Archives
-
Recent Posts
-

-
ABA Journal Web 100, Best Law Blogs (2015-17) (then discontinued)
-

-
by John Wesley Hall
Criminal Defense Lawyer and
Search and seizure law consultant
Little Rock, Arkansas
Contact: forhall @ aol.com / The Book
www.johnwesleyhall.com -
© 2003-25,
online since Feb. 24, 2003 Approx. 500,000 visits (non-robot) since 2012 Approx. 47,000 posts since 2003 (30,000+ on WordPress as of 12/31/24) -
~~~~~~~~~~~~~~~~~~~~~~~~~~
Fourth Amendment cases,
citations, and links -
Latest Slip Opinions:
U.S. Supreme Court (Home)
S.Ct. Shadow Docket Database
Federal Appellate Courts Opinions
First Circuit
Second Circuit
Third Circuit
Fourth Circuit
Fifth Circuit
Sixth Circuit
Seventh Circuit
Eighth Circuit
Ninth Circuit
Tenth Circuit
Eleventh Circuit
D.C. Circuit
Federal Circuit
Foreign Intell.Surv.Ct.
FDsys, many district courts, other federal courts
Military Courts: C.A.A.F., Army, AF, N-M, CG, SF
State courts (and some USDC opinions)
Google Scholar
Advanced Google Scholar
Google search tips
LexisWeb
LII State Appellate Courts
LexisONE free caselaw
Findlaw Free Opinions
To search Search and Seizure on Lexis.com $ -
Research Links:
Supreme Court:
SCOTUSBlog
S. Ct. Docket
Solicitor General's site
SCOTUSreport
Briefs online (but no amicus briefs)
Oyez Project (NWU)
"On the Docket"–Medill
S.Ct. Monitor: Law.com
S.Ct. Com't'ry: Law.com
-
General (many free):
LexisWeb
Google Scholar | Google
LexisOne Legal Website Directory
Crimelynx
Lexis.com $
Lexis.com (criminal law/ 4th Amd) $
Findlaw.com
Findlaw.com (4th Amd)
Westlaw.com $
F.R.Crim.P. 41
www.fd.org
Federal Law Enforcement Training Center Resources
FBI Domestic Investigations and Operations Guide (2008) (pdf)
DEA Agents Manual (2002) (download)
DOJ Computer Search Manual (2009) (pdf)
Stringrays (ACLU No. Cal.) (pdf)
-
Congressional Research Service:
--Electronic Communications Privacy Act (2012)
--Overview of the Electronic Communications Privacy Act (2012)
--Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)
ACLU on privacy
Privacy Foundation
Electronic Frontier Foundation
NACDL’s Domestic Drone Information Center
Electronic Privacy Information Center
Criminal Appeal (post-conviction) (9th Cir.)
Section 1983 Blog -
"If it was easy, everybody would be doing it. It isn't, and they don't."
—Me -
"Life is not a matter of holding good cards, but of playing a poor hand well."
–Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others) -
“I am still learning.”
—Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)). -
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud -
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers."
—Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848) -
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984). -
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence."
—Mapp v. Ohio, 367 U.S. 643, 659 (1961). -
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987). -
"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today."
— Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting). -
"The great end, for which men entered into society, was to secure their property."
—Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765) -
"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment."
—United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting) -
"The course of true law pertaining to searches and seizures, as enunciated here, has not–to put it mildly–run smooth."
—Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring). -
"A search is a search, even if it happens to disclose nothing but the bottom of a turntable."
—Arizona v. Hicks, 480 U.S. 321, 325 (1987) -
"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."
—Katz v. United States, 389 U.S. 347, 351 (1967) -
“Experience should teach us to be most on guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.”
—United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting) -
“Liberty—the freedom from unwarranted intrusion by government—is as easily lost through insistent nibbles by government officials who seek to do their jobs too well as by those whose purpose it is to oppress; the piranha can be as deadly as the shark.”
—United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989) -
"You can't always get what you want / But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards, Let it Bleed (album, 1969) -
"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration camp] -
“You know, most men would get discouraged by now. Fortunately for you, I am not most men!”
---Pepé Le Pew -
"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime."
—Johnson v. United States, 333 U.S. 10, 13-14 (1948) -
The book was dedicated in the first (1982) and sixth (2025) editions to Justin William Hall (1975-2025). He was three when this project started in 1978.
Website design by Wally Waller, Little Rock
Category Archives: Computer and cloud searches
D.R.I.: IP addresses def used weren’t like detailed tracking information from CSLI requiring a SW
Defendant’s use of IP addresses his computer signed in through isn’t enough like CSLI in Carpenter to require a search warrant. United States v. Monroe, 2018 U.S. Dist. LEXIS 186998 (D. R.I. Nov. 1, 2018):
N.D.Iowa: Officers called to noise complaint could ask for ID even though noise had stopped
Officers investigating a noise complaint ended up talking to defendant in a parked car. They could ask for his DL despite the noise having abated. While that was going on, one officer could see marijuana hidden under the edge of … Continue reading
N.D.W.Va.: SW lacked PC and was not particular: “his search warrant is among the broadest and most general warrants that have been reviewed by” this judge
The search warrant for defendant’s computer was essentially based on a hunch that it contained evidence in a homicide case, but the affidavit fails to state what. In a lengthy analysis, the court finds the computer warrant lacking in probable … Continue reading
WI: No REP in a computer left running online P2P
Wisconsin follows the uniform rule from all other courts and holds that there is no reasonable expectation of privacy in computer files available on eDonkey P2P network under either the Fourth Amendment or the state constitution. State v. Baric, 2018 … Continue reading
S.D.Fla.: The FTC sought an order of production of cell phones and laptops for search in an action for injunction; production not testimonial and PC shown
The FTC sued defendants for injunctive relief and sought an order for production of cell phones and laptop computers. On the first issue of preservation of the Fourth Amendment claim in addition to the clearly asserted Fifth Amendment, the court … Continue reading
WaPo: Google refused an order to release huge amounts of data. Will other companies bow under pressure? [Govt seeking tracking information from phone apps]
WaPo: Google refused an order to release huge amounts of data. Will other companies bow under pressure? by Deanna Paul:
OR: Search of browser history limited to the PC, and here it was one day
Police received a call that defendant’s infant son had died at home. In his interview with the police, defendant admitted a computer search about it. The police got a search warrant for his computer search history. The probable cause here … Continue reading
D.Md.: SW for drug evidence on a computer allowed cursory look at each file, and CP was validly found
Once officers were in defendant’s computer with a search warrant looking for drug evidence, they could cursorily look at each file, and, in the process found child pornography. [This is akin to a plain view.] With that, the search stopped, … Continue reading
D.D.C.: BOP employee had no REP in BOP owned work cell phone even though personal information was on it
BOP IG issued an administrative subpoena for respondent to produce her BOP owned cell phone, and she refused claiming a reasonable expectation of privacy in it. First, the standard of review is narrow and limited, and the subpoena is enforceable. … Continue reading
NACDL: Riling Up the Border Search Doctrine: Litigating Searches of Digital Content at Our Ports of Entry
NACDL, The Champion: Riling Up the Border Search Doctrine: Litigating Searches of Digital Content at Our Ports of Entry by Aisha J. Dennis, The Champion 40-46 (Mar. 2018)
MA: Removing paint chips off a car under the automobile exception was reasonable
There was probable cause that defendant’s car was involved in a shooting such that its stop and search was reasonable under the automobile exception. That included removing paint chips from it when it had been removed to the police station. … Continue reading
Gizmodo: Paul Manafort Learns That Encrypting Messages Doesn’t Matter If the Feds Have a Warrant to Search Your iCloud Account
Gizmodo: Paul Manafort Learns That Encrypting Messages Doesn’t Matter If the Feds Have a Warrant to Search Your iCloud Account by Matt Novak: Federal prosecutors have accused Paul Manafort of witness tampering, alleging that he used WhatsApp and Telegram in … Continue reading
Lawfare: Summary: Circuit Split on Device Searches at the Border in US v. Touset
Lawfare: Summary: Circuit Split on Device Searches at the Border in US v. Touset by Grayson Clary:
D.Minn.: Def lacked standing to challenge SW to YouTube for search history and videos viewed in terrorism case
Defendant was indicted for providing material support to a terrorist organization and planned to travel to Afghanistan, and there were nine search warrants. She communicated with Afghanistan on digital devices and by a gmail account. The search warrants for all … Continue reading
S.D.Fla.: Consent to giving up passwords at border irrelevant since CBP can search anyway
In a border search case, defendant’s consent to produce his passwords doesn’t matter because the government has the authority to conduct a search of incoming electronic equipment. United States v. Vallerius, 2018 U.S. Dist. LEXIS 85620 (S.D. Fla. May 1, … Continue reading
The Marshall Project: Your Home is Your…Snitch?
The Marshall Project: Your Home is Your…Snitch? by Daniel Zwerdling: When your appliances work as police informants.
N.D.Ga.: No 4A requirement of a computer search protocol in the SW
This search warrant was for steroids and misbranded drugs and included computers and defendant’s home. The warrant was issued with probable cause and was as particular as possible. As to the computer search, there was no constitutional requirement for a … Continue reading
Volokh Conspiracy: Suspect Can Be Compelled to Decrypt Devices If Government Proves He Has The Ability To Do So, Court Rules
United States v. Spencer, 2018 U.S. Dist. LEXIS 70649 (N.D. Cal. Apr. 26, 2018) Volokh Conspiracy: Suspect Can Be Compelled to Decrypt Devices If Government Proves He Has The Ability To Do So, Court Rules by Orin Kerr: The right … Continue reading
E.D.Cal.: Alleged search of a public computer in a library for ptf’s usage didn’t violate any REP
Alleged search of a public computer in a college library for information about plaintiff’s use of it doesn’t violate any reasonable expectation of privacy. Berry v. Yosemite Cmty. College Dist., 2018 U.S. Dist. LEXIS 64732 (E.D. Cal. Apr. 17, 2018). … Continue reading
IN: Recording a recording off a Facebook account doesn’t violate the federal wiretap law
Defendant was accused of breaking into his ex-girlfriend’s apartment and stealing her work iPad and other personal things. She signed on to his Facebook account with a password he’d previously given her. She found a recording there which admitted he … Continue reading