how it fits within the greater discussion of the Fourth Amendment third party doctrine and location surveillance, and I express a hope that the Court will be both a bit ambitious and a good measure cautious. 
 
As for ambition, the …


Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez Dec 2017

Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez

Stephen E Henderson

In Birchfield v. North Dakota (2016), the Supreme Court broke new Fourth Amendment ground by establishing that law enforcement’s collection of information can be cause for “anxiety,” meriting constitutional protection, even if subsequent uses of the information are tightly restricted.  This change is significant.  While the Court has long recognized the reality that police cannot always be trusted to follow constitutional rules, Birchfield changes how that concern is implemented in Fourth Amendment law, and importantly, in a manner that acknowledges the new realities of data-driven policing.
 
Beyond offering a careful reading of Birchfield, this Article has two goals. …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


If You Fly A Drone, So Can Police, Stephen E. Henderson May 2016

If You Fly A Drone, So Can Police, Stephen E. Henderson

Stephen E Henderson


According to the U.S. Constitution, the more you fly your drone, the more police can fly theirs. “Come on,” you might reply, “that hoary document”—and, yes, sorry to make you the sort who drops words like hoary—“that hoary document surely says nothing about drones.” But in fact it does. At least it does as interpreted by the courts. In particular, it is how they interpret the Fourth Amendment. So, to understand this aspect of drones, we first must understand this provision of the Bill of Rights...


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


Copyrights, Privacy, And The Blockchain, Tom W. Bell Dec 2015

Copyrights, Privacy, And The Blockchain, Tom W. Bell

Tom W. Bell

The law of the United States forces authors to choose between copyrights and privacy rights. Federal lawmakers have noticed and tried to remedy that problem. The Copyright Act makes express provisions for anonymous and pseudonymous works. The Copyright Office has tried to remedy that tension, too; copyright registration forms do not outwardly require authors to reveal their real world identities. Nonetheless, authors still face a choice between protecting their privacy and enjoying one of copyright’s most powerful incentives: the prospect of transferring to another the exclusive right to use a copyrighted work. That power proves useful, to say the least, …


Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson Dec 2015

Lawn Signs: A Fourth Amendment For Constitutional Curmudgeons, Stephen E. Henderson, Andrew G. Ferguson

Stephen E Henderson

What is the constitutional significance of the proverbial “keep off the grass” sign?  This question—asked by curmudgeonly neighbors everywhere—has been given new currency in a recent decision by the United States Supreme Court.  Indeed, Florida v. Jardines might have bestowed constitutional curmudgeons with significant new Fourth Amendment protections.  By expressing expectations regarding—and control over—access to property, “the people” may be able to claim greater Fourth Amendment protections not only for their homes, but also for their persons, papers, and effects.  This article launches a constitutionally grounded, but lighthearted campaign of citizen education and empowerment: Fourth Amendment LAWn signs.  With every …


A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson Dec 2015

A Rose By Any Other Name: Regulating Law Enforcement Bulk Metadata Collection, Stephen E. Henderson

Stephen E Henderson

In Other People’s Papers, Jane Bambauer argues for careful reform of the Fourth Amendment’s third party doctrine, providing an important contribution to an increasingly rich field of scholarship, judicial opinion, statute, and law reform.  Bambauer is especially concerned with access to bodies of third-party data that can be filtered and mined, as they can be privacy invasive but also effective and less subject to traditional investigative prejudices and limitations.  Although her article provocatively overclaims in trying to set itself apart from existing proposals, by analyzing existing constitutional and statutory law—including what I have termed a “limited” third party doctrine—and comparing …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …


United States V. Jones: Big Brother And The "Common Good" Versus The Fourth Amendment And Your Right To Privacy, Melanie Reid Jul 2015

United States V. Jones: Big Brother And The "Common Good" Versus The Fourth Amendment And Your Right To Privacy, Melanie Reid

Melanie M. Reid

In the center of the town of Siena, Italy, lays the Palazzo Publico which was built between 1297 and 1310. Inside the Palazzo Publico is the Sala della Pace, the Hall of Peace, which houses an early piece of Italian secular arta fresco that illustrates the effect government has on the city, its people, and the countryside.' The painter, Ambrogio Lorenzetti, depicted the "Common Good" as a king, sitting tall and strong above a line of smaller-sized, everyday people who are slowly making their way towards the "Common Good." This picture represents the subordination of private interest to the common …


Constitutional Issues Surrounding Student Possession And Use Of Cell Phones In Schools, Ralph Mawdsley, Charles Russo Feb 2015

Constitutional Issues Surrounding Student Possession And Use Of Cell Phones In Schools, Ralph Mawdsley, Charles Russo

Charles J. Russo

Constitutional challenges to limits on the possession and/ or use of cell phones in schools present potential claims involving the Fourth Amendment rights of students to privacy and to be free from unreasonable searchesalong with parental Fourteenth Amendment Liberty Clauserights to direct the education and upbringing of their children. However, as reflected in this article, as long as educational officials enact policies in line with state laws that are explicitly designed to enhance school safety, challenges filed by students and their parents are probably destined to fail because constitutional claims are likely to be outweighed by concerns for the greater …


Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb Dec 2014

Standing Room Only: Why Fourth Amendment Exclusion And Standing Can No Longer Logically Coexist, Sherry F. Colb

Sherry Colb

No abstract provided.


The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright Nov 2014

The Logic And Experience Of Law: Lawrence V. Texas And The Politics Of Privacy, Danaya C. Wright

Danaya C. Wright

The U.S. Supreme Court's June 2003 decision in Lawrence v. Texas may prove to be one of the most important civil rights cases of the twenty-first century. It may do for gay and lesbian people what Brown v. Board of Education did for African-Americans and Roe v. Wade did for women. While I certainly hope so, my enthusiasm is tempered by the fact that discrimination on the basis of race or gender has not disappeared. Will Lawrence signal meaningful change, or will its revolutionary possibilities be stifled by endless cycles of excuse and redefinition? The case is important, but I …


Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello Jul 2014

Riley V. California: What It Means For Metadata, Border Searches, And The Future Of Privacy, Adam Lamparello

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind Feb 2014

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean Jan 2014

Abidor V. Napolitano: Suspicionless Cell Phone And Laptop Searches At The Border Compromise The Fourth And First Amendments, Adam Lamparello, Charles Maclean

Adam Lamparello

The article explores the December 31, 2013 Abidor decision where the federal district court upheld the ongoing application of the border search exception as applied to deep, forensic searches of laptops and other digital devices. That exception allows suspicionless searches of any persons, effects, and “closed containers” crossing a border into the United States, and laptops and external hard drives are generally considered “closed containers” under the border search exception. We argue that the border search exception, grounded as it is in pre-digital age fact patterns, should no longer serve as precedent for border searches of the immense memories of …


Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello Jan 2014

Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”


Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean Jan 2014

Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean

Charles E. MacLean

The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”

This article calls upon Congress, and to a lesser extent, state legislatures, to control that …


The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr. Jan 2014

The Rise And Fall Of The Exclusionary Rule, Albert E. Poirier Jr.

Albert E Poirier Jr.

The years between 1913 and 1967 saw a growing tendency on the part of the Supreme Court to allow the submission of evidence that had been gained unlawfully by the police or prosecutors. Since 1961, and particularly during the Rehnquist and Roberts Courts, the rules excluding evidence have steadily diminished. This paper seeks to review the history of the exclusionary rule.


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Dec 2013

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Stephen E Henderson

"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


Who Should Be The ‘Decider’ On Keeping Our Secrets?, Stephen E. Henderson Sep 2013

Who Should Be The ‘Decider’ On Keeping Our Secrets?, Stephen E. Henderson

Stephen E Henderson

An invited essay for Constitution Day, also available here: http://blogs.law.widener.edu/constitution2013/2013-essay-authors/stephen-henderson/
It addresses the national security surveillance disclosed by Edward Snowden and others, and asks whether a fundamental shift would be prudent in the era of Big Data.


Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia Sep 2013

Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia

Dan Massoglia

No abstract provided.


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray Jun 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Citron, David Gray

David C. Gray

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier Apr 2013

Has Skinner Killed The Katz? Are Society's Expectations Of Privacy Reasonable In Today's Techological World?, Jason Forcier

Jason Forcier

The right to privacy has and will remain a hotly contested debate about American liberties. In 2012, a 3-0 decision by the Sixth Circuit Court of Appeals, in United States v. Melvin Skinner, the court held that there is no “reasonable expectation of privacy in the data given off by. . . cellphone[s].” Given today’s explosion of cellular technology and use of smart phones, is it unreasonable to believe a person should remain secure in their "person" and “effects," as guaranteed under the Fourth Amendment, from unreasonable searches and seizures? Furthermore, with police requiring only a subpoena to a obtain …