- Archives
- 
		Recent Posts
- 
 
- 
ABA Journal Web 100, Best Law Blogs (2015-17) (then discontinued) 
- 
 
- 
 by John Wesley Hall
 Criminal Defense Lawyer and
 Search and seizure law consultant
 Little Rock, Arkansas
 Contact: forhall @ aol.com / The Book
 www.johnwesleyhall.com
- 
© 2003-25, 
 online since Feb. 24, 2003 Approx. 500,000 visits (non-robot) since 2012 Approx. 47,000 posts since 2003 (30,000+ on WordPress as of 12/31/24)
- 
~~~~~~~~~~~~~~~~~~~~~~~~~~ 
 
 Fourth Amendment cases,
 citations, and links
- 
Latest Slip Opinions: 
 U.S. Supreme Court (Home)
 S.Ct. Shadow Docket Database
 Federal Appellate Courts Opinions
 First Circuit
 Second Circuit
 Third Circuit
 Fourth Circuit
 Fifth Circuit
 Sixth Circuit
 Seventh Circuit
 Eighth Circuit
 Ninth Circuit
 Tenth Circuit
 Eleventh Circuit
 D.C. Circuit
 Federal Circuit
 Foreign Intell.Surv.Ct.
 FDsys, many district courts, other federal courts
 Military Courts: C.A.A.F., Army, AF, N-M, CG, SF
 State courts (and some USDC opinions)
 
 Google Scholar
 Advanced Google Scholar
 Google search tips
 LexisWeb
 LII State Appellate Courts
 LexisONE free caselaw
 Findlaw Free Opinions
 To search Search and Seizure on Lexis.com $
- 
Research Links: 
 Supreme Court:
 SCOTUSBlog
 S. Ct. Docket
 Solicitor General's site
 SCOTUSreport
 Briefs online (but no amicus briefs)
 Oyez Project (NWU)
 "On the Docket"–Medill
 S.Ct. Monitor: Law.com
 S.Ct. Com't'ry: Law.com
 
- 
General (many free): 
 LexisWeb
 Google Scholar | Google
 LexisOne Legal Website Directory
 Crimelynx
 Lexis.com $
 Lexis.com (criminal law/ 4th Amd) $
 Findlaw.com
 Findlaw.com (4th Amd)
 Westlaw.com $
 F.R.Crim.P. 41
 www.fd.org
 Federal Law Enforcement Training Center Resources
 FBI Domestic Investigations and Operations Guide (2008) (pdf)
 DEA Agents Manual (2002) (download)
 DOJ Computer Search Manual (2009) (pdf)
 Stringrays (ACLU No. Cal.) (pdf)
 
- 
Congressional Research Service: 
 --Electronic Communications Privacy Act (2012)
 --Overview of the Electronic Communications Privacy Act (2012)
 --Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
 --Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
 --Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)
 
 ACLU on privacy
 Privacy Foundation
 Electronic Frontier Foundation
 NACDL’s Domestic Drone Information Center
 Electronic Privacy Information Center
 Criminal Appeal (post-conviction) (9th Cir.)
 Section 1983 Blog
- 
"If it was easy, everybody would be doing it. It isn't, and they don't." 
 —Me
- 
"Life is not a matter of holding good cards, but of playing a poor hand well." 
 –Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others)
- 
“I am still learning.” 
 —Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)).
- 
"Love work; hate mastery over others; and avoid intimacy with the government." 
 —Shemaya, in the Thalmud
- 
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers." 
 —Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848)
- 
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced." 
 —Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984).
- 
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence." 
 —Mapp v. Ohio, 367 U.S. 643, 659 (1961).
- 
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment." 
 —Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).
- 
"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today." 
 — Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).
- 
"The great end, for which men entered into society, was to secure their property." 
 —Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)
- 
"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment." 
 —United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)
- 
"The course of true law pertaining to searches and seizures, as enunciated here, has not–to put it mildly–run smooth." 
 —Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).
- 
"A search is a search, even if it happens to disclose nothing but the bottom of a turntable." 
 —Arizona v. Hicks, 480 U.S. 321, 325 (1987)
- 
"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected." 
 —Katz v. United States, 389 U.S. 347, 351 (1967)
- 
“Experience should teach us to be most on guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.” 
 —United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)
- 
“Liberty—the freedom from unwarranted intrusion by government—is as easily lost through insistent nibbles by government officials who seek to do their jobs too well as by those whose purpose it is to oppress; the piranha can be as deadly as the shark.” 
 —United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)
- 
"You can't always get what you want / But if you try sometimes / You just might find / You get what you need." 
 —Mick Jagger & Keith Richards, Let it Bleed (album, 1969)
- 
"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for me–and by that time there was nobody left to speak up." 
 —Martin Niemöller (1945) [he served seven years in a concentration camp]
- 
“You know, most men would get discouraged by now. Fortunately for you, I am not most men!” 
 ---Pepé Le Pew
- 
"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime." 
 —Johnson v. United States, 333 U.S. 10, 13-14 (1948)
- 
The book was dedicated in the first (1982) and sixth (2025) editions to Justin William Hall (1975-2025). He was three when this project started in 1978. 
 Website design by Wally Waller, Little Rock
Category Archives: Cell phones
DE: Just being involved in a shooting doesn’t give nexus to search a cell phone
The state here failed to show nexus between defendant’s cell phone and a shooting incident. In addition, the search warrant lacked all particularity — it sought to search three cell phones for data and calls without time limit or scope. … Continue reading
CA3: Disavowal of cell phone in car was a waiver of standing
The search of the call log on the cell phone in the car defendant was driving a year before Riley was valid. He also disavowed the cell phone and lacks standing. United States v. Monestime, 2017 U.S. App. LEXIS 1501 … Continue reading
CNN: White House discussing asking foreign visitors for social media info and cell phone contacts
CNN: White House discussing asking foreign visitors for social media info and cell phone contacts by Jake Tapper:
Cal.6th: Broad electronic search probation condition was justified by the crime
The defendant juvenile took pictures of his having sex with a girl he was in school with and then he blackmailed her. He was found delinquent under the juvenile law for possession of child pornography and extortion. The broad probation … Continue reading
IA: An exchange of texts between def and deceased justified search of cell phone; computer search also justified
Only the information in the search warrant application can be considered on the question of whether there was probable cause for its issuance. In this murder case, the absence of evidence in defendant’s car led to an inference it could … Continue reading
S.D.Cal.: Using Cellebrite to copy files on two phones and an iPad at the border was with RS and reasonable
A DHS officer took defendant’s Motorola phone, iPhone, and iPad from a Customs officer at the border when defendant was arrested for importing cocaine in her car. The Motorola phone wasn’t password protected, and it was examined with a Cellebrite … Continue reading
Ars Technica: Here’s what a “digital Miranda warning” might look like
Ars Technica: Here’s what a “digital Miranda warning” might look like by Cyrus Farivar: Smartphone owners need to know if—and when—they need to reveal their passcodes.
CA9: Def turned over cell phone by consent, but, even if not, it was searched with a warrant
Defendant handed over his telephone when it was requested [or demanded] by the police. The Fourth Amendment wasn’t violated because turning over the phone was by consent. Even if turning over the phone was nonconsensual, the cell phone was searched … Continue reading
W.D.Va.: Reasonable inference cell phone was used to set up meeting for sex with minor to get SW for phone
It was reasonable to infer that defendant’s cell phone was involved in defendant’s effort to set up a rendezvous for setting sex with a minor, so the search warrant for the phone was issued on probable cause. Even so, the … Continue reading
How easy is it to link a cell phone to a crime to get a search warrant for it?
This is something I’ve been seeing more and more of: A co-conspirator’s cell phone is seized and another co-conspirator’s number is known to be on the phone. A search warrant issues for the other cell phone for its contacts, text … Continue reading
AK: Reconsideration of finding of no PC granted; def never really put lack of PC in issue
At issue was a seizure and then warranted search of defendant’s cell phone looking for an incriminating text message that was already seen by the police on the recipient’s cell phone. At the hearing, the Superior Court granted a motion … Continue reading
New law review article: Apple and the American Revolution: Remembering Why We Have the Fourth Amendment,
Clark D. Cunningham, Apple and the American Revolution: Remembering Why We Have the Fourth Amendment, 126 Yale L.J. Forum ___ (2016). Abstract: This essay provides a concise history of events prior to the Revolutionary War that led to the adoption … Continue reading
LA2: Even though LA doesn’t follow SCOTUS standing rules, def still had to show a privacy interest, and he didn’t have one in his murder victim’s cell phone
Defendant couldn’t challenge the search of his murder victim’s cell phone. While Louisiana doesn’t follow SCOTUS cases on standing, no privacy right of defendant was involved in her phone found at her feet when the police arrived at the crime … Continue reading
CA8: Plain view of cell phone screen supported seizure of phone
The 75 day delay in getting the IP address and a 51 day delay after associating the IP address with defendant in a child pornography search warrant case did not make the warrant stale. Defendant turned on his phone in … Continue reading
FL4: Password protected cell phone left in a stolen car still had a REP in its contents; that’s what the password means
Defendant juvenile left a cell phone in a stolen car, and it was password protected. The password protection “clearly indicat[ed] an intention to protect the privacy of all of the digital material on the cell phone or able to be … Continue reading
FL2: Order could issue to def to produce password for iPhone already seized by search warrant; compulsory testimony not the issue
Defendant was charged with video voyeurism using his iPhone, and it was seized by the police. The trial court erred in not compelling the defendant to produce the password to the iPhone. Probable cause was already established with the issuance … Continue reading
EFF: Law Enforcement Uses Border Search Exception as Fourth Amendment Loophole
EFF: Law Enforcement Uses Border Search Exception as Fourth Amendment Loophole by Sophia Cope:
Cal.: The good faith exception doesn’t save a cell phone search that wasn’t even valid before Riley in California
The good faith exception doesn’t save a cell phone search that wasn’t even valid before Riley in California. “In People v. Diaz (2011) 51 Cal.4th 84 (Diaz), we held that, incident to a custodial arrest, police may search through data … Continue reading
TX: REP in text messages and a SW required to extract them; death penalty conviction reversed
There is a reasonable expectation of privacy in text messages, and a search warrant on probable cause is required to search for and seize them. (The federal good faith exception is not applicable, and there is no state good faith … Continue reading
D.Me.: PC for trafficking drugs is PC for a SW for a cell phone found near the drugs
Defendant’s arrest for drugs in his car as a suspected drug dealer was probable cause for a search warrant for his cell phones found in the car. It was not stale when the warrant issued weeks later. United States v. … Continue reading
