- D.Neb.: Giving home alarm code helps show consent
- D. Md.: Def’s 2255 supplemental Franks challenge has a failure of a proffer of evidence
- techdirt: Report Shows US Law Enforcement Routinely Engages In Parallel Construction
- W.D.N.C.: Delay of search to protect def’s property rights isn’t a constitutional violation
- NE: Driver could consent to search of car when owner was passenger
online since Feb. 24, 2003
WebPage Visits: real non-robot hits since 2010; approx. 20k posts since 2003
Fourth Amendment cases,
citations, and links
Latest Slip Opinions:
U.S. Supreme Court (Home)
Federal Appellate Courts Opinions
FDsys, many district courts, other federal courts, other
Military Courts: C.A.A.F., Army, AF, N-M, CG
State courts (and some USDC opinions)
Advanced Google Scholar
Google search tips
LII State Appellate Courts
LexisONE free caselaw
Findlaw Free Opinions
To search Search and Seizure on Lexis.com $
S. Ct. Docket
Solicitor General's site
Briefs online (but no amicus briefs)
Oyez Project (NWU)
"On the Docket"–Medill
S.Ct. Monitor: Law.com
S.Ct. Com't'ry: Law.com
General (many free):
Google Scholar | Google
LexisOne Legal Website Directory
Lexis.com (criminal law/ 4th Amd) $
Findlaw.com (4th Amd)
Federal Law Enforcement Training Center Resources
FBI Domestic Investigations and Operations Guide (2008) (pdf)
DEA Agents Manual (2002) (download)
DOJ Computer Search Manual (2009) (pdf)
Stringrays (ACLU No. Cal.) (pdf)
Congressional Research Service:
--Electronic Communications Privacy Act (2012)
--Overview of the Electronic Communications Privacy Act (2012)
--Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)
ACLU on privacy
Electronic Frontier Foundation
NACDL’s Domestic Drone Information Center
Electronic Privacy Information Center
Criminal Appeal (post-conviction) (9th Cir.)
Section 1983 Blog
"If it was easy, everybody would be doing it. It isn't, and they don't."
“I am still learning.”
—Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)).
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984).
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence."
—Mapp v. Ohio, 367 U.S. 643, 659 (1961).
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).
"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today."
— Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).
"The great end, for which men entered into society, was to secure their property."
—Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)
"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment."
—United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)
"The course of true law pertaining to searches and seizures, as enunciated here, has not–to put it mildly–run smooth."
—Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).
"A search is a search, even if it happens to disclose nothing but the bottom of a turntable."
—Arizona v. Hicks, 480 U.S. 321, 325 (1987)
"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."
—Katz v. United States, 389 U.S. 347, 351 (1967)
“Experience should teach us to be most on guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.”
—United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)
“Liberty—the freedom from unwarranted intrusion by government—is as easily lost through insistent nibbles by government officials who seek to do their jobs too well as by those whose purpose it is to oppress; the piranha can be as deadly as the shark.”
—United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)
"You can't always get what you want / But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards
"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration camp]
“You know, most men would get discouraged by now. Fortunately for you, I am not most men!”"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime."
---Pepé Le Pew
—Johnson v. United States, 333 U.S. 10, 13-14 (1948)
Website design by Wally Waller, Little Rock
Category Archives: Computer searches
CA6: Computers, like guns, are usually kept at home, and that’s nexus for search of house for a computer [!?]
A computer, like a gun, is usually kept in the home, and a search warrant for a computer establishes nexus to search defendant’s house[!, really?]. Thus, there was no Fourth Amendment violation and alternatively there was qualified immunity. Peffer v. … Continue reading
Defendant is charged with a hate crime, and the government believed that he was involved with a group. The search warrant for his Facebook account failed to show nexus to get access to the non-public pages just because the group … Continue reading
Just Security: Customs and Border Protection’s New Policy for Searching Devices Offers Thin Protection
Just Security: Customs and Border Protection’s New Policy for Searching Devices Offers Thin Protection by Carrie DeCell:
In the DC protestor Facebook litigation, the trial court’s order finally appears on Lexis, but I did find links to the opinions elsewhere. In the Matter of the Search of Information Associated with Facebook Accounts disruptj20, lacymacauley, and legba.carrefour That … Continue reading
NYTimes: Cellphone and Computer Searches at U.S. Border Rise Under Trump by Ron Nixon:
The finding of child pornography hash values on a computer is probable cause for further search of the computer. United States v. Sherlock, 2018 U.S. Dist. LEXIS 1321 (M.D. La. Jan. 4, 2018).* Playpen warrant sustained, and there was no … Continue reading
ID: Failure to repeat “computer” in SW for things to be seized wasn’t a violation of 4A; CA7 typo in LPN can be overlooked
The preamble of the search warrant listed a bunch of digital things to search for and seize but the specific search clause didn’t include “computer.” The search warrant as a whole included computers, and defense counsel wasn’t ineffective for not … Continue reading
VA: P2P file sharing to access CP wasn’t a trespass on the curtilage; def consented to entry into the computer
The officer’s actions in accessing defendant’s computer files by peer-to-peer file sharing did not constitute a trespass to his curtilage in violation of the Fourth Amendment. Defendant demonstrated his consensual participation in the file sharing community by installing file sharing … Continue reading
Defendant essentially waived his reasonable expectation of privacy in his computer hard drive when he took it in for repair, was told that the hard drive was failing and he needed a new one, and then directed them to move … Continue reading
D.Minn.: Search of house for drug trafficking revealed a surveillance system and DVR; it was reasonable to conclude evidence of trafficking would be on it too for a separate SW
When executing a search warrant for drugs and guns, founded on a strong showing of probable cause, and the police finding pounds of methamphetamine and multiple firearms, discovery of surveillance cameras and a DVR not connected to a satellite or … Continue reading
The Intercept: Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop Haven uses the smartphone’s many sensors – microphone, motion detector, light detector, and cameras – to monitor the room for changes, and it logs everything it … Continue reading
NYTimes: Privacy Complaints Mount Over Phone Searches at U.S. Border Since 2011 by Charlie Savage and Ron Nixon: Grievances over lost privacy run through a trove of roughly 250 complaints by people whose laptops and phones were searched without a … Continue reading