Archives
-
Recent Posts
- CA10: SW for gun three weeks after road rage incident wasn’t stale
- OH10: Parole search of cell phone can occur even when it’s taken from the property room at jail
- TX14: No REP in location information on bondsman’s GPS monitor
- W.D.N.Y.: No IAC for not challenging search without standing
- CAAF: Victim’s 4A rights were at issue, too
-

-
ABA Journal Web 100, Best Law Blogs (2015-17) (then discontinued)
-

-
by John Wesley Hall
Criminal Defense Lawyer and
Search and seizure law consultant
Little Rock, Arkansas
Contact: forhall @ aol.com
Search and Seizure (6th ed. 2025)
www.johnwesleyhall.com -
© 2003-26,
online since Feb. 24, 2003 Approx. 600,000 visits (non-robot) since 2012 Approx. 50,000 posts since 2003 (29,000 on WordPress as of 12/31/25) -
~~~~~~~~~~~~~~~~~~~~~~~~~~
Fourth Amendment cases, citations, and links -
Latest Slip Opinions:
U.S. Supreme Court (Home)
S.Ct. Shadow Docket Database
Federal Appellate Courts Opinions
First Circuit
Second Circuit
Third Circuit
Fourth Circuit
Fifth Circuit
Sixth Circuit
Seventh Circuit
Eighth Circuit
Ninth Circuit
Tenth Circuit
Eleventh Circuit
D.C. Circuit
Federal Circuit
Foreign Intell.Surv.Ct.
FDsys, many district courts, other federal courts
Military Courts: C.A.A.F., Army, AF, N-M, CG, SF
State courts (and some USDC opinions)
Google Scholar
Advanced Google Scholar
Google search tips
LexisWeb
LII State Appellate Courts
LexisONE free caselaw
Findlaw Free Opinions
To search Search and Seizure on Lexis.com $ -
Research Links:
Supreme Court:
SCOTUSBlog
S. Ct. Docket
Solicitor General's site
SCOTUSreport
Briefs online (but no amicus briefs)
Oyez Project (NWU)
"On the Docket"–Medill
S.Ct. Monitor: Law.com
S.Ct. Com't'ry: Law.com
-
General (many free):
LexisWeb
Google Scholar | Google
LexisOne Legal Website Directory
Crimelynx
Lexis.com $
Lexis.com (criminal law/ 4th Amd) $
Findlaw.com
Findlaw.com (4th Amd)
Westlaw.com $
F.R.Crim.P. 41
www.fd.org
Federal Law Enforcement Training Center Resources
FBI Domestic Investigations and Operations Guide (2008) (pdf)
DEA Agents Manual (2002) (download)
DOJ Computer Search Manual (2009) (pdf)
Stringrays (ACLU No. Cal.) (pdf)
-
Congressional Research Service:
--Electronic Communications Privacy Act (2012)
--Overview of the Electronic Communications Privacy Act (2012)
--Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
--Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)
ACLU on privacy
Privacy Foundation
Electronic Frontier Foundation
NACDL’s Domestic Drone Information Center
Electronic Privacy Information Center
Criminal Appeal (post-conviction) (9th Cir.)
Section 1983 Blog -
"If it was easy, everybody would be doing it. It isn't, and they don't."
—Me -
"Life is not a matter of holding good cards, but of playing a poor hand well."
–Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others) -
“I am still learning.”
—Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)). -
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud -
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers."
—Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848) -
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984). -
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence."
—Mapp v. Ohio, 367 U.S. 643, 659 (1961). -
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987). -
"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today."
— Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting). -
"The great end, for which men entered into society, was to secure their property."
—Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765) -
"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment."
—United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting) -
"The course of true law pertaining to searches and seizures, as enunciated here, has not–to put it mildly–run smooth."
—Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring). -
"A search is a search, even if it happens to disclose nothing but the bottom of a turntable."
—Arizona v. Hicks, 480 U.S. 321, 325 (1987) -
"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."
—Katz v. United States, 389 U.S. 347, 351 (1967) -
“Experience should teach us to be most on guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.”
—United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting) -
“Liberty—the freedom from unwarranted
intrusion by government—is as easily lost through insistent nibbles by
government officials who seek to do their jobs too well as by those whose purpose
it is to oppress; the piranha can be as deadly as the shark.”
—United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989) -
"You can't always get what you want / But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards, Let it Bleed (album, 1969) -
"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration camp] -
“Children grow up thinking the adult world is ordered, rational, fit for purpose. It’s crap. Becoming a man is realising that it’s all rotten. Realising how to celebrate that rottenness, that’s freedom.”
– John le Carré, The Night Manager (1993), line by Richard Roper -
"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime."
—Johnson v. United States, 333 U.S. 10, 13-14 (1948) -
The book was dedicated in the first (1982) and sixth (2025) editions to Justin William Hall (1975-2025). He was three when this project started in 1978.
Website design by Wally Waller, Colorado Springs.
Category Archives: E-mail
D.Mass.: PC shown for white collar email search by declaration of investigator that email is commonly used
A federal search warrant issued by a USMJ in the District if Massachusetts could be served on an email provider in Florida under § 2703(b)(1)(A). The affiant’s statement that white collar defendants frequently use email to communicate was sufficient to … Continue reading
N.D.Ga.: Motion to suppress of “any Hotmail accounts under his direction, control, use or access” doesn’t show standing
Defendant failed to show standing in his motion to suppress by merely challenging the search of “any Hotmail accounts under his direction, control, use or access” without showing his connection. United States v. Archie, 2016 U.S. Dist. LEXIS 70620 (N.D.Ga. … Continue reading
CNET: Senate bill would let FBI read your emails without a court order
CNET: Senate bill would let FBI read your emails without a court order by Shara Tibken The 2017 Intelligence Authorization Act would deal a blow to privacy by making government surveillance easier.
D.Kan.: Where USMJ lacks jurisdiction over subject of search or crime, SW void and no GFE
A Maryland USMJ could not issue a search warrant for email where there was no indication that the child pornography offense occurred in that jurisdiction. The email user was in another state as was gmail. Therefore, there was a lack … Continue reading
NACDL Press Release: House Judiciary passed out Email Privacy Act
Today the House Judiciary Committee passed out of committee the Email Privacy Act (H.R. 699) by a vote of 28-0. This bill is a long overdue update of the Electronic Communications Privacy Act (ECPA), a bill passed in 1986 that … Continue reading
D.Kan.: USMJ scholarly opinion on history of email SWs; “Needless to say, a person’s email account may reveal their ‘privacies of life.’”
The government’s email account search warrant request is overbroad as to what is being seized. The court analogizes Riley and notes that email accounts can provide a detailed picture of a person’s life the same as a cell phone search. … Continue reading
Center for Democracy and Technology: A Response to Law Enforcement Concerns with the Email Privacy Act
Center for Democracy and Technology: A Response to Law Enforcement Concerns with the Email Privacy Act by Jadzia Butler:
Reason.com: Fourth Amendment Protections for Emails Inch Forward in Congress
Reason.com: Fourth Amendment Protections for Emails Inch Forward in Congress by Scott Shackford: Legislation would require warrants for old communications. There is a big, huge gap in your Fourth Amendment protection against government searches without a warrant that goes all … Continue reading
WaPo: UC-Berkeley students sue Google, alleging their emails were illegally scanned
WaPo: UC-Berkeley students sue Google, alleging their emails were illegally scanned by Emma Brown: Four students and alumni from the University of California-Berkeley have sued Google in federal court, alleging that the company — which runs the university’s email accounts … Continue reading
M.D.Fla.: Email SWs are almost never stale; the email is always there
Staleness as to an email search warrant is hard to prove. It’s always going to be on the email provider’s server. United States v. Khateeb, 2015 U.S. Dist. LEXIS 143007 (M.D.Fla. Aug. 4, 2015). Defense counsel was not ineffective for … Continue reading
D.Neb.: Google did not become a state actor by scanning email for child pornography and then reporting it to NCMEC
Google did not become a state actor by scanning email for child pornography and then reporting it to NCMEC. The IP address provided led to a search warrant. There was no Franks violation in not providing mobile IP addresses, too, … Continue reading
Wired: California Now Has the Nation’s Best Digital Privacy Law
Wired: California Now Has the Nation’s Best Digital Privacy Law by Kim Zetter CALIFORNIA CONTINUED ITS long-standing tradition for forward-thinking privacy laws today when Governor Jerry Brown signed a sweeping law protecting digital privacy rights. The landmark Electronic Communications Privacy … Continue reading
The Hill: Google: Government creating ‘distractions’ in email privacy debate
The Hill: Google: Government creating ‘distractions’ in email privacy debate by Mario Trujillo: Google and other tech advocates accused federal agencies Wednesday of creating “distractions” during the years-long debate on updating an email privacy law from the 1980s. “We certainly … Continue reading
Slate: Our Inboxes, Ourselves | ECPA in Congress, finally?
Slate: Our Inboxes, Ourselves by Mike Godwin An ancient email privacy law might finally be updated. Congress needs to get it right.
The Hill: Bill to limit reach of US warrants faces uphill battle in Congress
The Hill: Bill to limit reach of US warrants faces uphill battle in Congress by Mario Trujillo: Congress faces a tough slog to update the email privacy law at the center of Microsoft’s fight against a U.S. warrant mandating that … Continue reading
The Hill: The quiet battle for privacy in the cloud
The Hill: The quiet battle for privacy in the cloud by Dan Horowitz: Why is the Second Circuit being forced to defend our electronic privacy and preserve an international agreement from the Obama administration? Recently, a Federal Judge in New … Continue reading
N.D.Ga.: Govt’s email search protocol satisfied particularity despite large initial seizure
The government’s protocol for searching defendant’s emails satisfied the particularity requirement. All the emails were produced, but the government searched within them only for emails relating to copyright infringement, the crime under investigation. Other cases are in accord. United States … Continue reading
The Hill: The SEC’s curious view of the Constitution and privacy rights
The Hill: The SEC’s curious view of the Constitution and privacy rights by Lou Mejia:
E.D.N.Y.: Overseizure of emails did not void the search warrant; some overseizure necessary for a proper investigation
A judge in the E.D.N.Y. may issue a search warrant for emails on Yahoo!’s email server in California under Rule 41 and the Stored Communications Act. The warrant was broad in its particularity, but still constitutional. The warrant lawfully included … Continue reading
S.D.N.Y.: Email warrant need only show “fair probability” evidence would be found in it; all emails for three years not overbroad in conspiracy case
Defendant’s email account, shown on a website as a “contact” email address, was accessed by a search warrant for evidence of her being involved in a fraud against the government. Direct evidence that an email account actually contains evidence is … Continue reading