This Note seeks to address how the sprawl of GPS technology in our lives has permeated into the courts and affected the rights of criminal defendants. The first Part provides general background about the technology and its broader role in the court system, while the second Part examines GPS and the law. The second Part will look at the rules of evidence and the hurdles––however minimal––that GPS evidence may need to overcome when admitted at trial. Because GPS technology, while common, is still subject to errors and tampering, the evidence should be required to be properly authenticated. A GPS record can be––and has been––viewed as a kind of a statement, reporting where a particular person was at a particular time. For this reason, courts have considered the evidence through hearsay analysis and admitted it through the business records exception. Additionally, the second Part discusses the constitutional issues that arise with the introduction of GPS evidence. Specifically, the Confrontation Clause of the Sixth Amendment guarantees a criminal defendant the right to cross-examine the person who makes a report submitted at trial. GPS data can be considered a statement against a criminal defendant, about where the defendant was at a particular time––e.g., when a crime was being committed. The issue becomes whether a criminal defendant is entitled to “confront” the makers of these statements. Finally, the third Part of this Note concludes with concerns of how to properly deal with GPS tracking technology, considering how far it can reach, in light of the general public’s seeming non-concern with the level of government use of it. The fact that most of us carry GPS-enabled smartphones in our pockets every day gives rise to questions about the government’s ability to track us and what procedural safeguards should be maintained when evidence from these devices is admitted against an individual at trial.
Business is booming for criminal justice monitoring technology: these days “ankle bracelet” refers as often to an electronic monitor as to jewelry. Indeed, the explosive growth of electronic monitoring (“EM”) for criminal justice purposes—a phenomenon which this Article terms “mass monitoring”—is among the most overlooked features of the otherwise well-known phenomenon of mass incarceration.
This Article addresses the fundamental question of whether EM is punishment. It finds that the origins and history of EM as a progressive alternative to incarceration—a punitive sanction—support characterization of EM as punitive, and that EM comports with the goals of dominant punishment theories. Yet new uses of EM have complicated this narrative. The Article draws attention to the expansion of EM both as a substitute for incarceration and as an added sanction, highlighting the analytic importance of what it terms the “substitution/addition distinction.” The Article argues that, as a punitive sanction, EM can be justified when used as a substitute for incarceration, but that its use as an added sanction may result in excessive punishment and raises significant constitutional and policy concerns.
This Note examines the experiences of children in the juvenile and criminal justice system with the purpose of finding an alternative to keeping Geyser and Weier in the criminal system. Part I provides a summary of Geyser and Weier’s pending case, which has been pieced together from various news outlets. Part II looks at the development of the juvenile justice system and the transfer system, with an in-depth analysis of the three primary waiver mechanisms. Part II also examines the Wisconsin laws that Geyser and Weier are subject to, and the primary ways in which the juvenile justice system differs from the criminal justice system. Part III describes how the current justice system in America has failed to meet the needs of juvenile offenders. Part IV discusses the reasoning involved in U.S. Supreme Court decisions that have treated juvenile offenders differently than adult offenders. Part IV also presents studies that explain why the development of children’s brains provides support for this differential treatment. Part V analyzes various alternatives to the prevailing regime which keeps juvenile offenders in the juvenile justice system or transfers them to the criminal justice system. Lastly, Part V also proposes that blended sentencing, while still an imperfect solution, is the best alternative to automatically subjecting juveniles who commit violent offenses to the criminal justice system. With respect to Anissa Weier, blended sentencing would be the best alternative, because her situation could be reevaluated once she reaches the upper age limit of juvenile court jurisdiction. In the case of Morgan Geyser, under a blended sentencing regime, she could be transferred to the mental health courts and placed in a mental health facility within a designated children’s ward to receive treatment for schizophrenia, as both the juvenile and criminal justice systems are ill-equipped to house juvenile offenders with serious mental illnesses.
In Georgia, Shawntrail Lee was convicted of possessing a firearm as a felon, —a crime that warranted a sentence of roughly three to four years in prison under the Federal Sentencing Guidelines. However, Lee’s prescribed sentencing range increased to a minimum of fifteen years under the Armed Career Criminal Act (“ACCA”) because his criminal history included three other crimes that the district court classified as “violent felon[ies].” Lee appealed his sentence, arguing that his predicate conviction of conspiracy to commit armed robbery did not constitute a “violent felony,” and the Eleventh Circuit Court of Appeals agreed, vacating his sentence.
Conversely, in North Carolina, Demontrell White was convicted of possessing a firearm as a felon and was sentenced to fifteen years in prison after the Fourth Circuit Court of Appeals determined that his prior conviction of conspiracy to commit robbery with a dangerous weapon was a “violent felony” under the ACCA.
Part I of this Note provides a brief background regarding the history of the Supreme Court’s treatment of eyewitness identification, the current standard of admissibility of eyewitness identification testimony at both the federal and state levels, and the status of scientific research into eyewitness identifications today. Part II describes the changes that two states, New Jersey and Oregon, have made to their judicial frameworks to reflect the current state of empirical research into the dangers of eyewitness misidentification. This Part will also highlight how these new tests differ from the Manson framework set forth by the Supreme Court in the 1970s, which is the prevailing test for admissibility of eyewitness evidence, on which California’s existing framework is modeled. Part III will examine the pros and cons of New Jersey and Oregon’s approaches, especially in light of their underlying goals of deterring improper police conduct and obtaining reliable verdicts. Part IV describes the history of eyewitness identification reform in California and suggests that in states like California, where attempts to pass legislation modifying police eyewitness identification procedures have been unsuccessful, judicial reform similar to that of Oregon’s Lawson framework is necessary to ensure the integrity of the criminal justice system.
The Supreme Court’s conceptualization of the Eighth Amendment over the past decade has focused on narrow exceptions to the ability of the states to punish criminal offenders, excising particular punishments based on characteristics of the offender or crime. What is missing, however, is a set of broader guiding principles delineating the line between acceptable and impermissible punishments. The Court itself, in Kennedy v. Louisiana, acknowledged as much, describing the case law as “still in search of a unifying principle.” In light of this vacuum, this Article proposes a new approach to the application of the Eighth Amendment.
The absence of regulation of excessive and disproportionate punishments by state legislatures over the past two decades has resulted in the largest prison population in the history of the human race. Instead of merely being a tool that removes a few types of offenses and offenders from the purview of state legislatures, the Eighth Amendment should also serve as a more robust guide to shape state and federal penal practices.
To that end, this Article argues for the development of a series of Eighth Amendment presumptions—guiding principles that would govern the punishment practices of legislatures without excluding them from the conversation. Currently, the Eighth Amendment serves to identify the constitutional “exceptions” to the “rules” promulgated by legislatures. This Article’s approach would reverse that status quo, with the Court articulating general rules and legislatures then developing (and justifying through careful study) the exceptions to those rules. Indeed, a careful examination of the Court’s Eighth Amendment cases suggests that this “presumptive” sentiment is already implicit in much of the thinking of the Court.
While undercover operations by the police are familiar, the harm they can impose on third parties is not. When government agents impersonate criminals, they can impose personal, physical, financial, and reputational harms on victims wholly unrelated to their criminal investigation. A sham drug deal can lead to gunfire and an injured bystander. The mere existence of a government-run fencing operation can lead to increased property theft.
In a number of recent financial fraud investigations, FBI agents have conducted stings that they knew could harm unwitting investors. These stings targeted fraudulent price manipulation of “penny stocks”: low-priced stocks marketed and sold directly to the public rather than through stock exchanges. Typically, an undercover FBI agent offers to help a suspect inflate the price of a penny stock by purchasing a large number of shares for manipulative purposes in exchange for a kickback. Not only does the tactic result in an arrest, it can also harm innocent investors who purchase stock at a price that was misleadingly inflated—by the government itself.
How should the law address third-party harms attributable to such undercover operations?
At about 8:15 a.m. on May 2, 2012, National City Police picked up a fourteen-year-old runaway for loitering and suspected prostitution. Lauren’s twenty-eight-year-old “boyfriend” had brought her from her hometown of El Paso, Texas, to California to pimp her out.
While her “boyfriend” was exploiting her, Lauren performed hundreds of sexual acts on clients. Typically meeting with seven to ten “johns” each day, she was shuffled from one seedy southern California hotel room to the next. Her trafficker moved her from Los Angeles, down to San Diego, back up to Los Angeles, down to Orange County, and finally back to San Diego where she was arrested. During this time, her “boyfriend” had total control over Lauren—he posted online advertisements offering her sexual services on Backpage.com, arranged and paid for the hotel rooms in which she met her clients, dictated how she should dress, and took all of her earnings.
After being picked up by police in National City, Lauren ran away from a victim’s service center back to her “boyfriend.” She was arrested again for prostitution less than a week later in Los Angeles. Her trafficker was arrested as well and eventually charged by the United States Attorney’s Office for the Southern District of California with Sex Trafficking of a Child in violation of 18 U.S.C. § 1591 and Transportation of a Minor to Engage in Prostitution in violation of 18 U.S.C. § 2423(a).
Consider a fourteen-year-old boy whose entire life was spent moving in and out of foster care because his mother was an alcoholic and his stepfather was abusive. This boy suffered from early-onset depression, and had already attempted suicide four times by the age of fourteen. One night, the boy and his friend went to a trailer owned by his mother’s drug dealer to drink and do drugs. After the adult drug dealer passed out from consumption, the boy—seeing an opportunity for some quick cash—took the dealer’s wallet from his back pocket to steal his money. However, the dealer woke up and grabbed the boy by the throat. The boy’s friend hit the dealer with a nearby baseball bat. Once the boy was released, he repeatedly struck the drug dealer with the bat until he believed the man to be dead. To hide the evidence of the crime, the boys set fire to the drug dealer’s trailer, ultimately killing the man inside. This fourteen-year-old boy was sentenced to die in prison for his crimes, without any hope for release. This boy’s name is Evan Miller.
Defending Data proposes a data-driven, systems-based approach to improving public defense in America. Public defenders represent millions of defendants every year. Yet public defense remains a largely data-less enterprise, a black box of discretionary decisions disconnected from any systemic analysis about the relationship between defender practices and case outcomes. Defending Data adopts a novel approach to the crisis of public defense. Building off of the successful implementation of system-based approaches in other complex, high-risk industries such as aviation and medicine, Defending Data explains how defenders can develop a data-driven systems approach to public defense.