Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Sturm College of Law: Faculty Scholarship

Criminal procedure

Articles 1 - 4 of 4

Full-Text Articles in Law

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff Jan 2020

The Fourth Amendment Inventory As A Check On Digital Searches, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Police and federal agents generally must obtain a warrant to search the tens of thousands of devices they seize each year. But once they have a warrant, courts afford these officers broad leeway to search the entire device, every file and folder, all metadata and deleted data, even if in search of only one incriminating file. Courts avow great reverence for the privacy of personal information under the Fourth Amendment but then claim there is no way to limit where an officer might find the target files, or know where the suspect may have hidden them.

These courts have a …


What Am I Really Saying When I Open My Smartphone: A Response To Prof. Kerr, Laurent Sacharoff Jan 2019

What Am I Really Saying When I Open My Smartphone: A Response To Prof. Kerr, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

In his forthcoming article in the Texas Law Review, Compelled Decryption and the Privilege Against Self-Incrimination, Orin S. Kerr addresses a common question confronting courts. If a court orders a suspect or defendant to enter her password to open a smartphone or other device as part of a law enforcement investigation, does that order violate the Fifth Amendment right against self-incrimination?

To answer this question, Kerr appropriately looks by analogy to existing Fifth Amendment case law as applied to document subpoenas, the “act of production” doctrine, and its mysterious cousin, the “foregone conclusion” doctrine. From these materials, he gleans a …


Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff Jan 2018

Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?

This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …


Miranda’S Hidden Right, Laurent Sacharoff Jan 2012

Miranda’S Hidden Right, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

When the Court in Miranda v. Arizona applied the Fifth Amendment “right to remain silent” to the stationhouse, it also created an inherent contradiction that has bedeviled Miranda cases since. That is, the Court in Miranda said that a suspect can waive her right to remain silent but also that she must invoke it. Numerous courts have repeated this incantation, including most recently last summer in Berghuis v. Thompkins. But how can both be true about the same right? Either the suspect has the right and can waive it or does not yet enjoy it and must therefore invoke it. …