Archives
-
Recent Posts
-

-
ABA Journal Web 100, Best Law Blogs (2015-17) (then discontinued)
-

-
by John Wesley Hall
Criminal Defense Lawyer and
Search and seizure law consultant
Little Rock, Arkansas
Contact: forhall @ aol.com / The Book
www.johnwesleyhall.com -
© 2003-25,
online since Feb. 24, 2003 Approx. 500,000 visits (non-robot) since 2012 Approx. 47,000 posts since 2003 (30,000+ on WordPress as of 12/31/24) -
~~~~~~~~~~~~~~~~~~~~~~~~~~
Fourth Amendment cases,
citations, and links -
Latest Slip Opinions:
U.S. Supreme Court (Home)
S.Ct. Shadow Docket Database
Federal Appellate Courts Opinions
First Circuit
Second Circuit
Third Circuit
Fourth Circuit
Fifth Circuit
Sixth Circuit
Seventh Circuit
Eighth Circuit
Ninth Circuit
Tenth Circuit
Eleventh Circuit
D.C. Circuit
Federal Circuit
Foreign Intell.Surv.Ct.
FDsys, many district courts, other federal courts
Military Courts: C.A.A.F., Army, AF, N-M, CG, SF
State courts (and some USDC opinions)
Google Scholar
Advanced Google Scholar
Google search tips
LexisWeb
LII State Appellate Courts
LexisONE free caselaw
Findlaw Free Opinions
To search Search and Seizure on Lexis.com $ -
Research Links:
Supreme Court:
SCOTUSBlog
S. Ct. Docket
Solicitor General's site
SCOTUSreport
Briefs online (but no amicus briefs)
Oyez Project (NWU)
"On the Docket"–Medill
S.Ct. Monitor: Law.com
S.Ct. Com't'ry: Law.com
-
General (many free):
LexisWeb
Google Scholar | Google
LexisOne Legal Website Directory
Crimelynx
Lexis.com $
Lexis.com (criminal law/ 4th Amd) $
Findlaw.com
Findlaw.com (4th Amd)
Westlaw.com $
F.R.Crim.P. 41
www.fd.org
Federal Law Enforcement Training Center Resources
FBI Domestic Investigations and Operations Guide (2008) (pdf)
DEA Agents Manual (2002) (download)
DOJ Computer Search Manual (2009) (pdf)
Stringrays (ACLU No. Cal.) (pdf)
-
Congressional Research Service:
--Electronic Communications Privacy Act (2012)
--Overview of the Electronic Communications Privacy Act (2012)
--Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)
ACLU on privacy
Privacy Foundation
Electronic Frontier Foundation
NACDL’s Domestic Drone Information Center
Electronic Privacy Information Center
Criminal Appeal (post-conviction) (9th Cir.)
Section 1983 Blog -
"If it was easy, everybody would be doing it. It isn't, and they don't."
—Me -
"Life is not a matter of holding good cards, but of playing a poor hand well."
–Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others) -
“I am still learning.”
—Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)). -
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud -
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers."
—Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848) -
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984). -
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence."
—Mapp v. Ohio, 367 U.S. 643, 659 (1961). -
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987). -
"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today."
— Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting). -
"The great end, for which men entered into society, was to secure their property."
—Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765) -
"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment."
—United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting) -
"The course of true law pertaining to searches and seizures, as enunciated here, has not–to put it mildly–run smooth."
—Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring). -
"A search is a search, even if it happens to disclose nothing but the bottom of a turntable."
—Arizona v. Hicks, 480 U.S. 321, 325 (1987) -
"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."
—Katz v. United States, 389 U.S. 347, 351 (1967) -
“Experience should teach us to be most on guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.”
—United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting) -
“Liberty—the freedom from unwarranted intrusion by government—is as easily lost through insistent nibbles by government officials who seek to do their jobs too well as by those whose purpose it is to oppress; the piranha can be as deadly as the shark.”
—United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989) -
"You can't always get what you want / But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards, Let it Bleed (album, 1969) -
"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration camp] -
“You know, most men would get discouraged by now. Fortunately for you, I am not most men!”
---Pepé Le Pew -
"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime."
—Johnson v. United States, 333 U.S. 10, 13-14 (1948) -
The book was dedicated in the first (1982) and sixth (2025) editions to Justin William Hall (1975-2025). He was three when this project started in 1978.
Website design by Wally Waller, Little Rock
Category Archives: Computer and cloud searches
EFF: U.K. Police Will Soon be able to Search Through U.S. Data Without Asking a Judge
EFF: U.K. Police Will Soon be able to Search Through U.S. Data Without Asking a Judge by Joe Mullin:
D.Mont.: With court ordered pinging of cell phone, govt violated no REP in following the pings
Once officers had a warrant authorizing capturing defendant’s cell phone pings back even in 2015, he had no reasonable expectation of privacy in his movements in public when they were following him based on the result of the pings. Therefore, … Continue reading
NY2: Business records search was not particular except as to time and was a general warrant
The AG’s office obtained a search warrant for defendant’s business for allegations of mortgage fraud. Several computers, hard drives, and many records were seized. After denial of suppression, defendant entered a conditional plea. The search warrant was a “general warrant” … Continue reading
CA4: Individualized suspicion is now required for border searches of electronic devices but it wasn’t in May 2015, so the GFE applies
Warrantless forensic searches of defendant’s devices in May of 2015 lacked the required nexus to the recognized historic rationales justifying the border search exception to the warrant requirement. Officers had probable cause to suspect that defendant had previously committed grave … Continue reading
PA: State’s seeking the passcode to unencrypt a computer hard drive violates the 5A
The state’s seeking the passcode to unencrypt a computer hard drive violates the Fifth Amendment. Commonwealth v. Davis, 2019 Pa. LEXIS 6463 (Nov. 20, 2019):
N.D.Okla.: Particularity in computer searches depends on how SW was executed
Particularity in a computer search has to be flexible and reasonable because of the vast amount of information that is of necessity swept up. “Instead of applying rigid rules requiring particularity when seeking a warrant, the focus should be on … Continue reading
D.Ore.: No REP in a govt computer and email where there were banner warnings at every sign in
Defendant’s government work emails were searched without a warrant, and it’s clear, based on warnings on the computer at every sign in and regular training, that he was well aware everything on the computer has no reasonable expectation of privacy. … Continue reading
WaPo: US, UK reach deal to make it easier to get electronic data
WaPo: US, UK reach deal to make it easier to get electronic data by Eric Tucker (“The United States and United Kingdom signed an agreement Thursday that officials say will speed up dozens of criminal and national security investigations and … Continue reading
Justice Department takes another run at encryption backdoors with ‘lawful access’
CSO: Justice Department takes another run at encryption backdoors with ‘lawful access’ by Cynthia Brumfield (“Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies … Continue reading
CO: Authentication of SW production from Dropbox not self-authenticating as exhibit
Production of records of documents from a Dropbox account by search warrant is not the same as records from a social media account that are more likely to be self- or nearly self-authenticating. Officers can attempt to authenticate the latter, … Continue reading
CA5: USMJ didn’t need to be told in SW application that the computer was small and portable; that’s usually obvious
Six months was not too stale in a child pornography case where the court has approved much longer delays. “The magistrate judge did not need to be told that electronic devices are often small and portable or that they might … Continue reading
W.D.Mo.: SW for cell phone includes its SD card, just as a computer SW includes the hard drive
A search warrant for a cell phone includes the SD card in it, just the same as a computer search warrant authorizes the search of the hard drive: “Such reasoning is analogous to the instant matter. For one, a micro … Continue reading
Cal.6: A broad SW is permissible in a computer search because it may be difficult to locate the subject of the search
The search warrant was sufficiently particular for a computer because it is more difficult to determine what is where in a computer when searching it. It was reasonable to allow a broad search of defendant’s computer to find what was … Continue reading
CA9: Order suppressing laptop search for lack of PC and delay reversed; not wholely lacking in PC and delay was not unreasonable or culpable
The order suppressing a laptop search is reversed. The computer was seized under a state search warrant but searched under a federal warrant. Even if probable cause was lacking for the issuance of the search warrant, it was close enough … Continue reading
CA4: Single click on a CP website’s URL is PC for the clicker’s computer
A single click on a URL on a website devoted to child pornography is probable cause for a search warrant for defendant’s computer. United States v. Bosyk, 2019 U.S. App. LEXIS 22973 (4th Cir. Aug. 1, 2019):
S.D.W.Va.: Computer SW for drugs led to healthcare fraud evidence; second SW needed; exclusionary rule should apply to deter
The government had a search warrant of ESI for drugs. When the search warrant was executed, they found evidence of healthcare billing fraud. A second search warrant was required, citing the government’s own search manual [noted and linked on the … Continue reading
E.D.Mich.: Computer search was valid but court requests more comprehensive ex ante review in computer searches
The government obtained a search warrant for defendant’s computer for 18 U.S.C. § 1960 and for operating an unlicensed Bitcoin exchange service. During the search, the officer found an image of child pornography. He stopped the search and applied for … Continue reading
Cal.3: Broad electronic parole search condition was reasonable and related to the crime
Defendant was convicted of identity theft and he had an electronic search condition for his release. The computer search release condition was reasonable and not overbroad, and it was related to the underlying crime and how it was committed. People … Continue reading
IL: 8 month delay in getting SW for seized computers was unreasonable
The state’s eight month delay in seeking a search warrant for defendant’s computers seized under a warrant was unjustified and unreasonable. The state’s reasoning was it didn’t “want to step on the toes of the IRS” and it took the … Continue reading
FL3: A flash drive plugged into a work computer is subject to search as a part of the work computer
Defendant was employed by the Miami-Dade Police Department and worked in the armory. She was suspected of falsifying police reports to get her husband fired from his job. When investigators went to her work computer, her personal flash drive was … Continue reading