Category Archives: Computer and cloud searches

AL: Officer was lawfully in position for plain view of def’s computer screen

The trial court erred in suppressing the search here because the officer who did it was a law enforcement officer under state law able to do so. On the merits, the officer was in position to make a plain view … Continue reading

Posted in Computer and cloud searches, Plain view, feel, smell, Reasonable suspicion, Seizure | Comments Off on AL: Officer was lawfully in position for plain view of def’s computer screen

NPR.org: Warrant-Proof Encrypted Messages Targeted By Trump Administration

NPR.org: Warrant-Proof Encrypted Messages Targeted By Trump Administration (“‘End-to-end encryption’ has gone mainstream, which means tech companies can’t decrypt messages even when law enforcement has a warrant. The Trump administration says that’s taking privacy too far.”)

Posted in Cell phones, Computer and cloud searches, Privileges | Comments Off on NPR.org: Warrant-Proof Encrypted Messages Targeted By Trump Administration

SSRN: Decryption Originalism: The Lessons of Burr

SSRN: Decryption Originalism: The Lessons of Burr by Orin S. Kerr. Abstract:

Posted in Cell phones, Computer and cloud searches, Privileges | Comments Off on SSRN: Decryption Originalism: The Lessons of Burr

EFF: U.K. Police Will Soon be able to Search Through U.S. Data Without Asking a Judge

EFF: U.K. Police Will Soon be able to Search Through U.S. Data Without Asking a Judge by Joe Mullin:

Posted in Computer and cloud searches, Surveillance technology | Comments Off on EFF: U.K. Police Will Soon be able to Search Through U.S. Data Without Asking a Judge

D.Mont.: With court ordered pinging of cell phone, govt violated no REP in following the pings

Once officers had a warrant authorizing capturing defendant’s cell phone pings back even in 2015, he had no reasonable expectation of privacy in his movements in public when they were following him based on the result of the pings. Therefore, … Continue reading

Posted in Cell phones, Computer and cloud searches, Reasonable expectation of privacy, Tracking warrant | Comments Off on D.Mont.: With court ordered pinging of cell phone, govt violated no REP in following the pings

NY2: Business records search was not particular except as to time and was a general warrant

The AG’s office obtained a search warrant for defendant’s business for allegations of mortgage fraud. Several computers, hard drives, and many records were seized. After denial of suppression, defendant entered a conditional plea. The search warrant was a “general warrant” … Continue reading

Posted in Computer and cloud searches, General warrant | Comments Off on NY2: Business records search was not particular except as to time and was a general warrant

CA4: Individualized suspicion is now required for border searches of electronic devices but it wasn’t in May 2015, so the GFE applies

Warrantless forensic searches of defendant’s devices in May of 2015 lacked the required nexus to the recognized historic rationales justifying the border search exception to the warrant requirement. Officers had probable cause to suspect that defendant had previously committed grave … Continue reading

Posted in Cell phones, Computer and cloud searches, Good faith exception | Comments Off on CA4: Individualized suspicion is now required for border searches of electronic devices but it wasn’t in May 2015, so the GFE applies

PA: State’s seeking the passcode to unencrypt a computer hard drive violates the 5A

The state’s seeking the passcode to unencrypt a computer hard drive violates the Fifth Amendment. Commonwealth v. Davis, 2019 Pa. LEXIS 6463 (Nov. 20, 2019):

Posted in Computer and cloud searches, Privileges | Comments Off on PA: State’s seeking the passcode to unencrypt a computer hard drive violates the 5A

N.D.Okla.: Particularity in computer searches depends on how SW was executed

Particularity in a computer search has to be flexible and reasonable because of the vast amount of information that is of necessity swept up. “Instead of applying rigid rules requiring particularity when seeking a warrant, the focus should be on … Continue reading

Posted in Computer and cloud searches, Particularity | Comments Off on N.D.Okla.: Particularity in computer searches depends on how SW was executed

D.Ore.: No REP in a govt computer and email where there were banner warnings at every sign in

Defendant’s government work emails were searched without a warrant, and it’s clear, based on warnings on the computer at every sign in and regular training, that he was well aware everything on the computer has no reasonable expectation of privacy. … Continue reading

Posted in Computer and cloud searches, E-mail, Reasonable expectation of privacy | Comments Off on D.Ore.: No REP in a govt computer and email where there were banner warnings at every sign in

WaPo: US, UK reach deal to make it easier to get electronic data

WaPo: US, UK reach deal to make it easier to get electronic data by Eric Tucker (“The United States and United Kingdom signed an agreement Thursday that officials say will speed up dozens of criminal and national security investigations and … Continue reading

Posted in Computer and cloud searches | Comments Off on WaPo: US, UK reach deal to make it easier to get electronic data

Justice Department takes another run at encryption backdoors with ‘lawful access’

CSO: Justice Department takes another run at encryption backdoors with ‘lawful access’ by Cynthia Brumfield (“Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies … Continue reading

Posted in Computer and cloud searches, Surveillance technology | Comments Off on Justice Department takes another run at encryption backdoors with ‘lawful access’