Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Law

The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf Jan 2022

Fourth Amendment Privacy In Public: A Fundamental Theory With Application To Location Tracking, Jordan Wallace-Wolf

Faculty Scholarship

When we walk out our front door, we are in public and other people may look at us. But intuitively, we don’t open ourselves up to unlimited scrutiny just by going outside. We retain some privacy, even in public. What is the source of this residual public-privacy, and how should the law recognize it without degrading the open character of public space?

The answer given by commentators, and most recently by the Supreme Court in Carpenter v. U.S., comes in the form of two related claims. The first is the chilling theory of the Fourth Amendment. According to this idea, …


Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin Dec 2019

Cops And Cars: How The Automobile Drove Fourth Amendment Law, Tracey Maclin

Faculty Scholarship

This is an essay on Professor Sarah A. Seo’s new book, Policing the Open Road: How Cars Transformed American Freedom (Harvard Univ. Press 2019). I focus on Professor Seo’s analysis of Carroll v. United States, 267 U.S. 132 (1925) and Brinegar v. United States, 338 U.S. 160 (1949). Carroll is important not only because it was the Court’s first car case. Understanding Carroll (and Brinegar, which solidified and expanded Carroll’s holding) is essential because, nearly one hundred years later, its logic continues to direct how the modern Court resolves Fourth Amendment claims of motorists. Put simply, a majority of today’s …


The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey Jan 2019

The Value Of Deviance: Understanding Contextual Privacy, Timothy Casey

Faculty Scholarship

Recent decisions by the Supreme Court in Carpenter v. United States and the Illinois Supreme Court in Rosenbach v. Six Flags Entertainment Corporation signal a shift in the traditional understanding of what exactly is protected by a privacy interest. Carpenter distinguished between a police officer’s observation of a suspect’s location and a perpetual catalogue of a person’s movements obtained through cell site location information (CSLI). The pervasive and vast quantity of information from CSLI exposed a protected privacy interest. In Rosenbach, the Illinois Supreme Court found the unique and personal quality of biometric information meant that consent and disclosure requirements …


Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin Jan 2019

Byrd V United States: Unauthorized Drivers Of Rental Cars Have Fourth Amendment Rights? Not As Evident As It Seems, Tracey Maclin

Faculty Scholarship

No discerning student of the Supreme Court would contend that Justice Anthony Kennedy broadly interpreted the Fourth Amendment during his thirty years on the Court. His majority opinions in Maryland v. King, Drayton v. United States and his willingness to join the three key sections of Justice Scalia’s opinion in Hudson v. Maryland, which held that suppression is never a remedy for knock-and-announce violations, are just a few examples of Justice Kennedy’s narrow view of the Fourth Amendment.

In light of his previous votes in search and seizure cases, surprisingly Justice Kennedy, in what would be his final Fourth Amendment …


Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso Jan 2018

Why Courts Fail To Protect Privacy: Race, Age, Bias, And Technology, Christopher Robertson, Bernard Chao, Ian Farrell, Catherine Durso

Faculty Scholarship

The Fourth Amendment protects against unreasonable “searches and seizures,” but in the digital age of stingray devices and IP tracking, what constitutes a search or seizure? The Supreme Court has held that the threshold question is supposed to depend on and reflect the “reasonable expectations” of ordinary members of the public concerning their own privacy. For example, the police now exploit the “third party” doctrine to access data held by email and cell phone providers, without securing a warrant, on the Supreme Court’s intuition that the public has no expectation of privacy in that information. Is that assumption correct? If …


Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog Jan 2018

Body Cameras And The Path To Redeem Privacy Law, Woodrow Hartzog

Faculty Scholarship

From a privacy perspective, the movement towards police body cameras seems ominous. The prospect of a surveillance device capturing massive amounts of data concerning people’s most vulnerable moments is daunting. These concerns are compounded by the fact that there is little consensus and few hard rules on how and for whom these systems should be built and used. But in many ways, this blank slate is a gift. Law and policy makers are not burdened by the weight of rules and technologies created in a different time for a different purpose. These surveillance and data technologies will be modern. Many …


The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens Jan 2015

The Fourth Amendment And Surveillance In A Digital World, Arthur Leavens

Faculty Scholarship

Technology has transformed government surveillance and opened traditionally private information to official scrutiny. The current privacy-based approach to the Fourth Amendment is unable to cope with the changes. This Article offers a solution to the problems that technological surveillance techniques present. Starting with the introduction of the approach in Katz, the Article reviews the development of privacy-based approach. It then looks at three 21st century Supreme Court cases that grappled with applying the Katz test to advanced technological surveillance techniques: Kyllo, Quon, and Jones. These cases demonstrate the problems that the privacy-based approach creates and the …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Faculty Scholarship

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


The Fight To Frame Privacy, Woodrow Hartzog Jan 2013

The Fight To Frame Privacy, Woodrow Hartzog

Faculty Scholarship

The resolution of a debate often hinges on how the problem being debated is presented. In psychology and related disciplines, this method of issue presentation is known as framing. Framing theory holds that even small changes in the presentation of an issue or event can produce significant changes of opinion. Framing has become increasingly important in discussions about privacy and security. In his new book, "Nothing to Hide: The False Tradeoff Between Privacy and Security," Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


Islam’S Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza Jan 2009

Islam’S Fourth Amendment: Search And Seizure In Islamic Doctrine And Muslim Practice, Sadiq Reza

Faculty Scholarship

Modern scholars regularly assert that Islamic law contains privacy protections similar to those of the Fourth Amendment to the U.S. Constitution. Two Quranic verses in particular - one that commands Muslims not to enter homes without permission, and one that commands them not to 'spy' - are held up, along with reports from the Traditions (Sunna) that repeat and embellish on these commands, as establishing rules that forbid warrantless searches and seizures by state actors and require the exclusion of evidence obtained in violation of these rules. This Article tests these assertions by: (1) presenting rules and doctrines Muslim jurists …


The Good And Bad News About Consent Searches In The Supreme Court, Tracey Maclin Jan 2008

The Good And Bad News About Consent Searches In The Supreme Court, Tracey Maclin

Faculty Scholarship

This article is about the Supreme Court's consent search doctrine. Part I describes how the law of consent searches developed between the 1920s and 1973, when Schneckloth v. Bustamonte was decided, which is the Court's seminal consent search case.

Part II of the article is a discussion of Bustamonte. In particular, this part highlights the spoken and unspoken premises that influenced the result in Bustamonte and outlines Bustamonte's continuing relevance for consent search cases today.

Part III examines United States v. Drayton, a ruling authored by Justice Kennedy that explains why a cryptic passage in that ruling provides important clues …


Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins Jan 2007

Tied Up In Knotts? Gps Technology And The Fourth Amendment, Renée Mcdonald Hutchins

Faculty Scholarship

Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging technologies within the existing doctrinal framework. Analysis …


Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager Jan 2004

Overcoming Hiddenness: The Role Of Intentions In Fourth Amendment Analysis, Daniel B. Yeager

Faculty Scholarship

This Article rehearses a response to the problems posed to and by the Supreme Court's attempts to work out the meaning and operation of the word "search." After commencing Part II by meditating on the notion of privacy, I take up its relation to the antecedent suspicion or knowledge that Fourth-Amendment law requires as a justification for all privacy invasions. From there, I look specifically at that uneasy relation in Supreme Court jurisprudence, which has come to privilege privacy over property as a Fourth Amendment value. From there, Part III reviews the sources or bases that can tell us what …


Stubbornness Of Pretexts, Daniel B. Yeager Jan 2003

Stubbornness Of Pretexts, Daniel B. Yeager

Faculty Scholarship

This Article will reflect on (1) how the Whren v. United States failure to acknowledge what counts as a pretext accounts for the residual confusion as to whether or not Whren really has killed off the pretext argument in constitutional criminal procedure, and (2) the extent to which the Court in Sullivan compounded that failure, which I hope to lightly correct here by distinguishing motives from intentions and then by elaborating the role that each plays, or at least should play, in Fourth Amendment jurisprudence.


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …