Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Privacy Law

Aerial Trespass And The Fourth Amendment, Randall F. Khalil May 2023

Aerial Trespass And The Fourth Amendment, Randall F. Khalil

Michigan Law Review

Since 1973, courts have analyzed aerial surveillance under the Fourth Amendment by applying the test from Katz v. United States, which states that a search triggers the Fourth Amendment when a government actor violates a person’s “reasonable expectation of privacy.” The Supreme Court applied Katz to aerial surveillance three times throughout the 1980s, yet this area of the law remains unsettled and outcomes are unpredictable. In 2012, the Supreme Court recognized an alternative to the Katz test in Jones v. United States, which held that a search triggers the Fourth Amendment when a government actor physically intrudes into …


Giving The Fourth Amendment Meaning: Creating An Adversarial Warrant Proceeding To Protect From Unreasonable Searches And Seizures, Ben Mordechai-Strongin Apr 2023

Giving The Fourth Amendment Meaning: Creating An Adversarial Warrant Proceeding To Protect From Unreasonable Searches And Seizures, Ben Mordechai-Strongin

University of Michigan Journal of Law Reform

For at least the past 40 years, police and prosecutors have had free reign in conducting illegal searches and seizures nominally barred by the Fourth Amendment. The breadth of exceptions to the warrant requirement, the lax interpretation of probable cause, and especially the “good faith” doctrine announced in U.S. v. Leon have led to severe violations of privacy rights, trauma to those wrongly searched or seized, and a court system overburdened by police misconduct cases. Most scholars analyzing the issue agree that the rights guaranteed by the Fourth Amendment—to be free from unreasonable search and seizure—have been severely eroded or …


“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee Jun 2022

“Bang!”: Shotspotter Gunshot Detection Technology, Predictive Policing, And Measuring Terry’S Reach, Harvey Gee

University of Michigan Journal of Law Reform

ShotSpotter technology is a rapid identification and response system used in ninety American cities that is designed to detect gunshots and dispatch police. ShotSpotter is one of many powerful surveillance tools used by local police departments to purportedly help fight crime, but they often do so at the expense of infringing upon privacy rights and civil liberties. This Article expands the conversation about ShotSpotter technology considerably by examining the adjacent Fourth Amendment issues emanating from its use. For example, law enforcement increasingly relies on ShotSpotter to create reasonable suspicion where it does not exist. In practice, the use of ShotSpotter …


Another Katz Moment?: Privacy, Property, And A Dna Database, Claire Mena Apr 2022

Another Katz Moment?: Privacy, Property, And A Dna Database, Claire Mena

University of Michigan Journal of Law Reform

The Fourth Amendment protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” The understanding of these words seems to shift as new technologies emerge. As law enforcement’s arsenal of surveillance techniques has grown to include GPS tracking, cell phones, and cell site location information (CSLI), the Supreme Court has applied Fourth Amendment protections to these modern tools. Law enforcement continues to use one pervasive surveillance technique without limitations: the routine collection of DNA. In 2013, the Supreme Court in Maryland v. King held that law enforcement may routinely …


The Sacred Fourth Amendment Text, Christopher Slobogin Oct 2020

The Sacred Fourth Amendment Text, Christopher Slobogin

Michigan Law Review Online

The Supreme Court’s jurisprudence governing the Fourth Amendment’s “threshold”—a word meant to refer to the types of police actions that trigger the amendment’s warrant and reasonableness requirements—has confounded scholars and students alike since Katz v. United States. Before that 1967 decision, the Court’s decisions on the topic were fairly straightforward, based primarily on whether the police trespassed on the target’s property or property over which the target had control. After that decision—which has come to stand for the proposition that a Fourth Amendment search occurs if police infringe an expectation of privacy that society is prepared to recognize as …


How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker Oct 2020

How Definitive Is Fourth Amendment Textualism?, Evan H. Caminker

Michigan Law Review Online

Professor Jeffrey Bellin’s excellent article advances a comprehensive and straightforward textual approach to determining what policing activities constitute “searches” triggering the protections of the Fourth Amendment. Bellin’s thesis is that a text-based approach to interpreting the Amendment is superior to the Supreme Court’s current approach, which ever since Katz v. United States has defined “search” primarily by reference to a non-textual “reasonable expectation of privacy” standard. After soundly criticizing the ungrounded and highly subjective nature of the Katz test, Bellin declares that the Court should instead simply follow where the text leads: the Amendment protects people from a search, meaning …


Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker Jun 2019

Location Tracking And Digital Data: Can Carpenter Build A Stable Privacy Doctrine?, Evan H. Caminker

Articles

In Carpenter v United States, the Supreme Court struggled to modernize twentieth-century search and seizure precedents for the “Cyber Age.” Twice previously this decade the Court had tweaked Fourth Amendment doctrine to keep pace with advancing technology, requiring a search warrant before the government can either peruse the contents of a cell phone seized incident to arrest or use a GPS tracker to follow a car’s long-term movements.


Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern Jan 2019

Secret Searches: The Sca's Standing Conundrum, Aviv S. Halpern

Michigan Law Review

The Stored Communications Act (“SCA”) arms federal law enforcement agencies with the ability to use a special type of warrant to access users’ electronically stored communications. In some circumstances, SCA warrants can require service providers to bundle and produce a user’s electronically stored communications without ever disclosing the existence of the warrant to the individual user until charges are brought. Users that are charged will ultimately receive notice of the search after the fact through their legal proceedings. Users that are never charged, however, may never know that their communications were obtained and searched. This practice effectively makes the provisions …


Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby Jan 2019

Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby

Michigan Law Review

Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …


The Effect Of Legislation On Fourth Amendment Protection, Orin S. Kerr Jan 2017

The Effect Of Legislation On Fourth Amendment Protection, Orin S. Kerr

Michigan Law Review

When judges interpret the Fourth Amendment, and privacy legislation regulates the government’s conduct, should the legislation have an effect on the Fourth Amendment? Courts are split three ways. Some courts argue that legislation provides the informed judgment of a coequal branch that should influence the Fourth Amendment. Some courts contend that the presence of legislation should displace Fourth Amendment protection to prevent constitutional rules from interfering with the legislature’s handiwork. Finally, some courts treat legislation and the Fourth Amendment as independent and contend that the legislation should have no effect. This Article argues that courts should favor interpreting the Fourth …


Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley Apr 2015

Spies In The Skies: Dirtboxes And Airplane Electronic Surveillance, Brian L. Owsley

Michigan Law Review First Impressions

Electronic surveillance in the digital age is essentially a cat-and-mouse game between governmental agencies that are developing new techniques and technologies for surveillance, juxtaposed against privacy rights advocates who voice concerns about such technologies. In November 2014, there was a discovery of a new twist on a relatively old theme. Recently, the Wall Street Journal reported that the U.S. Marshals Service was running a surveillance program employing devices—dirtboxes—that gather all cell phone numbers in the surrounding area. Other federal agencies, including the Drug Enforcement Agency, Immigration and Custom Enforcement, and the Department of Homeland Security, are also documented to have …


Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley Jan 2015

Supreme Court Jurisprudence Of The Personal In City Of Los Angeles V. Patel, Brian L. Owsley

Michigan Law Review First Impressions

Recently, the Supreme Court issued a 5-4 decision in City of Los Angeles v. Patel striking down a city ordinance that required hotel and motel owners to make their guest registries available to police officers whenever requested to do so. Although the Court’s opinion in Patel simply affirmed the Ninth Circuit’s finding that the ordinance was unconstitutional, the Court could have used Patel to readdress the third-party doctrine, which establishes that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Patel provided a vehicle for the Court to do so, particularly because …


The Court Loses Its Way With The Global Positioning System: United States V. Jones Retreats To The “Classic Trespassory Search”, George M. Dery Iii, Ryan Evaro Dec 2013

The Court Loses Its Way With The Global Positioning System: United States V. Jones Retreats To The “Classic Trespassory Search”, George M. Dery Iii, Ryan Evaro

Michigan Journal of Race and Law

This Article analyzes United States v. Jones, in which the Supreme Court considered whether government placement of a global positioning system (GPS) device on a vehicle to follow a person’s movements constituted a Fourth Amendment “search.” The Jones Court ruled that two distinct definitions existed for a Fourth Amendment “search.” In addition to Katz v. United States’s reasonable-expectation-of-privacy standard, which the Court had used exclusively for over four decades, the Court recognized a second kind of search that it called a “classic trespassory search.” The second kind of search occurs when officials physically trespass or intrude upon a constitutionally protected …


The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy Feb 2013

The Politics Of Privacy In The Criminal Justice System: Information Disclosure, The Fourth Amendment, And Statutory Law Enforcement Exemptions, Erin Murphy

Michigan Law Review

When criminal justice scholars think of privacy, they think of the Fourth Amendment. But lately its domain has become far less absolute. The United States Code currently contains over twenty separate statutes that restrict both the acquisition and release of covered information. Largely enacted in the latter part of the twentieth century, these statutes address matters vital to modern existence. They control police access to driver's licenses, educational records, health histories, telephone calls, email messages, and even video rentals. They conform to no common template, but rather enlist a variety of procedural tools to serve as safeguards - ranging from …


Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus Jan 2012

Bringing Clarity To Administrative Search Doctrine: Distinguishing Dragnets From Special Subpopulation Searches, Eve Brensike Primus

Articles

Anyone who has been stopped at a sobriety checkpoint, screened at an international border, scanned by a metal detector at an airport or government building, or drug tested for public employment has been subjected to an administrative search or seizure. Searches of public school students, government employees, and probationers are characterized as administrative, as are business inspections and-increasingly-wiretaps and other searches used in the gathering of national security intelligence. In other words, the government conducts thousands of administrative searches every day. None of these searches requires either probable cause or a search warrant. Instead, courts evaluating administrative searches need only …


Disentangling Administrative Searches, Eve Brensike Primus Jan 2011

Disentangling Administrative Searches, Eve Brensike Primus

Articles

Everyone who has been screened at an international border, scanned by an airport metal detector, or drug tested for public employment has been subjected to an administrative search. Since September 11th, the government has increasingly invoked the administrative search exception to justify more checkpoints, unprecedented subway searches, and extensive wiretaps. As science and technology advance, the frequency and scope of administrative searches will only expand. Formulating the boundaries and requirements of administrative search doctrine is therefore a matter of great importance. Yet the rules governing administrative searches are notoriously unclear. This Article seeks to refocus attention on administrative searches and …


Do We Need A New Fourth Amendment?, Orin S. Kerr Apr 2009

Do We Need A New Fourth Amendment?, Orin S. Kerr

Michigan Law Review

Slobogin's book offers a new conceptualization of the Fourth Amendment rooted in what he calls the proportionality principle: An investigative technique should be permitted under the Constitution only if the strength of the government's justification for the technique is roughly proportionate to the level of intrusion it causes . Slobogin roots this principle in Terry v. Ohio and its pragmatic balancing of law-enforcement and privacy interests. To determine how much justification the Fourth Amendment requires, Slobogin argues, courts should assess the intrusiveness of the investigatory technique and then set a proportionate threshold of proof that the government must show. The …


A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb Mar 2004

A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb

Michigan Law Review

Imagine for a moment that it is the year 2020. An American company has developed a mind-reading device, called the "brain wave recorder" ("BWR"). The BWR is a highly sensitive instrument that detects electrical impulses from any brain within ten feet of the machine. Though previously thought impossible, the BWR can discern the following information about the target individual: (1) whether he or she is happy, sad, anxious, depressed, or irritable; (2) whether he or she is even slightly sexually aroused; (3) whether he or she is taking any medication (and if so, what the medication is); (4) if a …


The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr Mar 2004

The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr

Michigan Law Review

To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …


Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr Mar 2004

Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr

Michigan Law Review

I thank Sherry Colb and Peter Swire for devoting their time and considerable talents to responding to my article, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution. I will conclude with a few comments.


Katz Is Dead. Long Live Katz, Peter P. Swire Mar 2004

Katz Is Dead. Long Live Katz, Peter P. Swire

Michigan Law Review

Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok Jun 2000

Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok

Michigan Telecommunications & Technology Law Review

This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …


Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb Apr 1980

Police Use Of Cctv Surveillance: Constitutional Implications And Proposed Regulations, Gary C. Robb

University of Michigan Journal of Law Reform

This article evaluates the constitutionality of CCTV "searches." Part I discusses the present uses being made of closed circuit technology and evaluates the merits of the CCTV surveillance system. The critical policy trade-off is the system's effectiveness in combatting crime against the resulting loss of privacy to individual citizens.

Part II considers the constitutional implications of CCTV use in terms of three major doctrines: the Fourth Amendment prohibition against "unreasonable searches and seizures"; the constitutional right of privacy; and the First Amendment guarantees of free speech and association. This part briefly summarizes the state of the law concerning these constitutional …


Reconsideration Of The Katz Expectation Of Privacy Test, Michigan Law Review Nov 1977

Reconsideration Of The Katz Expectation Of Privacy Test, Michigan Law Review

Michigan Law Review

This Note, by modifying certain aspects of the reasonable expectation of privacy test, offers a theory that attempts to identify the minimum content of the fourth amendment. In the first section, the Note examines the reasonable expectation of privacy test and considers whether it has been or can be applied in a manner that fails to protect the right to have certain minimum expectations of privacy. It analyzes both the "actual" and the "reasonable" expectation requirements, identifies weaknesses inherent in the current application of these requirements, and suggests certain ways in which they might be refined. In the second section, …


The Life And Times Of Boyd V. United States (1886-1976), Michigan Law Review Nov 1977

The Life And Times Of Boyd V. United States (1886-1976), Michigan Law Review

Michigan Law Review

In Boyd v. United States, the Supreme Court held that the fourth and fifth amendments create a zone of privacy encompassing an individual's person and property. The government, according to Boyd, cannot enter this zone, either by compelling an individual to testify against himself or by subpoenaing or seizing his books and papers for use as evidence against him in a criminal or quasi-criminal proceeding. The Court found an "intimate relation" between the two amendments such that the search and seizure of books and papers may be "unreasonable" even if conducted pursuant to a court order.

Over time, …


The Concept Of Privacy And The Fourth Amendment, Steven C. Douse Jan 1972

The Concept Of Privacy And The Fourth Amendment, Steven C. Douse

University of Michigan Journal of Law Reform

This Article attempts at a minimum to offer a common background and frame of reference for defining and comparing myriad facets of the law. If successful, they furnish a model for the integration of these many facets. This inquiry begins with an examination of the proposition that the essence of the fourth amendment is protection of a right of privacy. The concept of privacy is then defined and elaborated, both without and within the constitutional context. These conclusions are further extended in an exploration of mechanisms for defining the invasions and protection of fourth amendment privacy.