Category Archives: Computer searches

NYLJ: Judge Urges Action to Curb ‘Overbroad’ Digital Search Warrants

NYLJ: Judge Urges Action to Curb ‘Overbroad’ Digital Search Warrants by Andrew Denney: Overbroad search warrants for digital evidence are “all too common” in New York, are often green-lighted by busy judges who are focused on processing motions and are … Continue reading

Posted in Computer searches, Overbreadth | Comments Off on NYLJ: Judge Urges Action to Curb ‘Overbroad’ Digital Search Warrants

CA6: Computers, like guns, are usually kept at home, and that’s nexus for search of house for a computer [!?]

A computer, like a gun, is usually kept in the home, and a search warrant for a computer establishes nexus to search defendant’s house[!, really?]. Thus, there was no Fourth Amendment violation and alternatively there was qualified immunity. Peffer v. … Continue reading

Posted in Computer searches, Nexus | Comments Off on CA6: Computers, like guns, are usually kept at home, and that’s nexus for search of house for a computer [!?]

S.D.Ohio: Facebook SW failed to show nexus to alleged hate crime, but GFE applies

Defendant is charged with a hate crime, and the government believed that he was involved with a group. The search warrant for his Facebook account failed to show nexus to get access to the non-public pages just because the group … Continue reading

Posted in Computer searches, Good faith exception | Comments Off on S.D.Ohio: Facebook SW failed to show nexus to alleged hate crime, but GFE applies

Just Security: Customs and Border Protection’s New Policy for Searching Devices Offers Thin Protection

Just Security: Customs and Border Protection’s New Policy for Searching Devices Offers Thin Protection by Carrie DeCell:

Posted in Border search, Cell phones, Computer searches | Comments Off on Just Security: Customs and Border Protection’s New Policy for Searching Devices Offers Thin Protection

DC Inauguration protestor Facebook and email warrant case now on Lexis

In the DC protestor Facebook litigation, the trial court’s order finally appears on Lexis, but I did find links to the opinions elsewhere. In the Matter of the Search of Information Associated with Facebook Accounts disruptj20, lacymacauley, and legba.carrefour That … Continue reading

Posted in Computer searches | Comments Off on DC Inauguration protestor Facebook and email warrant case now on Lexis

NYTimes: Cellphone and Computer Searches at U.S. Border Rise Under Trump

NYTimes: Cellphone and Computer Searches at U.S. Border Rise Under Trump by Ron Nixon:

Posted in Border search, Cell phones, Computer searches | Comments Off on NYTimes: Cellphone and Computer Searches at U.S. Border Rise Under Trump

M.D.La.: Finding CP image hash values on a computer is PC for search

The finding of child pornography hash values on a computer is probable cause for further search of the computer. United States v. Sherlock, 2018 U.S. Dist. LEXIS 1321 (M.D. La. Jan. 4, 2018).* Playpen warrant sustained, and there was no … Continue reading

Posted in Collective knowledge, Computer searches, Probable cause | Comments Off on M.D.La.: Finding CP image hash values on a computer is PC for search

ID: Failure to repeat “computer” in SW for things to be seized wasn’t a violation of 4A; CA7 typo in LPN can be overlooked

The preamble of the search warrant listed a bunch of digital things to search for and seize but the specific search clause didn’t include “computer.” The search warrant as a whole included computers, and defense counsel wasn’t ineffective for not … Continue reading

Posted in Burden of pleading, Computer searches, Warrant requirement | Comments Off on ID: Failure to repeat “computer” in SW for things to be seized wasn’t a violation of 4A; CA7 typo in LPN can be overlooked

VA: P2P file sharing to access CP wasn’t a trespass on the curtilage; def consented to entry into the computer

The officer’s actions in accessing defendant’s computer files by peer-to-peer file sharing did not constitute a trespass to his curtilage in violation of the Fourth Amendment. Defendant demonstrated his consensual participation in the file sharing community by installing file sharing … Continue reading

Posted in Computer searches, Curtilage, Trespass | Comments Off on VA: P2P file sharing to access CP wasn’t a trespass on the curtilage; def consented to entry into the computer

PA: Telling computer repair person to move files to a new hard drive was a waiver of REP

Defendant essentially waived his reasonable expectation of privacy in his computer hard drive when he took it in for repair, was told that the hard drive was failing and he needed a new one, and then directed them to move … Continue reading

Posted in Computer searches, Motion to suppress, Private search, Reasonable expectation of privacy | Comments Off on PA: Telling computer repair person to move files to a new hard drive was a waiver of REP

D.Minn.: Search of house for drug trafficking revealed a surveillance system and DVR; it was reasonable to conclude evidence of trafficking would be on it too for a separate SW

When executing a search warrant for drugs and guns, founded on a strong showing of probable cause, and the police finding pounds of methamphetamine and multiple firearms, discovery of surveillance cameras and a DVR not connected to a satellite or … Continue reading

Posted in Computer searches, Informant hearsay, Nexus | Comments Off on D.Minn.: Search of house for drug trafficking revealed a surveillance system and DVR; it was reasonable to conclude evidence of trafficking would be on it too for a separate SW

The Intercept: Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop

The Intercept: Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop Haven uses the smartphone’s many sensors – microphone, motion detector, light detector, and cameras – to monitor the room for changes, and it logs everything it … Continue reading

Posted in Computer searches, Surveillance technology | Comments Off on The Intercept: Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop