Category Archives: Computer and cloud searches

Techcrunch: Report: Facebook gave special investigator Robert Mueller detailed info on Russian ad buys

Techcrunch: Report: Facebook gave special investigator Robert Mueller detailed info on Russian ad buys by Jonathan Shieber:

Posted in Computer and cloud searches | Comments Off on Techcrunch: Report: Facebook gave special investigator Robert Mueller detailed info on Russian ad buys

Lawfare: DreamHost Documents Summaries

Lawfare: DreamHost Documents Summaries by Sarah Tate Chambers & Stephanie Zable:

Posted in Computer and cloud searches | Comments Off on Lawfare: DreamHost Documents Summaries

Just Security: We Need to Know More About Government Searches of Traveler’s Electronic Devices

Just Security: We Need to Know More About Government Searches of Traveler’s Electronic Devices by Carrie DeCell:

Posted in Border search, Cell phones, Computer and cloud searches | Comments Off on Just Security: We Need to Know More About Government Searches of Traveler’s Electronic Devices

N.D.Ga.: SW for seizure and search of a computer allows the search to be done at a later time

A second search of a computer’s contents is usually justified by the initial search and seizure warrant for the computer. United States v. Perry, 2017 U.S. Dist. LEXIS 148336 (N.D. Ga. Sept. 13, 2017). Officers went to a Biloxi motel … Continue reading

Posted in Computer and cloud searches, Plain view, feel, smell | Comments Off on N.D.Ga.: SW for seizure and search of a computer allows the search to be done at a later time

CA11: All Writs Act could be used to get Apple to unlock iPad (which apparently is now really easy for them)

The All Writs Act was properly used to get Apple to unlock defendants’ iPad. Under NY Telephone, “The Supreme Court has recognized five requirements that must be met before a court can compel under the All Writs Act the assistance … Continue reading

Posted in Computer and cloud searches | Comments Off on CA11: All Writs Act could be used to get Apple to unlock iPad (which apparently is now really easy for them)

Infosecurity: DoJ Subject to Strict Oversight in Anti-Trump Site Investigation

Infosecurity: DoJ Subject to Strict Oversight in Anti-Trump Site Investigation by Phil Muncaster:

Posted in Computer and cloud searches | Comments Off on Infosecurity: DoJ Subject to Strict Oversight in Anti-Trump Site Investigation

Electronics 360: Smart Devices Versus Privacy

Electronics 360: Smart Devices Versus Privacy by Tony Pallone:

Posted in Computer and cloud searches, Surveillance technology, Third Party Doctrine | Comments Off on Electronics 360: Smart Devices Versus Privacy

Law.com: What the DreamHost/DOJ Battle Says About Search Warrants in the Digital Age

Law.com: What the DreamHost/DOJ Battle Says About Search Warrants in the Digital Age by Rhys Dipshan:

Posted in Computer and cloud searches | Comments Off on Law.com: What the DreamHost/DOJ Battle Says About Search Warrants in the Digital Age

Forbes: What The Fight Between DreamHost And The DOJ Means For Technology And Freedom

Forbes: What The Fight Between DreamHost And The DOJ Means For Technology And Freedom by Frank Miniter:

Posted in Computer and cloud searches | Comments Off on Forbes: What The Fight Between DreamHost And The DOJ Means For Technology And Freedom

NY Times: DreamHost Ordered to Release Some Trump Protest Website Data to U.S.

NY Times: DreamHost Ordered to Release Some Trump Protest Website Data to U.S. by Tiffany Hsu A Superior Court judge in Washington on Thursday ordered the web hosting company DreamHost to turn over data associated with a Trump protest website to … Continue reading

Posted in Computer and cloud searches | Comments Off on NY Times: DreamHost Ordered to Release Some Trump Protest Website Data to U.S.

ZDNet: DOJ amends request for data from anti-Trump site

ZDNet: DOJ amends request for data from anti-Trump site by Stephanie Condon The Justice Department attempts to allay First and Fourth Amendment concerns but continues to seek data on visitors to an anti-Trump website. Infosecurity: DoJ Narrows Demands for Anti-Trump … Continue reading

Posted in Computer and cloud searches | Comments Off on ZDNet: DOJ amends request for data from anti-Trump site

W.D.Wash.: The mosaic theory is rejected as to P2P computer searches

A search warrant is not required before using a P2P child pornography acquiring program Roundup eMule. The mosaic theory is rejected as to P2P computer searches. United States v. Blouin, 2017 U.S. Dist. LEXIS 129886 (W.D. Wash. Aug. 14, 2017). … Continue reading

Posted in Computer and cloud searches, Reasonable suspicion | Comments Off on W.D.Wash.: The mosaic theory is rejected as to P2P computer searches

American Conservative: Feds Searching Record Number of Our Personal Devices at the Border

American Conservative: Feds Searching Record Number of Our Personal Devices at the Border by Frank Miniter In the name of ‘Homeland Security.’

Posted in Border search, Computer and cloud searches | Comments Off on American Conservative: Feds Searching Record Number of Our Personal Devices at the Border

MA: Riley applies under state const. to digital cameras

A digital camera, like a cell phone, can be seized incident to an arrest, but it can’t be searched without a warrant. While SCOTUS hasn’t applied Riley to digital cameras, the state constitution here affords the same protection to digital … Continue reading

Posted in Computer and cloud searches, Reasonable suspicion, State constitution | Comments Off on MA: Riley applies under state const. to digital cameras

Mother Jones: Justice Department Accused of Breaching Constitution by Seeking Info on Visitors to Anti-Trump Website

Mother Jones: Justice Department Accused of Breaching Constitution by Seeking Info on Visitors to Anti-Trump Website by Pema Levy The website hosting company calls the move a “clear abuse of government authority.”

Posted in Computer and cloud searches | Comments Off on Mother Jones: Justice Department Accused of Breaching Constitution by Seeking Info on Visitors to Anti-Trump Website

LA2: A host of RS: (1) no DL or paperwork on car; (2) suspicious travel plans; (3) extensive criminal history of driver and passenger; (4) not knowing passenger’s name

“As previously noted in [the first appeal of this case,] Tpr. Sharbono’s testimony provided the articulable facts that raised his suspicions of other illegal activity: (1) Manning had no driver’s license or paperwork for the vehicle he was driving; (2) … Continue reading

Posted in Computer and cloud searches, Reasonable suspicion | Comments Off on LA2: A host of RS: (1) no DL or paperwork on car; (2) suspicious travel plans; (3) extensive criminal history of driver and passenger; (4) not knowing passenger’s name

How to Respond to Cops Who Want Your Passwords

How to Respond to Cops Who Want Your Passwords by Stephanie Lacambra of EFF (Prezi presentation)

Posted in Cell phones, Computer and cloud searches | Comments Off on How to Respond to Cops Who Want Your Passwords

NYLJ: Executing Search Warrants in the Digital Age: ‘United States v. Wey’

NYLJ: Executing Search Warrants in the Digital Age: ‘United States v. Wey’ by Robert J. Anello & Richard F. Albert:

Posted in Computer and cloud searches, Warrant execution | Comments Off on NYLJ: Executing Search Warrants in the Digital Age: ‘United States v. Wey’

CAAF: Digital SWs have to expire sometime, so here it was with def’s conviction; search after that unreasonable

A search warrant had issued for defendant’s thumb drive, but it hadn’t been searched. He was convicted of the crime for which the search warrant had issued. There are no specific time limits for when a digital search has to … Continue reading

Posted in Computer and cloud searches | Comments Off on CAAF: Digital SWs have to expire sometime, so here it was with def’s conviction; search after that unreasonable

CA8 upholds Playpen warrant strictly on GFE despite Rule 41 violation

Playpen warrant upheld purely on good faith exception of Davis and Herring. Rule 41 was violated, but the court finds the costs of exclusion outweight deterrence, particularly where the rule was modified to permit such later warrants. United States v. … Continue reading

Posted in Computer and cloud searches, F.R.Crim.P. 41, Good faith exception | Comments Off on CA8 upholds Playpen warrant strictly on GFE despite Rule 41 violation