Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

The Broken Fourth Amendment Oath, Laurent Sacharoff Mar 2022

The Broken Fourth Amendment Oath, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

The Fourth Amendment requires that warrants be supported by “Oath or affirmation.” Under current doctrine, a police officer may swear the oath to obtain a warrant merely by repeating the account of an informant. This Article shows, however, that the Fourth Amendment, as originally understood, required that the real accuser with personal knowledge swear the oath.

That real-accuser requirement persisted for nearly two centuries. Almost all federal courts and most state courts from 1850 to 1960 held that the oath, by its very nature, required a witness with personal knowledge. Only in 1960 did the Supreme Court hold in Jones …


The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


Using Technology The Founders Never Dreamed Of: Cell Phones As Tracking Devices And The Fourth Amendment, R. Craig Curtis, Michael C. Gizzi, Michael J. Kittleson Dec 2019

Using Technology The Founders Never Dreamed Of: Cell Phones As Tracking Devices And The Fourth Amendment, R. Craig Curtis, Michael C. Gizzi, Michael J. Kittleson

University of Denver Criminal Law Review

No abstract provided.


Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff Jan 2018

Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?

This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …


Double Reasonableness And The Fourth Amendment, Sam Kamin, Justin F. Marceau Jan 2014

Double Reasonableness And The Fourth Amendment, Sam Kamin, Justin F. Marceau

Sturm College of Law: Faculty Scholarship

Recently the Supreme Court has placed new limits on both the substance of the Fourth Amendment and the exclusionary that serves as the principal remedy for Fourth Amendment violations. In this Article we briefly summarize these limitations and then argue that the curtailment of the exclusionary rule has the potential to ameliorate substantive Fourth Amendment doctrine. The limited reach of the modern exclusionary rule provides the Court with license to develop an expansive new substantive framework free of the specter of a correspondingly expansive remedial framework.

One point on which nearly all jurists and commentators agree is that current Fourth …