Fourth Amendment
The Fourth Amendment and Geofence Warrants: A Critical Look at United States v. Chatrie
The reasoning of the decision has some major problems.
Orin Kerr is a Professor at the University of California, Berkeley School of Law. He is a nationally recognized scholar of criminal procedure and computer crime law. Before becoming a law professor, Kerr was a trial attorney in the Computer Crime and Intellectual Property Section at the Department of Justice and a Special Assistant U.S. Attorney in the Eastern District of Virginia. He is a former law clerk for Justice Anthony M. Kennedy of the U.S. Supreme Court and Judge Leonard I. Garth of the U.S. Court of Appeals for the Third Circuit.
Subscribe to this Lawfare contributor via RSS.
The reasoning of the decision has some major problems.
Can governments purchase user records as an end-run around the warrant requirement imposed by Carpenter v. United States?
The Supreme Court handed down its first major decision construing the Computer Fraud and Abuse Act last week. The decision is a major victory for those of us who favor a narrow reading of the CFAA. It doesn't answer everything. But it answers a lot.
An overlooked part of United States v. Moalin could have a major impact on surveillance law.
I recently posted a new draft article, “Implementing Carpenter,” on the Supreme Court's blockbuster June 2018 decision in Carpenter v. United States.
A recurring question in law-of-digital-evidence investigations is how the Fifth Amendment applies to acts of compelled decryption. In these cases, the government gets an order directing a person to enter a password to unlock a device. The subject of the order then pleads the Fifth. How should a court rule? I wanted to flag two of my recent writings on this issue.
The Fifth Circuit has handed down a fascinating computer search case in United States v. Reddick. Here's the question: If a private company runs a hash of a file and compares the hash to those of known images of child pornography, and it finds a match to a known image and forwards on the file to the government, is it a “search” for the government to then open the file to confirm it is child pornography?