Offensive Searches: Toward a Two-Tier Theory of Fourth Amendment Protection

被引:0
|
作者
Brennan-Marquez, Kiel [1 ]
Tutt, Andrew [1 ]
机构
[1] NYU, Sch Law, New York, NY 10003 USA
关键词
FOUNDATIONS; DIGNITY; PRIVACY; DNA; LAW;
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This Article examines the newly minted "trespass" test in Fourth Amendment law, which holds that police conduct qualifies as a search and triggers constitutional scrutiny when it involves "physical intrusion" onto a "constitutionally protected area." The trespass test portends a possible sea change, offering a new baseline of protection against searches that do not fit neatly within the familiar "reasonable expectations of privacy" framework of Fourth Amendment harm. Going forward, Fourth Amendment law will have two tiers: a first tier that asks whether government agents have searched by physically intruding on a constitutionally protected area, and a second tier that asks whether government agents have searched by impinging on a person's "reasonable expectations of privacy." Among scholars, there is a nascent but growing consensus that "intrusions" under the trespass test refer to violations of positive law. We disagree. Instead, we argue that the test is concerned with government action that would be highly offensive or degrading to a reasonable person. Not only does this construction better comport with the Court's reasoning in "trespass search" cases; it also brings into focus blurry corners of Fourth Amendment law that are hard to justify on privacy grounds but easily explained as tacit applications of the trespass as -indignity doctrine. The Article closes with an examination of dignity's role in Fourth Amendment law. We contend that dignity is a fundamental Fourth Amendment value because respect for dignity helps to preserve and strengthen popular sovereignty. Dignitary protections safeguard important interests in autonomy, equality, and human flourishing. And they ensure that government agents, in discharging their duties, adhere to norms of civility and respect, bolstering their status as the people's servants and guardians.
引用
收藏
页码:103 / 144
页数:42
相关论文
共 28 条
  • [1] The Political Economy of Two-tier Reforms of Employment Protection in Europe
    Ochel, Wolfgang
    INTERNATIONAL JOURNAL OF COMPARATIVE LABOUR LAW AND INDUSTRIAL RELATIONS, 2009, 25 (03): : 237 - 260
  • [2] An optimized two-tier P2P architecture for contextualized keyword searches
    Salter, James
    Antonopoulos, Nick
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2007, 23 (02): : 241 - 251
  • [3] Two-tier formulation of multichannel scattering theory and hypervirial theorems
    Hahn, Y. K.
    JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2006, 39 (45): : 14101 - 14117
  • [4] Young Syrian refugees in the UK: a two-tier system of international protection?
    Karyotis, Georgios
    Mulvey, Gareth
    Skleparis, Dimitris
    JOURNAL OF ETHNIC AND MIGRATION STUDIES, 2021, 47 (03) : 481 - 500
  • [5] Macrocell Protection Interference Alignment in Two-Tier Downlink Heterogeneous Networks
    Seo, Jongpil
    Kim, Hyeonsu
    Ahn, Jongmin
    Chung, Jaehak
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [6] Collateral damage? The impact of national security crises on the fourth amendment protection against unreasonable searches
    Chandler, Sara A.
    UNIVERSITY OF PITTSBURGH LAW REVIEW, 2006, 68 (01) : 217 - 241
  • [7] Power Control Algorithm with Active Link Protection for two-tier femtocell Networks
    Xie, Yuanbao
    Zheng, Wei
    Li, Wei
    Liu, Jingfang
    Wen, Xiangming
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [8] A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT
    Corradini, Enrico
    Nicolazzo, Serena
    Nocera, Antonino
    Ursino, Domenico
    Virgili, Luca
    COMPUTER COMMUNICATIONS, 2022, 181 : 338 - 356
  • [9] Toward Industrial Private AI: A Two-Tier Framework for Data and Model Security
    Khowaja, Sunder Ali
    Dev, Kapal
    Qureshi, Nawab Muhammad Faseeh
    Khuwaja, Parus
    Foschini, Luca
    IEEE WIRELESS COMMUNICATIONS, 2022, 29 (02) : 76 - 83
  • [10] Toward a two-tier process-development paradigm: prototype versus commercial biomanufacturing
    Zurdo, Jesus
    PHARMACEUTICAL BIOPROCESSING, 2015, 3 (03) : 179 - 183