In the Supreme Court of the United States

Size: px
Start display at page:

Download "In the Supreme Court of the United States"

Transcription

1 No In the Supreme Court of the United States ALBERTA CAPINE v. Petitioner, UNITED STATES OF AMERICA Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE TWELFTH CIRCUIT BRIEF FOR PETITIONER Team 3 Attorneys for Petitioner

2 TABLE OF CONTENTS TABLE OF CONTENTS... i TABLE OF AUTHORITIES... ii QUESTIONS PRESENTED FOR REVIEW...1 OPINIONS BELOW...1 CONSTITUTIONAL PROVISIONS AND RULES...1 INTRODUCTION...2 Summary of Argument...2 Standard of Review...3 STATEMENT OF THE CASE...4 ARGUMENT...6 I. PETITIONER S FOURTH AMENDMENT RIGHTS WERE VIOLATED BECAUSE OFFICER MILLER LACKED VIRTUAL CERTAINTY WHEN HE EXCEEDED THE SCOPE OF THE PRIVATE SEARCH WITHOUT A WARRANT AND THE PETITIONER MAINTAINED A REASONABLE EXPECTATION OF PRIVACY IN HER LAPTOP...6 A. An Officer That Knowingly Exceeds The Scope Of A Private Search Without Virtual Certainty Violates The Fourth Amendment....6 B. A Citizen Has A Reasonable Expectation Of Privacy Beyond The Scope Of A Private Search When She Takes Steps To Preserve Her Privacy...11 II. PETITIONER IS NOT CRIMINALLY CULPABLE UNDER THE COMPUTER FRAUD AND ABUSE ACT BECAUSE SHE DID NOT EXCEED HER AUTHORIZED ACCESS BY POSSESSING WORK FILES ON HER LAPTOP...17 A. The Computer Fraud And Abuse Act Applies To Unauthorized Access Of A Computer, Not Unauthorized Use...18 B. A Narrowly Interpreted Computer Fraud And Abuse Act Advances Public Policy Against Individual Employers Determining Criminal Liability While Encouraging Overall Fairness...25 CONCLUSION...28 i

3 TABLE OF AUTHORITIES United States Supreme Court Asgrow Seed v. Winterboer, 513 U.S. 179 (1995)...18 Chevron, U.S.A., Inc. v. Nat. Res. Def. Council, Inc., 467 U.S. 837 (1984)...19 Connally v. General Constr. Co., 269 U.S. 385 (1926)...26 Coolidge v. New Hampshire, 403 U.S. 443 (1971)...6 Crandon v. United States, 494 U.S. 152 (1990)...23 Cuyler v. Sullivan, 466 U.S. 345 (1980)...3 Katz v. United States, 389 U.S. 347 (1967)...11 Kyllo v. United States, 533 U.S. 27 (2001)...11 Musacchio v. United States, No , 2016 WL (U.S. Jan. 25, 2016)...18 Riley v. California, 134 S. Ct (2014)...12, 27 Patton v. Yount, 467 U.S (1984)...3 United States v. Jacobsen, 466 U.S. 109 (1984)... passim United States v. Jones, 132 S.Ct. 945 (2012)...14 United States v. Lanier, 520 U.S. 259 (1997)...23 ii

4 United States v. Stevens, 559 U.S. 460 (2010)...27 United States v. Universal C.I.T. Credit Corp., 344 U.S. 218 (1952)...23 Walter v. United States, 447 U.S. 649 (1980)...6, 7 Wright v. West, 505 U.S. 277 (1992)...3 Circuit Courts Barton v. Adang, 162 F.3d 1140 (Fed. Cir. 1998)...3 DSI Assocs. LLC v. United States, 496 F.3d 175 (2d Cir. 2007)...3 E.F. Cultural Travel v. Explorica, 274 F.3d 577 (1st Cir. 2001)...19, 21 Int l Airport Ctrs., L.L.C. v. Citrin 440 F.3d 418 (7th Cir. 2006)...19, 21 LVRC Holdings LLC v. Brekka, 551 F.3d 1127 (9th Cir. 2009)...21 Rann v. Atchison, 689 F.3d 832 (7th Cir. 2012)... passim United States v. Carr, 513 F.3d 1164 (9th Cir. 2008)...21 United States v. Gifford, 17 F.3d 462 (1st Cir. 1994)...3 United States v. John, 597 F.3d 263 (5th Cir. 2010)...19, 21, 22 United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015)... passim United States v. Nosal, 676 F.3d 854 (9th Cir. 2012)...19, 25, 26, 27 iii

5 United States v. Oliver, 630 F.3d 397 (5th Cir. 2011)...11, 12, 14 United States v. Rodriguez, 628 F.3d 1258 (11th Cir. 2010)...19, 21, 22 United States v. Runyan, 275 F.3d 449 (5th Cir. 2001)...7, 12, 14, 15 United States v. Starr, 533 F.3d 985 (8th Cir. 2008)...7 United States v. Teague, 646 F.3d 1119 (8th Cir. 2011)...19, 21, 22 United States v. Valle, 807 F.3d 508 (2d Cir. 2015)...19 United States v. Walser, 275 F.3d 981 (10th Cir. 2001)...14 WEC Carolina Energy Sol. LLC v. Miller, 687 F.3d 199 (4th Cir. 2012)...19, 20 District Courts Advanced Fluid Sys., Inc. v. Huber, 28 F. Supp. 3d 306 (M.D. Pa. 2014)...19 Czech v. Wall Street on Demand, Inc., 674 F. Supp. 2d 1102 (D. Minn. 2009)...27 Diamond Power Int l, Inc. v. Davidson, 540 F. Supp. 2d 1322 (N.D. Ga. 2007)...18 Dresser-Rand Co. v. Jones, 957 F. Supp. 2d 1322 (E.D. Pa. 2013)...19, 21 Lewis-Burke Assoc., LLC v. Widder, 725 F. Supp. 2d 187 (D.D.C. 2010)...20 Sebrite Agency, Inc. v. Platt, 884 F. Supp. 2d 912 (D. Minn. 2012) United States v. Drew, 259 F.R.D. 449 (C.D. Ca. 2009)...22, 25, 26, 27 iv

6 Legislative Materials H.R. REP (1984) reprinted in 1978 U.S.C.C.A.N S.1030, 114th Cong. 2 (2015)...20 S. REP (1986), reprinted in 1986 U.S.C.C.A.N Other Authorities Benjamin Holley, Digitizing the Fourth Amendment: Limiting the Private Search Exception in Computer Investigations, 96 Va. L. Rev. 677 (2010)...13 BLACK S LAW DICTIONARY (10th ed. 2014)...18 FACEBOOK, Statement of Rights and Responsibilities, Safety, terms (last updated Jan. 30, 2015)...26 Federal Student Aid, (last visited Feb. 4, 2016)...22 GLOBAL WORKPLACE ANALYTICS, Latest Telecommuting Statistics, (last updated Sept. 29, 2015) Orin S. Kerr, Foreword: Accounting for Technological Change, 36 Harv. J.L. & Pub. Pol'y 403 (2013)...13 Ryan E. Dosh, The Computer Fraud and Abuse Act: As Conflict Rages On, The United States v. Nosal Ruling Provides Employers Clear Guidance, Loy. L.A. L. Rev. 902 (2014)...19 VIKTOR MAYER-SCHÖNBERGER, BIG DATA: A REVOLUTION THAT WILL TRANSFORM HOW WE LIVE, WORK, AND THINK (Kenneth Cukier ed., 2013)...13 YOUTUBE, Terms of Service, (last updated June 9, 2010)...25 v

7 QUESTIONS PRESENTED FOR REVIEW I. Under the Fourth Amendment, government agents may not recreate a search by a private individual exceeding the scope of that private search without a warrant. Ester Sundon, a private individual, searched three separate files on Petitioner s laptop. Sundon showed Officer Miller the three files she had searched. Subsequently, Officer Miller opened twenty-nine additional files before obtaining a warrant. Did Officer Miller violate Petitioner s Fourth Amendment rights by searching more computer files than the private party? II. An individual exceeds authorized access when obtaining information in which they are not entitled to access. Petitioner had access to her employer s computers. In addition, Petitioner had control over employee s access to customer financial information in the form of Word documents on her laptop. The Word documents were saved from a database in which Petitioner was authorized to access. Did Petitioner exceed her authorized access by saving the Word documents onto her laptop? OPINIONS BELOW The United States Court of Appeals for the Twelfth Circuit issued its opinion on April 11, The opinion appears on pages 2 12 of the record. The opinion was reported at 913 F.3d CONSTITUTIONAL PROVISIONS AND RULES This case involves the Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 1

8 U.S. Const. amend. IV. Additionally, this case involves the Computer Fraud and Abuse Act, in pertinent part: (a) Whoever (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains (A) Information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C et seq.); (B) information from any department or agency of the United States; or (C) information from any protected computer; 18 U.S.C. 1030(a)(2)(C)(emphasis added). INTRODUCTION Summary Of Argument: I. When Officer Miller knowingly searched more files on Petitioner s laptop than the private party, he exceeded the scope of the private search in violation of the Fourth Amendment. Additionally, Petitioner had enabled a password on her laptop and informed her roommate she could not use her laptop. Because Petitioner took these affirmative steps to keep her laptop safe from prying eyes, Petitioner maintained a reasonable expectation of privacy in the files not searched by the private party. Petitioner s laptop, unlike a traditional closed container, has the capacity to contain millions of pages of text and pictures. Consequently, the closed container doctrine should be limited to individual documents/files searched by a private party, instead of an entire computer or folder. Therefore, Officer Miller s methodical search of the twenty-nine files not searched by the private party was a profound violation of Petitioner s reasonable expectation of privacy. 2

9 II. Congress intended the Computer Fraud and Abuse Act ( CFAA ) to apply only to unauthorized access by outside hackers. Overlooking this intent, some courts have improperly expanded the CFAA to include employees who use information in conflict with either their employer s best interests or a company policy and/or confidentiality agreement. Realizing the policy implications in allowing private employers to dictate criminal conduct, a majority of courts follow Congressional intent finding an individual exceeds authorized access when she bypasses authorization given to them by their employer. Because there exists a split of authority regarding the application of the CFAA, the rule of lenity encourages this Court to apply the least restrictive application of the statute, which in this case is the majority view. Here, Petitioner was authorized to access the Word documents on her laptop and never obtained information outside the authorization given to her by her employer. Therefore, Petitioner did not exceed authorized access under the CFAA. Standard Of Review: In reviewing the Twelfth Circuits order to deny the suppression of evidence, this Court considers conclusions of law and application of the law to the facts de novo. See Wright v. West, 505 U.S. 277, (1992); Patton v. Yount, 467 U.S. 1025, 1038 (1984); Cuyler v. Sullivan, 466 U.S. 345, 342 (1980). Furthermore, because an interpretation of a statute or regulation presents a purely legal question, this Court considers the interpretation of the Computer Fraud and Abuse Act de novo. See DSI Assocs. LLC v. United States, 496 F.3d 175, 183 (2d Cir. 2007); Barton v. Adang, 162 F.3d 1140, 1144 (Fed. Cir. 1998); United States v. Gifford, 17 F.3d 462, 472 (1st Cir. 1994). 3

10 STATEMENT OF CASE Alberta Capine ( Petitioner ) was a small claims supervisor at Find Funds, Inc. ( FFI ), a local debt collections agency. (R. at 2). Petitioner had significant responsibilities over both the computers at the agency and the employees access to financial information databases, including a database named Sureinf.com. (R. at 2). FFI did not authorize employees to use computer resources for personal purposes. (R. at 2). Petitioner lived and worked with Ester Sundon ( Sundon ). (R. at 2). On September 23, after Sundon s laptop broke down, she asked Petitioner if she could use her laptop and Petitioner refused. (R. at 2). Despite Petitioner s refusal, Sundon later accessed Petitioner s laptop by using her password, which she discovered after observing Petitioner log in on a previous date. (R. at 2). After Sundon logged in, she saw a folder labeled transaction history, which contained a list of sixteen Word documents and sixteen Excel spreadsheets, for a total of thirty-two files. (R. at 2). The Word documents and Excel spreadsheets appeared to be in pairs sharing a common name with each corresponding file. (R. at 2). For example, some Excel spreadsheets read: LitlAl.xlsx, BigJim.xlsx, JoeBro.xlsx, etc. (R. at 2). Whereas, some of the Word documents read: LitlAl.pdf, BigJim.pdf, JoeBro.pdf, etc. (R. at 2-3). Sundon clicked on the first Excel spreadsheet within the folder. (R. at 2). The spreadsheet included a chart which appeared to show a series of transactions involving controlled substances. (R. at 3). Each transaction included dates, dollar amounts, and quantities of marijuana, methamphetamine, and various controlled substances. (R. at 3). Sundon clicked on two more Excel spreadsheets and found similar charts showing the same content. (R. at 3). Sundon viewed only three Excel spreadsheets out of the sixteen. (R. at 3). Without viewing the thirteen 4

11 remaining Excel spreadsheets or any of the sixteen Word documents, Sundon called the police. (R. at 3). Officer Miller arrived at the scene. (R. at 3). Once there, Officer Miller asked Sundon to show him the three Excel spreadsheets she had opened; Sundon complied. (R. at 3). Subsequently, Officer Miller accessed Petitioner s laptop himself and made copies of all thirtytwo files within the folder and saved them to a flash drive. (R. at 3). After saving the files, Officer Miller methodically went through each spreadsheet and each document. (R. at 3). All sixteen Excel spreadsheets contained apparent dealings in illicit substances. (R. at 3). In contrast, the Word documents contained private data of customers from FFI, including names, addresses, social security numbers, dates of birth, telephone numbers, family connections, employment and credit information (including bank accounts and credit accounts). (R. at 3). This information was saved from a database (Surinf.com), which was used by both Petitioner and Petitioner s employer. (R. at 2, 3). After viewing all thirty-two files within the folder, Officer Miller confiscated the laptop and obtained a warrant. (R. at 3). During the subsequent investigation, law enforcement discovered the Word documents had been accessed using Petitioner s employee username and password given to her by FFI. (R. at 3). Petitioner was convicted of multiple counts of drug trafficking, attempted identity theft, and violation of 18 U.S.C. 1030(a)(2)(C) of the Computer Fraud and Abuse Act. (R. at 3). Prior to her trial in the United States District Court for the District of Origania, Petitioner moved on Fourth Amendment grounds to exclude all Excel spreadsheets and Word documents her roommate had not viewed. (R. at 3). The District Court denied Petitioner s motion based on the private search doctrine and all the Excel spreadsheets and Word documents were admitted as evidence. (R. at 3). 5

12 Petitioner was subsequently convicted on all counts and appealed her case to the United States Court of Appeals for the Twelfth Circuit. (R. at 3). The Twelfth Circuit affirmed the denial of Petitioner s pre-trial motion to exclude evidence. (R. at 8). This Court granted certiorari. (R. at 1). ARGUMENT I. PETITIONER S FOURTH AMENDMENT RIGHTS WERE VIOLATED BECAUSE OFFICER MILLER LACKED VIRTUAL CERTAINTY WHEN HE EXCEEDED THE SCOPE OF THE PRIVATE SEARCH WITHOUT A WARRANT AND THE PETITIONER MAINTAINED A REASONABLE EXPECTATION OF PRIVACY IN HER LAPTOP. Technology is moving fast and the law has not caught up. This case exemplifies why the current state of the private search and container doctrines are ill suited for the technological age. A. An Officer That Knowingly Exceeds The Scope Of A Private Search Without Virtual Certainty Violates The Fourth Amendment. The Fourth Amendment provides, the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, and no warrant shall issue but upon probable cause by Oath or affirmation.... U.S. Const. amend. IV. Warrantless searches are per se unreasonable under the Fourth Amendment subject only to a few specifically established and well-delineated exceptions. Coolidge v. New Hampshire, 403 U.S. 443, 481 (1971). While the Fourth Amendment protects individuals from unreasonable governmental intrusion, this Court has, consistently found the Fourth Amendment is, 'wholly inapplicable to a search or seizure... effected by a private individual not acting as an agent of the government or with the participation or knowledge of any governmental official. United States v. Jacobsen, 466 U.S. 109, 113 (1984) (quoting Walter v. United States, 447 U.S. 649, 662 (1980)). 6

13 When a private party conducts a search with no government influence and reveals to the government the incriminating contents of their search, the government may only look at what the private party viewed without a warrant. See Jacobsen, 466 U.S. at 114; Walter, 447 U.S. at 657. The only time the government may exceed a private search is when, it has a right to make an independent search. Walter, 447 U.S. at 657; see also United States v. Starr, 533 F.3d 985, 995 (8th Cir. 2008). The closed container doctrine allows the government to view more contents in a physical container than the previous private search without enacting a defendant s Fourth Amendment rights. See United States v. Runyan, 275 F.3d 449, 464 (5th Cir. 2001). For the closed container doctrine to apply, the government must be able to, demonstrate to a reviewing court that an exception to the exclusionary rule is warranted because they were [virtually] certain of the contents of the container before they opened it. Runyan, 275 F.3d at 464; see also Jacobsen, 466 U.S. at 119. The virtual certainty requirement ensures the government does not violate more of an individual s expectation of privacy, than did the private search. See Runyan, 275 F.3d at 463. In determining whether the government is virtually certain contents beyond the private search will reveal contraband, courts consider: [1] the statements of the private searchers, [2] [government s] replication of the private search, and [3] their expertise. Runyan, 275 F.3d at 463; see also United States v. Lichtenberger, 786 F.3d 478, 489 (6th Cir. 2015); Rann v. Atchison, 689 F.3d 832, (7th Cir. 2012). This Court considered the scope of the private search doctrine in 1981, when a Federal Express ( FedEx ) employee looked at a package damaged by a forklift. See Jacobsen, 466 U.S. at 111. The container was a cardboard box. Id. When the FedEx employee opened the box he 7

14 saw crumpled newspaper covering a tube about ten inches long wrapped in duct tape. Id. The FedEx employee cut open one of the tubes and found four Ziploc bags. Id. The outermost bag contained the other three bags and the innermost bag contained approximately six and a half ounces of white powder. Id. The employee notified the Drug Enforcement Administration ( DEA ) and put the Ziploc bags back in the tube and the tube back into the box. Id. The employees never opened any of the Ziploc bags. Id. When the DEA agents arrived, they inspected the tube searched by the FedEx employee. Id. The agents used the end of a knife, cut through the Ziploc bags and conducted a field test of the white powdery substance. Id. The field test revealed the substance was cocaine. Id. Although the DEA s search went beyond the scope of the private search, this Court held under those circumstances, the package could no longer support any expectation of privacy and was therefore not a search within the meaning of the Fourth Amendment. Id. at 120. This Court stated, the removal of the plastic bags from the tube and the agent s visual inspection of their contents enabled the agent to learn nothing that had not previously been learned during the private search. Id. at 120. The Court further explained, [t]he agents had already learned a great deal about the contents of the package from the [FedEx] employees, all of which was consistent with what they could see. Id. at 121. Lastly, the Court reasoned, the suspicious nature of the material made it virtually certain that the substance... was in fact contraband. Id. at 124. Over thirty years later the Sixth Circuit considered the scope of a private search involving a laptop computer. See Lichtenberger, 786 F.3d at 478. In Lichtenberger, defendant was arrested for failing to register as a sex offender. Id. at 480. Later that day, defendant s girlfriend accessed defendant s password protected laptop by hacking into it. Id. Once on the laptop, defendant s 8

15 girlfriend viewed approximately one hundred images of child pornography in several subfolders titled, private. Id. Upon arrival, the police asked the girlfriend to show them what she had discovered. Id. She opened several folders and began clicking random images. Id. At trial, defendant s girlfriend stated she showed the officers some images she was not sure were among her original search. Id. The girlfriend further stated the defendant, would never let [her] use [his laptop] or be near him when he was using it. Id. In its analysis, the Sixth Circuit declared the officer needed to obtain a warrant reasoning, the need to confirm the laptop s contents on-site was not immediate... [and] the laptop presented no cognizable, immediate threat to [the officer s]. Id. at 491. The court further made a distinction when dealing with electronic media, considering the extent of the information that can be stored on a laptop computer... the virtual certainty threshold in Jacobsen requires more when dealing with a laptop. Id. at 488. The court held, in light of the information available at the time the search was conducted, the strong privacy interests at stake, and the absence of a threat to government interests the warrantless review of the laptop unconstitutionally exceeded the scope of the private search. Id. Here, Officer Miller lacked virtual certainty the files not searched by Petitioner s roommate, Ester Sundon, would contain evidence of dealings in illicit substances. The record is silent as to whether Sundon had ever previously been on Petitioner s laptop or was at all familiar with it. After logging onto Petitioner s laptop, presumably for the first time, Sundon only clicked on three separate Excel spreadsheets and saw, what appeared to [be] a series of transactions involving controlled substances. (R. at 3)(emphasis added). Sundon never clicked on any of the remaining twenty-nine files in the folder. 9

16 Unlike Jacobsen, Officer Miller could not have been virtually certain about the contents of the twenty-nine remaining files on Petitioner s laptop. The only information Officer Miller received prior to looking at the files was from Sundon, who he knew had not looked at the remaining twenty-nine files. (R. at 3). Further, there is no indication in the record Officer Miller questioned Sundon about previously accessing Petitioner s laptop. Sundon was never questioned about noticing anything suspicious about Petitioner suggesting she was selling or using drugs. Lastly, there is no indication Sundon was questioned regarding whether Petitioner associated with suspicious individuals. In contrast to Jacobsen, illicit substances written onto an Excel spreadsheet with names and dollar amounts are not indicative of illegal contraband the same way a white powdery substance in a Ziploc bag is. Anyone with access to Petitioner s laptop for a matter of minutes could transcribe a list of apparent transactions in illicit substances. Such content, with other incriminating evidence, may be indicative of a crime, but it is far from constituting virtual certainty the remaining twenty-nine files will contain the same content. Officer Miller s lack of virtual certainty is further exemplified after he methodically reviewed all thirty-two files beyond the three spreadsheets reviewed by Sundon. (R. at 3)(emphasis added). In doing so, Officer Miller discovered the files did not all contain the same material. The Word documents contained private data from apparent customers and not any apparent transactions of illicit substances. (R. at 3). Furthermore, and similar to Lichtenberger, the need to confirm the content in the remaining twenty-nine unopened files was not immediate and Petitioner s laptop presented no reasonable identifiable threat to Officer Miller or his investigation. Officer Miller had already made copies of the thirty-two documents and was told by Sundon which files she specifically searched. (R. at 10

17 3). Overall, there was no need for Officer Miller to continue the search of Petitioner s laptop without a warrant. Officer Miller lacked virtual certainty when he examined the remaining twenty-nine files not searched by Sundon. Furthermore, Officer Miller knowingly viewed more files on Petitioner s laptop than Sundon s private search, thereby exceeding the scope of the private search and infringing on Petitioner s Fourth Amendment rights. As a result, the contents of the twenty-nine files not searched by Sundon should be suppressed as the fruits of a warrantless search. B. A Citizen Has A Reasonable Expectation Of Privacy Beyond The Scope Of A Private Search When She Takes Steps To Preserve Her Privacy. One way a Fourth Amendment search occurs is when the government intrudes on a legitimate expectation of privacy. See Jacobsen, 466 U.S. at 113. It is long established that a violation of an individual s reasonable expectation of privacy occurs when a warrantless search is conducted and an individual: (1) subjectively exhibits an expectation of privacy in the places, containers, or effects searched; and (2) society objectively recognizes that expectation of privacy as reasonable. See Kyllo v. United States, 533 U.S. 27, 34 (2001); see also Katz v. United States, 389 U.S. 347, 361 (1967). The reasonableness of an invasion of a citizen s privacy, must be appraised on the basis of the facts as they existed at the time that invasion occurred. Jacobsen, 466 U.S. at 115. The Fifth and Seventh Circuits have indicated an individual can maintain a reasonable expectation of privacy in an area or container even after a private search. See United States v. Oliver, 630 F.3d 397, 407 (5th Cir. 2011) cert. denied, 132 S.Ct. 758 (2011); Atchison, 689 F.3d at Both courts noted, [a] defendant s expectation of privacy with respect to an item unopened by the private searcher is preserved... unless the defendant s expectation of privacy in the contents of the container has already been frustrated because the contents were rendered 11

18 [virtually certain] by the private search. Oliver, 630 F.3d at 406; see also Runyan, 275 F.3d at In determining if a defendant s reasonable expectation of privacy can survive a private search, consideration must be given to whether the activities of the home s occupants or the circumstances within the home at the time of the private search created a risk of intrusion by the private party that was reasonably foreseeable. Oliver, 630 F.3d at 406 (citations omitted) (emphasis in original). If a private party s initial intrusion was not reasonably foreseeable, the occupant s reasonable expectation of privacy will survive, and the subsequent police search will indeed activate the Fourth Amendment. Id. at Any additional invasion of [Petitioner s] privacy by the government agent must be tested by the degree to which [the government] exceeded the scope of the private search. Jacobson, 466 U.S. at 115. In examining a reasonable expectation of privacy in present times, one cannot forgo discussing the emergence and vast expansion of data storage in modern technology, specifically personal computers or laptops. In regards to cell phones, this Court recently noted: [An] intrusion on privacy is not physically limited in the same way when it comes to cell phones. The current top-selling smart phone has a standard capacity of 16 gigabytes (and is available with up to 64 gigabytes). Sixteen gigabytes translates to millions of pages of text, thousands of pictures or hundreds of videos. Riley v. California, 134 S. Ct. 2473, 2489 (2014). This Court further elaborated, many [cell phones] are in fact minicomputers... They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers. Id.; see also Lichtenberger, 786 F.3d at 488 (a computer is a device with even greater capacity than the cell phones at issue in Riley ). 12

19 Just as cellphones have evolved into minicomputers, computers themselves have also evolved. In 1986, only three years after Jacobsen, around 40 percent of the world s general purpose computing power took the form of pocket calculators, which represented more processing power than all personal computers at the time. VIKTOR MAYER-SCHÖNBERGER, BIG DATA: A REVOLUTION THAT WILL TRANSFORM HOW WE LIVE, WORK, AND THINK, 9 (Kenneth Cukier ed., 2013). From 1986 to present day, the processing power and storage capacity of personal computers have vastly increased: As recently as the year 2000, only a quarter of the stored information in the world was digital. The other three quarters were on paper, film, vinyl LP records, magnetic cassette tapes and the like... [In] 2013 the amount of stored information in the world [was] estimated to be around 1,200 exabytes, of which less than 2 percent [was] non-digital... [If this] were all printed in books, they would cover the entire surface of the United States 52 layers thick. If it were placed on CD-ROMs and stacked up, they would stretch to the moon in 5 separate piles... Things are really speeding up. The amount of stored information grows four times faster than the world economy, while the processing power of computers grows nine times faster. Id. The record does not indicate what kind of laptop Petitioner owned. However, the storage capacity of modern personal computers in 2010, six years ago, [was] equal to approximately eighty million pages of text, with capacity doubling approximately every two years. Benjamin Holley, Digitizing the Fourth Amendment: Limiting the Private Search Exception in Computer Investigations, 96 Va. L. Rev. 677, 682 (2010)(emphasis added). Imagine how computer technologies will work in five, ten, or fifty years. Over time, advancing technology will cause the digital to seem more and more different from the physical. The need for different rules governing digital devices eventually will seem obvious. Orin S. Kerr, Foreword: Accounting for Technological Change, 36 Harv. J.L. & Pub. Pol'y 403, (2013). 13

20 The idea computers are different than traditional physical closed containers is not a new concept in American jurisprudence. Fifteen years ago, the Tenth Circuit noted: [There are] particular Fourth Amendment issues surrounding the search and seizure of computer equipment. The advent of the electronic age... the development of desktop computers that are able to hold the equivalent of a library's worth of information, go beyond the established categories of constitutional doctrine. Analogies to other physical objects, such as dressers or file cabinets, do not often inform the situations we now face as judges when applying search and seizure law. United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001); see also United States v. Jones, 132 S.Ct. 945, 954 (2012)(Sotomayor, J., concurring)( [it] may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the digital age ); Lichtenberger, 786 F.3d at 488 ( [t]he search of a laptop is far more intrusive than the search of a container because the two objects are not alike... [g]iven the amount of a data a laptop can hold ). Currently, the circuit courts are split on how a reasonable expectation of privacy and the closed container doctrine applies to computers and other electronic data. See Lichtenberger, 786 F.3d at 491; Contra Runyan, 275 F.3d at 465; Atchison, 689 F.3d at 837; see also Oliver, 630 F.3d at 407 (the initial private search was reasonably foreseeable and the searcher s act of voluntarily giving the authorities the box containing a laptop, maintained no reasonable expectation of privacy and rendered the subsequent police search permissible). In Runyan, defendant s estranged wife broke into his home and retrieved several computer disks. 275 F.3d at 453. Defendant s wife and her friends discovered the disks contained images of child pornography, contacted the police, and turned over the disks. Id. In the following weeks, defendant s wife provided additional disks to the police. Id. During the ensuing investigation, the police copied all the materials they received onto blank CDs and then examined several images from each disk, including disks neither defendant s wife nor her friends 14

21 had viewed. Id. Relying on this information, the police obtained two search warrants, one to search all the disks for illicit images and one to search defendants house for any computer devices. Id. The Fifth Circuit applied the closed container analogy regarding the individual disks as the relevant containers. Id. at 461. The court determined, the police do not exceed the scope of a prior private search when they examine the same materials that were examined by the private searchers, but they examine these materials more thoroughly than did the private parties. Id. at 464. The court went on to state, in the context of a closed container search, this means that the police do not exceed the private search when they examine more items within a closed container than did the private searchers. Id. The court held government searches of the disks the wife had viewed were acceptable, while searches of disks she had not viewed were not acceptable. Id. In Atchison, defendant s daughter, who was fifteen-years-old, reported to the police she had been sexually assaulted by defendant and he had taken pornographic pictures of her. 689 F.3d at 834. Following a police interview, the daughter returned home and, under no instruction from the police, retrieved a digital camera memory card on top of a television in defendant s room; she then took the memory card to the police. Id. Later, the victim s mother compiled a zip drive and brought it to the police. Id. Images downloaded from the memory card and zip drive depicted defendant sexually assaulting his daughter. Id. Defendant contended when the police searched the digital storage devices and viewed the images on them, they exceeded the scope of the private search. Id. at 836. Relying on Runyan, the Seventh Circuit noted, if the police more thoroughly searched the digital media devices than [the victim] and her mother did and viewed the images [the victim] or her mother had not viewed... the police search did not exceed or expand the scope of 15

22 the initial private searches. Id. at 838. The court reasoned, because [the victim] and her mother knew the contents of the digital media devices when they delivered them to the police, the police were [virtually] certain the devices contained child pornography. Id. Here, unlike Runyan and Atchison, the private search involved an entire laptop computer capable of containing a libraries worth of information, not a CD or memory card. The storage capacity differences between a memory card and CD versus an entire laptop are significant. The Runyan and Atchison courts reasoned the police simply examined the memory card or CD more thoroughly than did the private party. If this applied to laptop computers, a private searcher could click on one document on a person s computer and supply the government with an astronomical amount of data unrelated to their search. Furthermore, in Atchison, the victim grabbed the memory card off a television set. The defendant had taken zero precautions to hide the memory card from prying eyes; also the victim s mother knew exactly what was on the zip drive she later gave to the police because she compiled it herself. Here, Petitioner verbally told Sundon she could not use her laptop and also took extra precautions to protect her laptop from prying eyes by enabling a password. (R. at 2). Because of these precautionary steps taken by Petitioner, Sundon s intrusion onto Petitioner s laptop was not reasonably foreseeable. Therefore, Petitioner maintained a reasonable expectation of privacy in all files on her laptop not searched by Sundon. This violation of Petitioner s expectation of privacy was made worse because Sundon showed and told Officer Miller she viewed only three files. (R. at 3). When Officer Miller viewed the remaining twenty-nine files he was fully aware Sundon had not looked at those files. Given the vast storage capacity and types of content modern computers contain, it was 16

23 impossible for Officer Miller to be virtually certain of what he would find on the remaining twenty-nine files. It is undisputed computer technology is increasing at a rapid pace, making computers categorically distinct from a traditional physical container. Similar to the automobile exception, and more recently the warrant requirement to search a cell phone incident to arrest, new technologies require specific legal rules. Limiting the container doctrine to individual documents within a computer searched by the private party effectively upholds the fundamental tenants of Fourth Amendment protections, while allowing the government to investigate and prosecute crime. The warrant requirement of the Fourth Amendment is an important working part of our philosophy and government and is not meant to be an inconvenience, but rather a protection of individual freedoms. Here, Petitioner s reasonable expectation of privacy was violated when Officer Miller looked at twenty-nine files on her laptop computer, capable of containing every private detail of her life, without a warrant. II. PETITIONER IS NOT CRIMINALLY CULPABLE UNDER THE COMPUTER FRAUD AND ABUSE ACT BECAUSE SHE DID NOT EXCEED HER AUTHORIZED ACCESS BY POSSESSING WORK FILES ON HER LAPTOP. Congress established the Computer Fraud and Abuse Act ( CFAA ) to combat unauthorized access by hackers, not unauthorized use by employees. Courts were established to interpret legislation, not to legislate themselves. Many courts have failed to understand this fundamental purpose by improperly expanding the CFAA to try and remedy other issues unrelated to the statute s purpose. 17

24 A. The Computer Fraud And Abuse Act Applies To Unauthorized Access Of A Computer, Not Unauthorized Use. Under the CFAA, it is a federal crime for an individual to either, intentionally access a computer without authorization or to exceed authorized access, and thereby obtains information from any protected computer. 18 U.S.C. 1030(a)(2)(C); see also Musacchio v. United States, No , 2016 WL , at *1 (U.S. Jan. 25, 2016) (This Court finds a violation of the CFAA to include two separate crimes). The CFAA states, the term exceeds authorized access means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accessor is not entitled... to obtain or alter. 18 U.S.C. 1030(e)(6). 1 Although the phrase, exceeds authorized access is defined within the statute, the term authorization is undefined giving many courts issues with the statute s scope. Because the term authorization is not defined within the CFAA, this Court gives such phrases their ordinary meaning as defined by a standard dictionary. See Asgrow Seed v. Winterboer, 513 U.S. 179, 187 (1995). Authorization is defined as the, official permission to do something. BLACK S LAW DICTIONARY 159 (10th ed. 2014). Applying this definition, courts have explained, a violation [of the statute] does not depend upon the defendant s unauthorized use of information, but rather upon the defendant s unauthorized use of access. Diamond Power Int l, Inc. v. Davidson, 540 F. Supp. 2d 1322, 1343 (N.D. Ga. 2007)(emphasis in original). Because there is ambiguity surrounding this phrase, courts have applied three different approaches to define exceeds authorized access: (1) agency-based authorization; (2) contract- 1 The call of the question is limited to whether Petitioner exceeded authorized computer access in violation of 18 U.S.C. 1030(a)(2)(C) of the Computer Fraud and Abuse Act. (R. at 1). Therefore, the discussion is limited to whether Petitioner exceeded her authorized access, not to whether she accessed the information without authorization. 18

25 based authorization; and (3) code-based authorization. See Dresser-Rand Co. v. Jones, 957 F. Supp. 2d 610, 616 (E.D. Pa. 2013). First, agency-based authorization states an employee, exceeds authorized access by misusing information adverse to their employer s interests. See Int l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, (7th Cir. 2006). This terminates the agency relationship and the authorization given to the employee by the employer Id. Second, contract-based authorization states an individual, exceeds authorized access if there existed either a company policy and/or a confidentiality agreement which barred the use of the information in question. See United States v. Teague, 646 F.3d 1119, 1122 (8th Cir. 2011); United States v. John, 597 F.3d 263, 272 (5th Cir. 2010); United States. v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010); EF Cultural Travel Bv v. Explorica, 274 F.3d 577, 583 (1st Cir. 2001). Thirdly, code-based authorization finds an individual criminally culpable if she accesses information she is not authorized to access. See WEC Carolina Energy Sol., LLC v. Miller, 687 F.3d 199, 206 (4th Cir. 2012); United States. v. Nosal, 676 F.3d 854, (9th Cir. 2012). Academics have referred to the agency and contract-based approaches as the broad view, whereas the code-based approach is commonly known as the narrow view. See Ryan E. Dosh, The Computer Fraud and Abuse Act: As Conflict Rages On, The United States v. Nosal Ruling Provides Employers Clear Guidance, Loy. L.A. L. Rev. 901, 902 (2014). As of today, a majority of courts have applied the narrow view because it adheres more to the legislative intent of Congress. See United States v. Valle, 807 F.3d 508, 528 (2d Cir. 2015); Advanced Fluid Sys., Inc. v. Huber, 28 F. Supp. 3d 306, 329 (M.D. Pa. 2014); Sebrite Agency, Inc. v. Platt, 884 F. 19

26 Supp. 2d 912, (D. Minn. 2012); Lewis-Burke Assoc., LLC v. Widder, 725 F. Supp. 2d 187, 193 (D.D.C. 2010); et al. This Court should follow Congressional intent and apply the narrow view. See Chevron, U.S.A., Inc. v. Nat. Res. Def. Council, Inc., 467 U.S. 837, (1984). The CFAA was originally intended to give the government greater ability to prosecute computer crimes against hackers who accessed and stole information from other computers. See H.R. REP , at 10 (1984) reprinted in 1978 U.S.C.C.A.N. 3689, The 1984 House Committee found criminally culpable conduct under the CFAA is comparable to, that of breaking and entering. Id. at 20. Currently, Congress is amending the CFAA to apply the narrow view. See S.1030, 114th Cong. 2 (2015) 2. The proposed amendment would strike out the phrase, exceeds authorized access and replace it with the phrase, access without authorization. Id. Furthermore, the proposed amendment would define, access without authorization as, obtain[ing] information on a protected computer; that the accesser lacks authorization to obtain; and by knowingly circumventing one or more technological or physical measures that are designed to exclude or prevent unauthorized individuals from obtaining that information. Id. Applying Congressional intent, the Fourth Circuit applied the narrow view to the CFAA. See Miller, 687 F.3d at 199 (4th Cir. 2012). In Miller, before resigning, defendant downloaded confidential information from WEC s database and proceeded to give it to his new employer. Id. at 201. WEC had a policy prohibiting employees from downloading confidential information to a personal computer. Id. at 202. The court chose to find the defendant not criminally culpable 2 Full name of proposed bill is Clarifying that Access Without Authorization Under Section 1030 of Title 18, United States Code, Means Circumvention of Technological Barriers in Order to Gain Unauthorized Access. 20

27 under the CFAA, even though the employer had policies prohibiting defendant s use of the information. Id. at 207. The court applied the narrow view because other civil remedies were made available to employers whose policies were violated. Id. The court concluded while defendants may have misappropriated information, they did not exceed their authorized access. Id. Alternatively, the broad view, or agency theory of authorization, expands the scope of the CFAA to include unauthorized use. Although the Seventh Circuit has applied the agency theory of authorization, all other courts have rejected this theory. See Citrin, 440 F.3d at ; see also Dresser-Rand, 957 F. Supp. 2d at 619. This Court should follow suit and reject the agency theory of authorization because no employee would know a breach of fiduciary duty to an employer would constitute a federal crime under the CFAA. See LVRC Holdings LLC, v. Brekka, 581 F.3d 1127, 1135 (9th Cir. 2009) (citing United States v. Carr, 513 F.3d 1164, 1168 (9th Cir. 2008)). In contrast, four circuits have adopted the broad view, or contract-based theory of authorization, by applying the CFAA to employer use policies and confidentiality agreements. See Teague, 646 F.3d at 1122; Rodriguez, 628 F.3d at 1260; EF Cultural Travel BV, 274 F.3d at (employees exceed authorized access when they use information in violation of either an employer policy or a confidentiality agreement); John, 597 F.3d at (use of authorized information to commit a crime is prohibited under the CFAA). Within these four circuits, the First, Eighth, and Eleventh Circuits focused on whether there existed either company policies or confidentiality agreements prohibiting certain use by an employee. See Teague, 646 F.3d at 1122; Rodriguez, 628 F.3d at 1263; EF Cultural Travel BV, 274 F.3d at

28 The First Circuit concluded because EF Cultural a private company enacted a broad confidentiality agreement, which covered defendant s actions, there was no need to consider the meaning behind the phrase, exceeds authorized access. See EF Cultural Travel BV, 274 F.3d at 579, Here, the issue revolves around the meaning of exceeds authorized access. Therefore, the First Circuit s holding should be deemed unpersuasive by this Court. The Eighth and Eleventh Circuits found criminal culpability when an employee in violation of government policies used government data for personal use. See Teague, 646 F.3d at 1122; Rodriguez, 628 F.3d at This is distinguishable from EF Cultural because both employees were accessing information through government databases, not from a private company. See Teague, 646 F.3d at 1121; Rodriguez, 628 F.3d at 1260; S. REP , at 3 (1986), reprinted in 1986 U.S.C.C.A.N. 2479, 2481 (The CFAA was originally directed at protecting classified information on government computers). In addition, employers in both Teague and Rodriguez, gave their employees actual notice about the possibility of criminal penalties through the unauthorized use of information. See Teague, 646 F.3d at ; Rodriguez, 628 F.3d at 1260; United States v. Drew, 259 F.R.D. 449, 464 (C.D. Ca. 2009) (notice of criminal culpability is required under the CFAA because, while ordinary people might expect to be exposed to civil liabilities for violating a contractual provision, they would not expect criminal penalties ). In the Fifth Circuit, the government showed the defendant s employer not only had an official policy barring use of information, but also showed defendant attended training programs reiterating this same policy. See John, 597 F.3d at 272. Further, the government was able to 3 Teague had access to the National Student Loan Data System (NSLDS). On the NSLDS website, it states, This is a U.S. Federal Government owned computer system for the use by authorized users only. Unauthorized access violates Title 18, U.S. Code Section Federal Student Aid, (last visited Feb. 4, 2016). 22

29 sufficiently link the accessed information to the fraud against its customers. Id. Therefore, the Fifth Circuit concluded a defendant exceeded authorized access when she used confidential information to perpetuate a crime. Id. Even if this Court determines the phrase, exceeds authorized access is ambiguous, the rule of lenity supports the application of the narrow view. The rule of lenity provides, when ambiguity exists within a criminal statute any ambiguity goes against the government and instead favors the defendant. See Crandon v. United States, 494 U.S. 152, 168 (1990). Under the rule of lenity, this Court should still find the phrase, exceeds authorized access applies to unauthorized access, not unauthorized use. This Court has reiterated Congress sets the boundaries of criminal conduct, not the courts. Id. at 158. When a choice has to be made between two interpretations of what Congress has made a crime, it is imperative for the courts to apply the least severe punishment and require Congress to speak clearly on criminal conduct. See United States v. Universal C.I.T. Credit Corp., 344 U.S. 218, (1952). Without the rule of lenity, Due Process would be frustrated because individuals would be wrongly prosecuted for crimes they did not know existed. See United States v. Lanier, 520 U.S. 259, 266 (1997) ( [D]ue [P]rocess bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope ). By applying the rule of lenity, the narrow view is appropriate. Here, Petitioner did not exceed authorization given to her by her employer. Although Find Funds, Inc. ( FFI ), a private employer, prohibited employees from using its computers for personal purposes, the record is silent as to whether Petitioner was put on notice of this policy. Disregarding this fact, the Twelfth Circuit applied the Seventh s Circuit s agency theory of authorization finding Petitioner culpable 23

No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent.

No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES 2016 ALBERTA CAPINE, Petitioner. v. UNITED STATES, Respondent. On Argument to the United States Supreme Court from Judgment Entered by the Twelfth

More information

No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, UNITED STATES OF AMERICA, Respondent.

No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, UNITED STATES OF AMERICA, Respondent. No. 10-1011 In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, v. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari To The United States Court of Appeals For The Twelfth Circuit

More information

Supreme Court of the United States

Supreme Court of the United States Case No. 10-1011 IN THE Supreme Court of the United States April Term, 2016 ALBERTA CAPINE, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals

More information

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES v. LICHTENBERGER Abstract: In 2015 in United States v. Lichtenberger,

More information

Digitizing the Private Search Doctrine: Is a Computer a Container?

Digitizing the Private Search Doctrine: Is a Computer a Container? Digitizing the Private Search Doctrine: Is a Computer a Container? by TAYLOR J. PFINGST* Introduction The digital era has ushered in a new age, where the technology of today is almost instantaneously surpassed

More information

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception?

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception? Catholic University Law Review Volume 66 Issue 2 Winter 2016 Article 9 3-23-2017 The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or

More information

SUPREME COURT OF THE UNITED STATES OF AMERICA

SUPREME COURT OF THE UNITED STATES OF AMERICA DOCKET NO. 2015-11 OCTOBER TERM 2015 SUPREME COURT OF THE UNITED STATES OF AMERICA ALBERT GREENE, Petitioner V. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

Petitioner, Respondent.

Petitioner, Respondent. No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, Petitioner, vs. UNITED STATES OF AMERICA, Respondent. PETITIONER S REPLY BRIEF HANNAH VALDEZ GARST Law Offices of Hannah Garst 121 S.

More information

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents.

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

United States District Court

United States District Court Case:0-cr-00-JSW Document Filed0/0/0 Page of NOT FOR CITATION IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA UNITED STATES OF AMERICA, 0 Plaintiff, No. CR 0-00 JSW v. ANDREW

More information

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent.

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent. Case No. 10-1011 In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. BRIEF FOR PETITIONER Team 15 Counsel for the Petitioner

More information

Supreme Court of The United States

Supreme Court of The United States TEAM 2 DOCKET NO. 10-1011 IN THE Supreme Court of The United States ELIZABETH JENNINGS, PETITIONER, V. UNITED STATE OF AMERICA, RESPONDENT. ON WRIT OF CERTIORARI FROM THE UNITED STATES COURT OF APPEALS,

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellant, FOR PUBLICATION November 6, 2014 9:00 a.m. v No. 310416 Kent Circuit Court MAXIMILIAN PAUL GINGRICH, LC No. 11-007145-FH

More information

The Burger Court Opinion Writing Database

The Burger Court Opinion Writing Database The Burger Court Opinion Writing Database United States v. Jacobsen 466 U.S. 109 (1984) Paul J. Wahlbeck, George Washington University James F. Spriggs, II, Washington University in St. Louis Forrest Maltzman,

More information

NOS ; IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE,

NOS ; IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE, Case: 14-10037, 08/26/2016, ID: 10102467, DktEntry: 73, Page 1 of 27 NOS. 14-10037; 14-10275 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, V. PLAINTIFF-APPELLEE,

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2013-08 Appellant ) ) v. ) ) ORDER Technical Sergeant (E-6) ) SAMUEL A. WICKS, ) USAF, ) Appellee ) Special Panel

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 10-1011 In the Supreme Court of the United States ELIZABETH JENNINGS, Petitioner, V. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding CELL PHONE SEARCHES IN SCHOOLS: THE NEW FRONTIER ANDREA KLIKA I. Introduction In the age of smart phones, what once was a simple device to make phone calls has become a personal computer that stores a

More information

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States,

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States, P21. In The SUPREME COURT OF THE UNITED STATES October Term, 2015 Docket No. 2015-11 Albert Greene, v. United States, Petitioner, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS

More information

Supreme Court of the United States

Supreme Court of the United States No. 16-066 IN THE Supreme Court of the United States MARVIN SKRELLY Petitioner, v. UNITED STATES OF AMERICA Respondent. On Petition for Writ of Certiorari to the United States Court of Appeals for the

More information

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant.

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant. IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA JEFFREY SCOTT FAWDRY, v. Appellant, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED CASE NO.

More information

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District No. 13-132 IN THE DAVID LEON RILEY, v. Petitioner, STATE OF CALIFORNIA, Respondent. On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District REPLY BRIEF FOR PETITIONER Patrick

More information

No. 1D On appeal from the Circuit Court for Clay County. John H. Skinner, Judge. September 14, 2018

No. 1D On appeal from the Circuit Court for Clay County. John H. Skinner, Judge. September 14, 2018 FIRST DISTRICT COURT OF APPEAL STATE OF FLORIDA No. 1D17-5118 THOMAS GERALD DUKE, Appellant, v. STATE OF FLORIDA, Appellee. On appeal from the Circuit Court for Clay County. John H. Skinner, Judge. September

More information

PLAIN VIEW. Priscilla M. Grantham

PLAIN VIEW. Priscilla M. Grantham PLAIN VIEW Priscilla M. Grantham GENERAL PRINCIPLES: If in the course of a lawful search, police see items that are incriminating or have evidentiary value, under the plain view doctrine they may be able

More information

Testimony of Orin S. Kerr Professor, George Washington University Law School

Testimony of Orin S. Kerr Professor, George Washington University Law School Testimony of Orin S. Kerr Professor, George Washington University Law School United States House of Representatives Committee on the Judiciary Subcommittee on the Crime, Terrorism, and Homeland Security

More information

By Jane Lynch and Jared Wagner

By Jane Lynch and Jared Wagner Can police obtain cell-site location information without a warrant? - The crossroads of the Fourth Amendment, privacy, and technology; addressing whether a new test is required to determine the constitutionality

More information

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8 Case 1:16-cr-00169-WHP Document 125 Filed 07/18/17 Page 1 of 8 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ------------------------------------------------------------X UNITED STATES OF

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF OREGON ADAM MATOT, v. OPINION AND ORDER. CH et al., Defendants.

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF OREGON ADAM MATOT, v. OPINION AND ORDER. CH et al., Defendants. Matot v. CH Doc. 31 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF OREGON ADAM MATOT, Plaintiff, Civ. No. 6:13-cv-153-MC CH et al., v. OPINION AND ORDER Defendants. MCSHANE, Judge: Plaintiff brings

More information

THE SUPREME COURT OF NEW HAMPSHIRE THE STATE OF NEW HAMPSHIRE JONATHAN BALL. Argued: June 13, 2012 Opinion Issued: September 28, 2012

THE SUPREME COURT OF NEW HAMPSHIRE THE STATE OF NEW HAMPSHIRE JONATHAN BALL. Argued: June 13, 2012 Opinion Issued: September 28, 2012 NOTICE: This opinion is subject to motions for rehearing under Rule 22 as well as formal revision before publication in the New Hampshire Reports. Readers are requested to notify the Reporter, Supreme

More information

No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent.

No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES Elizabeth Jennings, Petitioner v. United States of America, Respondent. On Writ of Certiorari to the United States Supreme Court of the United States

More information

Calif. Privacy Act Will Increase Data Breach Liability

Calif. Privacy Act Will Increase Data Breach Liability Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Calif. Privacy Act Will Increase Data Breach

More information

IN THE SUPREME COURT OF THE STATE OF NEW MEXICO

IN THE SUPREME COURT OF THE STATE OF NEW MEXICO IN THE SUPREME COURT OF THE STATE OF NEW MEXICO Opinion Number: 2010-NMSC-046 Filing Date: October 19, 2010 Docket No. 31,656 STATE OF NEW MEXICO, v. Plaintiff-Respondent, ERICA RIVERA, Defendant-Petitioner.

More information

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION Many of us 1 have experienced that sinking feeling before: the moment you realize that your cell phone is missing. First, it is the

More information

United States Court of Appeals

United States Court of Appeals United States of America, v. Antoine Jones, Case: 08-3034 Document: 1278562 Filed: 11/19/2010 Page: 1 Appellee Appellant ------------------------------ Consolidated with 08-3030 1:05-cr-00386-ESH-1 Filed

More information

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has FOURTH AMENDMENT WARRANTLESS SEARCHES FIFTH CIRCUIT UPHOLDS STORED COMMUNICATIONS ACT S NON- WARRANT REQUIREMENT FOR CELL-SITE DATA AS NOT PER SE UNCONSTITUTIONAL. In re Application of the United States

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 16-1105 In the Supreme Court of the United States Power Ventures, Inc. and Steven Vachani, Petitioners, v. Facebook, Inc., Respondent. On Petition for a Writ of Certiorari to the United States Court

More information

Supreme Court of The United States

Supreme Court of The United States No. 10-1011 In The Supreme Court of The United States ELIZABETH JENNINGS Petitioner, v. UNITED STATES OF AMERICA Respondent. ON PETITION FOR A WRIT OF CERTIORARI TO THE SUPREME COURT OF THE UNITED STATES

More information

SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent.

SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent. SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. No. 10-1011 NOTICE IS HEREBY GIVEN THAT the petition for writ

More information

No In The Supreme Court of the United States. Gerrard Leomund, Petitioner, v. United States of America, Respondent.

No In The Supreme Court of the United States. Gerrard Leomund, Petitioner, v. United States of America, Respondent. No. 15-3996 In The Supreme Court of the United States Gerrard Leomund, Petitioner, v. United States of America, Respondent. On Writ of Certiorari to The United States Court of Appeals For the Fourteenth

More information

1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO. 2 Opinion Number: 3 Filing Date: June 2, NO. S-1-SC STATE OF NEW MEXICO,

1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO. 2 Opinion Number: 3 Filing Date: June 2, NO. S-1-SC STATE OF NEW MEXICO, 1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO 2 Opinion Number: 3 Filing Date: June 2, 2016 4 NO. S-1-SC-35255 5 STATE OF NEW MEXICO, 6 Plaintiff-Petitioner, 7 v. 8 ROBERT GEORGE TUFTS, 9 Defendant-Respondent.

More information

traditional exceptions to warrant requirement

traditional exceptions to warrant requirement traditional exceptions to warrant requirement National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org materials 1. powerpoints 2.

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 16-3970 UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DAJUAN KEY, Defendant-Appellant. Appeal from the United States District Court

More information

REPORTED IN THE COURT OF SPECIAL APPEALS OF MARYLAND. No September Term, 1998 DONNA L. SAMPSON STATE OF MARYLAND

REPORTED IN THE COURT OF SPECIAL APPEALS OF MARYLAND. No September Term, 1998 DONNA L. SAMPSON STATE OF MARYLAND REPORTED IN THE COURT OF SPECIAL APPEALS OF MARYLAND No. 1892 September Term, 1998 DONNA L. SAMPSON v. STATE OF MARYLAND Murphy, C.J., Hollander, Salmon, JJ. Opinion by Murphy, C.J. Filed: January 19,

More information

The Private Search Doctrine After Jones Andrew MacKie-Mason

The Private Search Doctrine After Jones Andrew MacKie-Mason THE YALE LAW JOURNAL FORUM J ANUARY 2, 2017 The Private Search Doctrine After Jones Andrew MacKie-Mason introduction In United States v. Jacobsen, 1 the Supreme Court created a curious aspect of Fourth

More information

MINNESOTA v. DICKERSON 113 S.Ct (1993) United States Supreme Court

MINNESOTA v. DICKERSON 113 S.Ct (1993) United States Supreme Court Washington and Lee Journal of Civil Rights and Social Justice Volume 1 Issue 1 Article 19 Spring 4-1-1995 MINNESOTA v. DICKERSON 113 S.Ct. 2130 (1993) United States Supreme Court Follow this and additional

More information

Case 6:13-cr EFM Document 102 Filed 10/30/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Case 6:13-cr EFM Document 102 Filed 10/30/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 6:13-cr-10176-EFM Document 102 Filed 10/30/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS UNITED STATES OF AMERICA, Plaintiff, vs. Case No. 13-10176-01-EFM WALTER ACKERMAN,

More information

Case 5:16-cr XR Document 52 Filed 08/30/17 Page 1 of 10

Case 5:16-cr XR Document 52 Filed 08/30/17 Page 1 of 10 Case 5:16-cr-00008-XR Document 52 Filed 08/30/17 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS SAN ANTONIO DIVISION UNITED STATES OF AMERICA, v. ZACHARY AUSTIN HALGREN,

More information

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON. v. CASE NO.: 15:16-CR CHR-ESW

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON. v. CASE NO.: 15:16-CR CHR-ESW UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON TEAM 1631D UNITED STATES OF AMERICA, v. CASE NO.: 15:16-CR-02342-CHR-ESW CHARLIE WYATT, Defendant. DEFENDANT S MEMORANDUM IN SUPPORT OF

More information

No IN THE SUPREME COURT OF THE UNITED STATES. JAMES T. OLIVER, Petitioner, STATE OF CLINTONIA, Respondent,

No IN THE SUPREME COURT OF THE UNITED STATES. JAMES T. OLIVER, Petitioner, STATE OF CLINTONIA, Respondent, No. 17-795 IN THE SUPREME COURT OF THE UNITED STATES JAMES T. OLIVER, Petitioner, v. STATE OF CLINTONIA, Respondent, On Writ of Certiorari To The Supreme Court of Clintonia For the Fifteenth Judicial Circuit

More information

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Defending Freedom on the Electronic Frontier eff.org Know Your Rights Your computer, phone, and other digital devices hold vast amounts of personal

More information

Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim

Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim By Pierre Grosdidier It can be tempting to file a lawsuit against a computer trespasser or wrongdoer with a claim

More information

Case 3:16-mc RS Document 84 Filed 08/14/17 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA I.

Case 3:16-mc RS Document 84 Filed 08/14/17 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA I. Case :-mc-0-rs Document Filed 0// Page of UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA 0 In the Matter of the Search of Content Stored at Premises Controlled by Google Inc. and as Further

More information

357 (1967)) U.S. 752 (1969). 4 Id. at 763. In Chimel, the Supreme Court held that a search of the arrestee s entire house

357 (1967)) U.S. 752 (1969). 4 Id. at 763. In Chimel, the Supreme Court held that a search of the arrestee s entire house CONSTITUTIONAL LAW FOURTH AMENDMENT FIRST CIR- CUIT HOLDS THAT THE SEARCH-INCIDENT-TO-ARREST EXCEP- TION DOES NOT AUTHORIZE THE WARRANTLESS SEARCH OF CELL PHONE DATA. United States v. Wurie, 728 F.3d 1

More information

SUPREME COURT OF THE UNITED STATES

SUPREME COURT OF THE UNITED STATES Cite as: 529 U. S. (2000) 1 NOTICE: This opinion is subject to formal revision before publication in the preliminary print of the United States Reports. Readers are requested to notify the Reporter of

More information

Case 2:15-cv PA-AJW Document 1 Filed 01/02/15 Page 1 of 11 Page ID #:1 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Deadline.

Case 2:15-cv PA-AJW Document 1 Filed 01/02/15 Page 1 of 11 Page ID #:1 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Deadline. Case :-cv-000-pa-ajw Document Filed 0/0/ Page of Page ID #: 0 STEVEN M. TINDALL (SBN ) stindall@rhdtlaw.com VALERIE BRENDER (SBN ) vbrender@rhdtlaw.com RUKIN HYLAND DORIA & TINDALL LLP 00 Pine Street,

More information

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT Jewel v. Nat l Sec. Agency, 2015 WL 545925 (N.D. Cal. 2015) Valentín I. Arenas

More information

Court of Appeals of Ohio

Court of Appeals of Ohio [Cite as State v. Geiter, 190 Ohio App.3d 541, 2010-Ohio-6017.] Court of Appeals of Ohio EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA JOURNAL ENTRY AND OPINION No. 94015 The STATE OF OHIO, APPELLEE, v.

More information

NOTE. Unpacking Digital Containers: Extending Riley s Reasoning to Digital Files and Subfolders. Michael Mestitz*

NOTE. Unpacking Digital Containers: Extending Riley s Reasoning to Digital Files and Subfolders. Michael Mestitz* Stanford Law Review Volume 69 January 2017 NOTE Unpacking Digital Containers: Extending Riley s Reasoning to Digital Files and Subfolders Michael Mestitz* Abstract. The Supreme Court s recent decision

More information

Follow this and additional works at: Part of the Law Commons

Follow this and additional works at:   Part of the Law Commons Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1991 Criminal Law--International Jurisdiction--Federal Child Pornography Statute Applies to Extraterritorial Acts,

More information

Briefing from Carpenter v. United States

Briefing from Carpenter v. United States Written Material for Inside Oral Argument Briefing from Carpenter v. United States The mock oral argument will be based Carpenter v. United States, which is pending before the Supreme Court of the United

More information

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Ensure that you don t go from investigator to investigated Categories of law: Stalking, online harassment & cyberstalking

More information

Case 2:10-cv WBS-KJM Document 21 Filed 04/29/2010 Page 1 of 16 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA.

Case 2:10-cv WBS-KJM Document 21 Filed 04/29/2010 Page 1 of 16 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA. Case :0-cv-00-WBS-KJM Document Filed 0//00 Page of 0 0 ATPAC, INC., a California Corporation, v. Plaintiff, APTITUDE SOLUTIONS, INC., a Florida Corporation, COUNTY OF NEVADA, a California County, and GREGORY

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2009-15 Appellant ) ) v. ) ) ORDER Airman First Class (E-3) ) ADAM G. COTE, ) USAF, ) Appellee ) Special Panel

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 14 1003 UNITED STATES OF AMERICA, Plaintiff Appellee, v. FRANK CAIRA, Defendant Appellant. Appeal from the United States District Court

More information

SUPREME COURT OF THE UNITED STATES

SUPREME COURT OF THE UNITED STATES Cite as: 556 U. S. (2009) 1 NOTICE: This opinion is subject to formal revision before publication in the preliminary print of the United States Reports. Readers are requested to notify the Reporter of

More information

No IN THE SUPREME COURT OF THE UNITED STATES CASSANDRA ANNE KASOWSKI, PETITIONER UNITED STATES OF AMERICA

No IN THE SUPREME COURT OF THE UNITED STATES CASSANDRA ANNE KASOWSKI, PETITIONER UNITED STATES OF AMERICA No. 16-9649 IN THE SUPREME COURT OF THE UNITED STATES CASSANDRA ANNE KASOWSKI, PETITIONER v. UNITED STATES OF AMERICA ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE

More information

IN THE COURT OF COMMON PLEAS OF CARBON COUNTY, PENNSYLVANIA CRIMINAL DIVISION

IN THE COURT OF COMMON PLEAS OF CARBON COUNTY, PENNSYLVANIA CRIMINAL DIVISION IN THE COURT OF COMMON PLEAS OF CARBON COUNTY, PENNSYLVANIA CRIMINAL DIVISION COMMONWEALTH OF PENNSYLVANIA : : vs. : NO. 013 CR 10 : PAUL G. HERMAN, : Defendant : James M. Lavelle, Esquire Assistant District

More information

Case 1:17-cr MJG Document 94 Filed 03/12/18 Page 1 of 11 * CRIMINAL NO. MJG * * * * * * * * * DECISION REGARDING PROOF OF WILLFULNESS

Case 1:17-cr MJG Document 94 Filed 03/12/18 Page 1 of 11 * CRIMINAL NO. MJG * * * * * * * * * DECISION REGARDING PROOF OF WILLFULNESS Case 1:17-cr-00069-MJG Document 94 Filed 03/12/18 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND UNITED STATES OF AMERICA * vs. * CRIMINAL NO. MJG-17-069 HAROLD T. MARTIN

More information

CONTRABAND CONTROL AND SEARCHES

CONTRABAND CONTROL AND SEARCHES DESCHUTES COUNTY ADULT JAIL CD-8-8 L. Shane Nelson, Sheriff Jail Operations Approved by: December 29, 2017 POLICY. CONTRABAND CONTROL AND SEARCHES It is the policy of the Deschutes County Sheriff s Office

More information

Supreme Court of the United States

Supreme Court of the United States No. 16- IN THE Supreme Court of the United States DAVID NOSAL, v. Petitioner, UNITED STATES OF AMERICA Respondent. On Petition for a Writ of Certiorari to the United States Court of Appeals for the Ninth

More information

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI EASTERN DIVISION. RYAN GALEY and REGINA GALEY

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI EASTERN DIVISION. RYAN GALEY and REGINA GALEY Galey et al v. Walters et al Doc. 10 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI EASTERN DIVISION RYAN GALEY and REGINA GALEY PLAINTIFFS V. CIVIL ACTION NO. 2:14cv153-KS-MTP

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-5 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENROLLED, An Act, 5 Relating to consumer protection; to require certain 6 entities

More information

9th Circ.'s Expansive Standard For Standing In Breach Case

9th Circ.'s Expansive Standard For Standing In Breach Case Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com 9th Circ.'s Expansive Standard For Standing

More information

NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT Case: 11-55436 03/20/2013 ID: 8558059 DktEntry: 47-1 Page: 1 of 5 FILED NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS MAR 20 2013 MOLLY C. DWYER, CLERK U.S. COURT OF APPEALS FOR THE NINTH CIRCUIT

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 13-212 In the Supreme Court of the United States UNITED STATES OF AMERICA, PETITIONER v. BRIMA WURIE ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT

More information

TYSON KENNETH CURLEY OPINION BY v. Record No ELIZABETH A. McCLANAHAN July 26, 2018 COMMONWEALTH OF VIRGINIA

TYSON KENNETH CURLEY OPINION BY v. Record No ELIZABETH A. McCLANAHAN July 26, 2018 COMMONWEALTH OF VIRGINIA PRESENT: All the Justices TYSON KENNETH CURLEY OPINION BY v. Record No. 170732 ELIZABETH A. McCLANAHAN July 26, 2018 COMMONWEALTH OF VIRGINIA FROM THE COURT OF APPEALS OF VIRGINIA Tyson Kenneth Curley

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0 1 HB410 2 191614-1 3 By Representative Williams (P) 4 RFD: Technology and Research 5 First Read: 13-FEB-18 Page 0 1 191614-1:n:02/13/2018:CMH*/bm LSA2018-168 2 3 4 5 6 7 8 SYNOPSIS: This bill would create

More information

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE December 13, 2000 Session

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE December 13, 2000 Session IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE December 13, 2000 Session STATE OF TENNESSEE v. CARLOS L. BATEY Appeal from the Criminal Court for Davidson County No. 99-C-1871 Seth Norman,

More information

Divided Supreme Court Requires Warrants for Cell Phone Location Data

Divided Supreme Court Requires Warrants for Cell Phone Location Data Divided Supreme Court Requires Warrants for Cell Phone Location Data July 2, 2018 On June 22, 2018, the United States Supreme Court decided Carpenter v. United States, in which it held that the government

More information

DEFINING THE LIMITS OF THE PRIVATE- SEARCH DOCTRINE IN AN EXPANDING DIGITAL LANDSCAPE

DEFINING THE LIMITS OF THE PRIVATE- SEARCH DOCTRINE IN AN EXPANDING DIGITAL LANDSCAPE DEFINING THE LIMITS OF THE PRIVATE- SEARCH DOCTRINE IN AN EXPANDING DIGITAL LANDSCAPE Kendall Van Ameyde* INTRODUCTION Computers, cell phones, and other transformative technologies conveniently hold for

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-4 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENGROSSED 5 6 7 A BILL 8 TO BE ENTITLED 9 AN ACT 10 11 Relating to consumer protection;

More information

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. STATE OF NEW JERSEY, Plaintiff-Appellant, v. ADAM MALKIN, Defendant-Respondent.

More information

New Jersey v. T.L.O. 469 U.S. 325 United States Supreme Court January 15, JUSTICE WHITE delivered the opinion of the Court.

New Jersey v. T.L.O. 469 U.S. 325 United States Supreme Court January 15, JUSTICE WHITE delivered the opinion of the Court. New Jersey v. T.L.O. 469 U.S. 325 United States Supreme Court January 15, 1985 JUSTICE WHITE delivered the opinion of the Court. We granted certiorari in this case to examine the appropriateness of the

More information

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION UNITED STATES OF AMERICA, CRIMINAL ACTION NO. Plaintiff, 3:-01-CR-246-P v. XXX XXX, Defendant. MOTION TO SUPPRESS ALL ITEMS SEIZED

More information

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT T.T., a child, Appellant, v. STATE OF FLORIDA, Appellee. No. 4D18-442 [August 29, 2018] Appeal from the Circuit Court for the Seventeenth

More information

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. STATE OF NEW JERSEY, v. Plaintiff-Appellant, DAMEON L. WINSLOW, Defendant-Respondent.

More information

STATE V. GUTIERREZ, 2004-NMCA-081, 136 N.M. 18, 94 P.3d 18 STATE OF NEW MEXICO, Plaintiff-Appellee, v. DEMETRIO DANIEL GUTIERREZ, Defendant-Appellant.

STATE V. GUTIERREZ, 2004-NMCA-081, 136 N.M. 18, 94 P.3d 18 STATE OF NEW MEXICO, Plaintiff-Appellee, v. DEMETRIO DANIEL GUTIERREZ, Defendant-Appellant. 1 STATE V. GUTIERREZ, 2004-NMCA-081, 136 N.M. 18, 94 P.3d 18 STATE OF NEW MEXICO, Plaintiff-Appellee, v. DEMETRIO DANIEL GUTIERREZ, Defendant-Appellant. Docket No. 23,047 COURT OF APPEALS OF NEW MEXICO

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Constitutional Law - Search and Seizure - Hot Pursuit

Constitutional Law - Search and Seizure - Hot Pursuit Louisiana Law Review Volume 28 Number 3 The Work of the Louisiana Appellate Courts for the 1966-1967 Term: A Symposium April 1968 Constitutional Law - Search and Seizure - Hot Pursuit Dan E. Melichar Repository

More information

v. CIVIL ACTION NO. H

v. CIVIL ACTION NO. H Rajaee v. Design Tech Homes, Ltd et al Doc. 42 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION SAMAN RAJAEE, Plaintiff, v. CIVIL ACTION NO. H-13-2517 DESIGN TECH

More information

v. Record No OPINION BY JUSTICE BARBARA MILANO KEENAN November 1, 2002 COMMONWEALTH OF VIRGINIA FROM THE COURT OF APPEALS OF VIRGINIA

v. Record No OPINION BY JUSTICE BARBARA MILANO KEENAN November 1, 2002 COMMONWEALTH OF VIRGINIA FROM THE COURT OF APPEALS OF VIRGINIA PRESENT: All the Justices PHILLIP JEROME MURPHY v. Record No. 020771 OPINION BY JUSTICE BARBARA MILANO KEENAN November 1, 2002 COMMONWEALTH OF VIRGINIA FROM THE COURT OF APPEALS OF VIRGINIA In this appeal,

More information

UNITED STATES OF AMERICA, PETITIONER DAVID NOSAL, RESPONDENT. No BRIEF FOR PETITIONER

UNITED STATES OF AMERICA, PETITIONER DAVID NOSAL, RESPONDENT. No BRIEF FOR PETITIONER No. 10-10038 UNITED STATES OF AMERICA, PETITIONER v. DAVID NOSAL, RESPONDENT ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BRIEF FOR PETITIONER JESSICA L. DIAZ Attorney

More information

IN THE SUPREME COURT OF GUAM. PEOPLE OF GUAM, Plaintiff-Appellant, ZACHARY RICHARD ULLOA CAMACHO, Defendant-Appellee. OPINION. Filed: May 7, 2004

IN THE SUPREME COURT OF GUAM. PEOPLE OF GUAM, Plaintiff-Appellant, ZACHARY RICHARD ULLOA CAMACHO, Defendant-Appellee. OPINION. Filed: May 7, 2004 IN THE SUPREME COURT OF GUAM PEOPLE OF GUAM, Plaintiff-Appellant, v. ZACHARY RICHARD ULLOA CAMACHO, Defendant-Appellee. Supreme Court Case No.: CRA03-002 Superior Court Case No.: CF0070-02 OPINION Filed:

More information

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF OKLAHOMA

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF OKLAHOMA Case 4:10-cr-00194-JHP Document 40 Filed in USDC ND/OK on 03/16/11 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF OKLAHOMA UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) v.

More information

DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS

DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS By Ian C. Ballon & Wendy Mantell 1 Class action plaintiffs lawyers increasingly have turned their attention to putative class

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, RAYMOND WONG, No. 02-10070 Plaintiff-Appellee, D.C. No. v. CR-00-40069-CW Defendant-Appellant. OPINION Appeal

More information

Don t Get Burned: Proper Implementation of the Litigation Hold Process is Your Best SPF (Spoliation Protection Factor)

Don t Get Burned: Proper Implementation of the Litigation Hold Process is Your Best SPF (Spoliation Protection Factor) Don t Get Burned: Proper Implementation of the Litigation Hold Process is Your Best SPF (Spoliation Protection Factor) November 7, 2007 Susan Westover and Denah Hoard California State University Office

More information

Plain View & Consent. Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases. Objectives

Plain View & Consent. Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases. Objectives Other Search and Seizure Issues Likely to Arise in Digital Child Pornography Cases 1 Plain View & Consent Priscilla M. Grantham Sr. Research Counsel Nat l Center for Justice and the Rule of Law Objectives

More information