Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Law
The First Amendment In The Second Gilded Age, Jack M. Balkin
The First Amendment In The Second Gilded Age, Jack M. Balkin
Buffalo Law Review
How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Property, Persons, And Institutionalized Police Interdiction In Byrd V. United States, Eric J. Miller
Loyola of Los Angeles Law Review
During a fairly routine traffic stop of a motorist driving a rental car, two State Troopers in Harrisburg, Pennsylvania, discovered that the driver, Terrence Byrd, was not the listed renter. The Court ruled that Byrd nonetheless retained a Fourth Amendment right to object to the search. The Court did not address, however, why the Troopers stopped Byrd in the first place. A close examination of the case filings reveal suggests that Byrd was stopped on the basis of his race. The racial feature ofthe stop is obscured by the Court’s current property-basedinterpretation of the Fourth Amendment’s right to privacy.
Although …
Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan
Rwu First Amendment Blog: David Logan's Blog: Discovering Trump 06-22-2018, David A. Logan
Law School Blogs
No abstract provided.
Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey
Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey
Faculty Articles
For the first hundred years of the Fourth Amendment's life, gains in the technology of surveillance were modest. With the advent of miniaturization and ever-increasing sophistication and capability of surveillance and detection devices, the Supreme Court has struggled to adapt its understanding of "search" to the constantly evolving devices and methods that challenge contemporary understanding of privacy. In response to surveillance innovations, the Court has taken varying positions, focusing first on property-based intrusions by government, then shifting to privacy expectations, and, more recently, resurrecting the view that a trespass to property can define search.
This article surveys this constitutional odyssey, …
We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro
We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro
Works of the FIU Libraries
This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.
Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s …
Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo
Being Forced To Code In The Technology Era As A Violation Of The First Amendment Protection Against Compelled Speech, Adrianna Oddo
Catholic University Law Review
Over the past several decades, technological advancements led several courts to hold that computer code is protected as speech under the First Amendment of the Constitution. However, after fourteen people were killed in the 2015 San Bernardino massacre the U.S. Government sought to ignore those findings when it ordered Apple, Inc. to write a computer code to bypass the encryption software on the shooter’s cell phone. To access this particular phone Apple would need to write a code that could potentially compromise its customers’ data and personal information. Apple vehemently opposed the Government’s order and claimed that compelling it to …
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick
The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick
Faculty Publications
Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.
This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …
Privacy's Double Standards, Scott Skinner-Thompson
Privacy's Double Standards, Scott Skinner-Thompson
Publications
Where the right to privacy exists, it should be available to all people. If not universally available, then privacy rights should be particularly accessible to marginalized individuals who are subject to greater surveillance and are less able to absorb the social costs of privacy violations. But in practice, there is evidence that people of privilege tend to fare better when they bring privacy tort claims than do non-privileged individuals. This disparity occurs despite doctrine suggesting that those who occupy prominent and public social positions are entitled to diminished privacy tort protections.
This Article unearths disparate outcomes in public disclosure tort …
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Carpenter V. United States And The Fourth Amendment: The Best Way Forward, Stephen E. Henderson
Stephen E Henderson
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Fourth Amendment Anxiety, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson