Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

The University of Akron

Search warrant

Articles 1 - 2 of 2

Full-Text Articles in Law

Beware Of Government Agents Bearing Trojan Horses, Brian L. Owsley Jul 2015

Beware Of Government Agents Bearing Trojan Horses, Brian L. Owsley

Akron Law Review

This Article addresses the use of Trojan devices by the Government to legally search computers potentially around the world. Although the Government does seek judicial authorization for these techniques based on a search warrant, there are still concerns about whether the applications meet constitutional standards as well as Rule 41 of the Federal Rules of Criminal Procedure (“Rule 41”). The use of these Trojan devices has not been addressed in current scholarship meaningfully; therefore, this Article focuses on when and how authorization of search warrant applications for these techniques are appropriate. Part II addresses the implications of the standards enunciated …


Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Nicol Bowman Jun 2015

Full Disclosure: Cognitive Science, Informants, And Search Warrant Scrutiny, Mary Nicol Bowman

Akron Law Review

This article aims to improve the quality of evidence gathering and interpretation at one crucial phase of investigations: the evaluation of search warrant applications. Part II of this article provides background on the search warrant application process, including how courts evaluate such applications based on informants’ tips and how defendants can subsequently challenge those decisions. Part III then discusses the ways in which cognitive biases can affect each stage of the search warrant process. Part IV provides my suggested solutions to the problems identified, all of which fall under the general umbrella of full disclosure. That part argues that education …