UNIVERSITY OF THE DISTRICT OF - UDC Law Review
UNIVERSITY OF THE DISTRICT OF - UDC Law Review
UNIVERSITY OF THE DISTRICT OF - UDC Law Review
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
135 Id.<br />
136 Id. at 710.<br />
137 Id. at 716 (emphasis added).<br />
138 See United States v. Jacobsen, 466 U.S. 109, 123 n.23 (1984) (expressly limiting the Court’s discussion to “possession of<br />
contraband”).<br />
139 See Karo, 468 U.S. at 716 (arguing against the use of police technology to determine, among other things, whether a particular<br />
person “is in an individual’s home at a particular time”).<br />
140 Payton v. New York, 445 U.S. 573, 603 (1980) (holding that “an arrest warrant founded on probable cause implicitly carries with it<br />
the limited authority to enter a dwelling in which the suspect lives when there is reason to believe the suspect is within”).<br />
141 See Steagald v. United States, 451 U.S. 204, 205 (1981). The search warrant required in Steagald was necessary to protect the<br />
privacy interests of a third person whose home was entered by police in order to arrest a fugitive, not the privacy interests of the<br />
fugitive. Id. at 222.<br />
142 Radio Frequency Identification (RFID) technology uses radio frequencies to identify people or objects by reading a microchip in a<br />
wireless device from a distance, without making any physical contact or requiring a line of sight. Data Privacy & Integrity<br />
Advisory Comm., U.S. Dep’t of Homeland Sec., No. 2006-02, The Use of RFID for Human Identity Verification 2, 5 (2006),<br />
available at http://www.dhs.gov/xlibrary/assets/privacy/privacy_advcom_ 12-2006_rpt_RFID.pdf; see also U.S. Dep’t of<br />
Homeland Sec., Radio Frequency Identification (RFID): What Is It, http://<br />
www.dhs.gov/files/crossingborders/gc_1197652575426.shtm (last visited May 19, 2010). When in the presence of an appropriate<br />
radio frequency, a microchip embedded in an object responds to the signal by sending information to a device capable of<br />
interpreting the microchip’s signal. Data Privacy & Integrity Advisory Comm., supra, at 2. Differing RFID chips can be read from<br />
different distances: “[s]ome can only operate over a very short distance of a few centimeters or less, while others may operate at<br />
longer distances of several meters or more.” Id.<br />
143 U.S. Dep’t of Homeland Sec., Privacy Impact Assessment for the Use of Radio Frequency Identification (RFID) Technology for<br />
Border Crossings 8 (2008) available at http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_cbp_ rfid.pdf (identifying<br />
“tracking” as “a form of secondary use that exploits the uniqueness of the RFID number to associate a specific individual with<br />
specific places over time”).<br />
144 The “Enhanced Driver’s License (EDL)” is embedded with an RFID chip and capable of submitting information, including<br />
personal information documents. Id. at 2. Some states have already passed legislation addressing EDLs. See, e.g., Mich. Comp.<br />
<strong>Law</strong>s Ann. § 28.301-.308 (LexisNexis 2010).<br />
145 See In re Application of U.S. for an Order Authorizing (1) Use of Pen Register and Trap and a Trace Device with Prospective Cell-<br />
Site Information, No. MISC. 09-104, 2009 WL 1530195, at *4 (E.D.N.Y. Feb. 12, 2009) (finding that in the trap and trace context,<br />
cell phone locational technology--commonly known as “pinging” of a suspect’s cell phone--was more precise than a global<br />
positioning system device and, therefore, required a showing of probable cause to obtain a court order because the suspect’s<br />
movements inside the home could be tracked).<br />
146 Douglas v. City of Jeannette, 319 U.S. 157, 181 (1943) (Jackson, J., concurring).<br />
162