{"id":8467,"date":"2013-03-08T09:39:26","date_gmt":"2013-03-08T07:34:36","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2013-03-08T07:34:36","slug":"en-US","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=8467","title":{"rendered":"M.D.Fla.: Good faith exception sustains search of new cell phone for 2005 child pornography"},"content":{"rendered":"<p>The natural tendency of child pornography collectors to keep it justified, at least under the good faith exception, a search of a nearly new smartphone for old evidence of child porn. Here, defendant admitted, in a conversation police were listening to, that he sexually abused a young man in 2005. When he was arrested, officers seized his phone and applied for a search warrant for, not only the recent call log, but the photographs on it. Child porn was found, and the warrant was sustained because there was a \u201cfair probability\u201d it could be there as a trophy. &#8220;The six-year period here stretches the permissible temporal boundaries,&#8221; but it&#8217;s still valid.  United States v. Mathis, 2013 U.S. Dist. LEXIS 31393 (M.D. Fla. February 19, 2013):<\/p>\n<p><!--more--><\/p>\n<blockquote><p>Mathis&#8217;s staleness argument is factually related to a premise of his Franks argument (the 2005 evidence could not be on the 2011 smartphone) and offered to support the applicability of Leon&#8217;s third exception (supra, making the warrant &#8220;so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable&#8221;). The staleness concept is just a commonsensical metric for evaluating probable cause in a search warrant application &#8230;<\/p>\n<p>Mathis recognizes as much because he presented a forensic analyst (Adam Sharp) to give an opinion about the migration of data from one cell phone platform to another. That expert opined that it was not likely that 2004-2005 data from Mathis&#8217;s old phone would be found on the seized smartphone because of the differences between their operating systems. Nonetheless, the analyst conceded that text messages could be transferred to other media sources and that contacts can be transferred on a SIM card. The government, in contrast, did not present an expert; however, Vizcarrondo&#8217;s supervisor testified that Vizcarrondo had conferred with an analyst within their agency before presenting the application.<\/p>\n<p>The six-year period here stretches the permissible temporal boundaries. As for Jiles&#8217;s text messages, I find that it exceeded the acceptable limits, although this finding is meaningless for probable cause purposes. As for Mathis&#8217;s contact list or photos, I find a fair probability existed to believe that Mathis could have entered Jiles&#8217;s name and personal data and those of the Orlando participants manually into his smartphone&#8217;s contact list. Such information and any photos associated with his victims or associates can amount to trophies for sexual offenders prone to children. United States v. Kaechele, 466 F.Supp.2d 868, 883-84 (E.D. Mich. 2006).<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=8467\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8467","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/8467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8467"}],"version-history":[{"count":0,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/8467\/revisions"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}