No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent.

Size: px
Start display at page:

Download "No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent."

Transcription

1 No IN THE SUPREME COURT OF THE UNITED STATES Elizabeth Jennings, Petitioner v. United States of America, Respondent. On Writ of Certiorari to the United States Supreme Court of the United States Court of Appeals for the Fourteenth Circuit BRIEF FOR RESPONDENT TEAM 4 Counsel for Respondent 1

2 Table of Contents QUESTIONS PRESENTED... iii OPINIONS BELOW... iii CONSTITUTIONAL PROVISIONS AND RULES...iv INTRODUCTION... 1 STATEMENT OF THE CASE... 3 ARGUMENT... 7 I. THE FOURTEENTH CIRCUIT PROPERLY REVERSED THE DISTRICT COURT S SUPPRESSION OF THE PHOTOS BECAUSE THE PRIVATE SEARCH DOCTRINE PERMITTED OFFICER KRAMER TO SEARCH THE PHONE S PHOTO ALBUM IN GREATER DETAIL A. WHEN A PRIVATE SEARCH REVEALS ILLEGAL CONDUCT, THE BROAD INTERPRETATION OF THE PRIVATE SEARCH DOCTRINE BEST ENCOMPASSES THE REASONABLENESS STANDARD OF THE FOURTH AMENDMENT B. OFFICER KRAMER REMAINED WITHIN ONE CONTAINER WHEN HE SEARCHED THE CELL PHONE AND, THEREFORE, REMAINED WITHIN THE SCOPE OF NIGHTINGALE S SEARCH C. THE GOVERNMENT S INTEREST IN PROMOTING PUBLIC HEALTH AND NATIONAL SECURITY GREATLY OUTWEIGHS PETITIONER S INTEREST IN SOLICITING CONFIDENTIAL GOVERNMENT INFORMATION. 13 II. THE FOURTEENTH CIRCUIT S DECISION SHOULD BE UPHELD BECAUSE THE USE OF A CELL-SITE SIMULATOR IS NOT A SEARCH UNDER THE FOURTH AMENDMENT WHEN PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY AND SOCIETY IS NOT PREPARED TO RECOGNIZE HER EXPECATION OF PRIVACY AS REASONABLE A. PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY BECAUSE SHE KNEW INFORMATION WAS CONVEYED THROUGH THE VOLUNATRY USE OF A CELL PHONE B. PETITIONER S OBJECTIVE EXPECTATION OF PRIVACY IS UNREASONABLE BECAUSE SHE VOLUNTARILY DISCLOSED HER LOCATION INFORMATION TO THIRD PARTIES C. PETITIONER S OBJECTIVE EXPECTATION OF PRIVACY IS UNREASONABLE BECAUSE THE SURVEILLANCE DONE BY AUTHORITIES WAS LESS INTRUSIVE THAN PRECEDENT CONCLUSION i

3 TABLE OF AUTHORITIES UNITED STATES SUPREME COURT CASES Burdeau v. McDowell, 256 U.S. 465 (1921)... 7, 9 Coolidge v. New Hampshire, 403 U.S. 443 (1971)... 7 Katz v. United States, 389 U.S. 347 (1967)... 15, 16, 21 Riley v. California, 134 S. Ct (2014)... passim Smith v. Maryland, 442 U.S. 735 (1979)... passim United States v. Jacobson, 466 U.S. 109 (1984)... passim United States v. Jones, 132 S. Ct. 945 (2012)... 7, 20, 22, 23 United States v. Knotts, 460 U.S. 276 (1983)... 17, 18 United States v. Miller, 425 U.S. 435 (1976) OTHER FEDERAL CASES Rann v. Atchison, 689 F.3d 832 (7th Cir. 2012)... passim U.S. v. Skinner, 690 F.3d 772 (2012)... 16, 17, 19, 23 United States v. Forest, 355 F.3d 942 (6th Cir. 2004) United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015)... 8, 10, 13 United States v. Runyan, 275 F.3d 449 (5th Cir. 2001)... passim United States v. Sparks, 806 F.3d 1323 (11th Cir. 2015)... 8, 9 CONSTITUTIONAL PROVISIONS U.S. Const. amend. IV... 7, 15 STATUTES 18 U.S.C OTHER SOURCES About DOJ, The United States Department of Justice, (Feb. 9, 2018) ii

4 QUESTIONS PRESENTED I. Under what circumstances the private search exception to the Fourth Amendment permits a law enforcement agent to view photos on a cell phone beyond those viewed by the private party. II. Whether and when use of a cell-site simulator to identify the location of a target s mobile phone is a Fourth Amendment search. OPINIONS BELOW The United States District Court for the District of Arcadia ( District Court ) granted Petitioner s motion to suppress the photos viewed by Officer Kramer that were not viewed by Larry Nightingale on the phone Dr. Sam Owens used, and the phone found on Petitioner at the time of her arrest. The United States Court of Appeals for the Fourteenth Circuit ( Fourteenth Circuit ) reversed the order of the District Court in United States v. Jennings because, under the private search doctrine, the photographs were improperly suppressed and the use of a cell-site simulator is not a search because there is no expectation of privacy in information conveyed through the voluntary use of a cell phone. Jennings, 913 F.3d 1131, 1134, 1136 (14th Cir. 2017). iii

5 CONSTITUTIONAL PROVISIONS AND RULES The Fourth Amendment of the U.S. Constitution: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. Const. amend. IV. Gathering, transmitting or losing defense information: (a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or (b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or (c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or (d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, iv

6 plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or (e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or (f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer-- Shall be fined under this title or imprisoned not more than ten years, or both. (g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy. (h)(1) Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term State includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States. (2) The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection. v

7 (3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)- (p)) shall apply to-- (A) property subject to forfeiture under this subsection; (B) any seizure or disposition of such property; and (C) any administrative or judicial proceeding in relation to such property, if not inconsistent with this subsection. (4) Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law. 18 U.S.C.A. 793 (West). vi

8 INTRODUCTION This Court should affirm the Fourteenth Circuit s opinion because it correctly held that the private search doctrine permitted Officer Kramer to search the phone s photo album in greater detail. Additionally, the Fourteenth Circuit correctly held that the use of a cell-site simulator is not a search under the Fourth Amendment when Ms. Jennings did not exhibit an actual expectation of privacy, and even if Ms. Jennings did exhibit an actual expectation of privacy, society is not prepared to recognize her expectation of privacy as reasonable. The Fourteenth Circuit correctly held that the private search doctrine permitted Officer Kramer to search the phone s photo album in greater detail. The Fourth Amendment protects citizens from unreasonable searches and seizures; however, that protection is only valid against government action and is inapplicable to a search performed by a private party. The private search doctrine permits law enforcement officials to perform a warrantless search of a container when the reasonable expectation of privacy in that container has already been frustrated by a private party. When Ms. Jennings s phone was found in a public park, opened by a private party, and disclosed illegal conduct, Ms. Jennings lost all privacy interests in that specific container. Although the private search doctrine has been applied to digital devices inconsistently, the broad interpretation best equips law enforcement to carry out its mission of ensuring public safety, preventing and controlling crime, and safeguarding our nation s security against foreign or domestic threats. Ms. Jennings s solicitation of confidential government documents was in direct violation of a federal statute and thus Officer Kramer should be permitted, under the broad interpretation of the private search doctrine, to search the phone s photo album in greater detail. Additionally, the Fourteenth Circuit correctly held that the use of a cell-site simulator is not a search under the Fourth Amendment. A search under the Fourth Amendment is a two- 1

9 pronged inquiry. The first prong that must be addressed is whether the individual, by his conduct, has exhibited an actual expectation of privacy. The second prong is whether the individual s actual expectation of privacy is one that society is prepared to recognize as reasonable under the circumstances. In determining whether Ms. Jennings had an actual expectation of privacy, the Court inquires whether the individual sought to preserve the information as private. There has been a line of precedent cases of more than twenty years that has held that there is no constitutional difference between trailing a defendant and tracking him via technology. This case falls right in line with precedent because the FBI used a cell-site simulator to track the location services of Ms. Jennings s cell phone. Furthermore, she told Dr. Owens explicitly that the FBI is able to track anyone now. Even if Ms. Jennings did exhibit an actual expectation of privacy, society is not ready to declare her expectation of privacy as reasonable. The Courts have consistently held that a person has no legitimate expectation of privacy in the information he or she voluntarily turns over to third parties. In this instance, Ms. Jennings, in using the cell phone, voluntarily handed over her information to the cell-phone company. Additionally, the Court has looked at the operative facts surrounding surveillance in precedent cases and has held that surveillance for even a few days does not entitle Ms. Jennings to an expectation of privacy that society is ready to declare reasonable. 2

10 STATEMENT OF THE CASE This case involves the use of a cell phone to perpetrate crime and threaten national security. Elizabeth Jennings (hereinafter Petitioner ) was a co-manager of a small travel agency and lived in suburban Arcadia with her two children and her husband, Philip. (R. at 1131). By her own account, Petitioner lived an entirely ordinary life. (R. at 1131). The FBI alleges, however, that Petitioner and her husband are both undercover agents working for the FSB, the Russian equivalent of the CIA. (R. at 1131). Specifically, the FBI alleges that Petitioner and her husband illegally entered the United States some time during the 1980 s, assumed false identities, and have lived as American citizens since that time. (R. at 1131). Additionally, the FBI further alleges that Petitioner and her husband have worked to recruit agents within the United States to provide themselves with intelligence on U.S. defense systems in exchange for money. (R. at 1131). Petitioner contests these accusations. (R. at 1131). On an undisclosed date, Petitioner was at a bar and struck up a conversation with a patron next to her, Dr. Sam Owens (hereinafter Owens ). (R. at 1132). Owens was a nuclear physicist employed by the private corporation Network Simulations Company (hereinafter Netsimco ). (R. at 1131). Owens suffers from a gambling addiction and was several hundreds of thousands of dollars in debt when he met Petitioner. (R. at 1132). Netsimco was on contract with the U.S. Department of Energy and has been working on a space laser, which would destroy incoming nuclear weapons. (R. at ). At the bar, Owens, in an inebriated state, revealed to Petitioner that he worked on a space laser at Netsimco and was deeply in debt. (R. at 1132). At the time of the suppression hearing, Owens was cooperating with the FBI and testified that Petitioner suggested that in exchange for money, Owens would take pictures of the space laser schematics with a cell phone provided by 3

11 Petitioner. (R. at 1132). Owens agreed. (R. at 1132). Petitioner handed Owens a pay-as-you-go cellphone and told him to memorize three steps: (1) take pictures of the space laser and its schematics with the phone; (2) tape the phone to the bottom of a certain park bench in Arcadia Central Park; and (3) call a specified phone number, allow it to ring four times, and then hang up. (R. at 1132). The final step would indicate to Petitioner to come and collect the phone from the bench. (R. at 1132). Petitioner instructed Owens to remove the battery until he was ready to use it since, Petitioner explained, these burners are untraceable, but still, they can track everyone now. (R. at 1132). Owens agreed to follow instructions. (R. at 1132). Uncertain he would remember the number, Owens took a picture of the napkin with the phone number Petitioner had given him. (R. at 1132). Owens had no other information on the phone at this point. (R. at 1132). The next day, Owens snuck into his supervisor s office and took pictures of the schematics, took pictures of the laser itself, and walked to the agreed park bench in Arcadia Central Park. (R. at 1132). He called the number Petitioner gave him, allowed it to ring four times, hung up, and fastened the phone to the bottom of the bench. (R. at 1132). As Owens left the park, Larry Nightingale (hereinafter Nightingale ) had watched Owens tape the phone to the bench. (R. at 1132). Nightingale removed the phone from the bench, activated it, unlocked it using the passcode , and opened the Photos application. (R. at 1132). Nightingale opened several photos and saw one containing a document with the heading TOP SECRET UNAUTHORIZED DISTRIBUTION FORBIDDEN UNDER PENALTY OF LAW. (R. at ). Alarmed by the suspicious circumstances, Nightingale called the police and described the images he saw. (R. at 1133). He did not scroll through the entire album. (R. at 1133). 4

12 Officer Kramer (hereinafter Kramer ), an Arcadia police officer, arrived on the scene. (R. at 1133). Nightingale showed Kramer the image of the schematic he observed. (R. at 1133). Kramer took the phone and then zoomed out to a screen full of smaller thumbnail images. (R. at 1133). Kramer scrolled through the album of around 100 photos and focused his attention on the photographs that depicted schematics. (R. at 1133). There were approximately 24 other photographs unseen by Nightingale that all depicted schematics and bore the Top Secret heading. (R. at 1133). He saw another photo that looked like a satellite. (R. at 1133). The final photograph in the album was of the phone number Petitioner provided written on a napkin. (R. at 1133). Kramer tapped on the image with the napkin because this was the only photo he was not able to clearly see. (R. at 1133). After viewing the image, he recorded the phone number. (R. at 1133). Arcadia police then transferred the investigation to the FBI. (R. at 1133). The FBI was able to quickly identify Owens through security footage of the park. (R. at 1133). The FBI found and interrogated Owens. (R. at 1133). Owens told them that he had no idea who the woman was and that he didn t know how to contact her except by using the number found on the napkin. (R. at 1133). To begin their investigation, the FBI contacted the cell provider for the number, and the company voluntarily informed the FBI that the phone had most recently connected with a cell phone tower somewhere within a 10-mile radius around the Arcadia National Forest. (R. at 1133). The FBI set out to find the user of the cell-phone in the forest using a cell-phone simulator (hereinafter stingray ). (R. at 1133). FBI agents drove around the Arcadia National Forest area until their stingray informed them that they were 25 feet away from the cell phone, which was inside a cabin. (R. at 1134). The agents were parked on a rural street. (R. at 1134). There were no other structures in the area. 5

13 (R. at 1134). As they were parked, they heard the sound of a door close, and went around the back of the cabin where they discovered Petitioner running away. (R. at 1134). On her person at the time of the arrest, FBI agents discovered the cell phone with the number Owens had written on the napkin and called. (R. at 1134). This phone was also a pay-as-you-go smartphone with no other contents than a record of a call from the phone Owens had used. (R. at 1134). The government charged Petitioner with conspiracy to obtain information relating to national defense that she was not entitled to receive in violation of 18 U.S.C (R. at 1134). The government and defense have stipulated that (1) Petitioner had standing to challenge the search of her phone; and (2) the phone was not abandoned. (R. at 1134). 6

14 ARGUMENT I. THE FOURTEENTH CIRCUIT PROPERLY REVERSED THE DISTRICT COURT S SUPPRESSION OF THE PHOTOS BECAUSE THE PRIVATE SEARCH DOCTRINE PERMITTED OFFICER KRAMER TO SEARCH THE PHONE S PHOTO ALBUM IN GREATER DETAIL. Justice Sotomayor asserted that technology may alter the relationship between citizen and government in a way that is inimical to democratic society. United States v. Jones, 132 U.S. 945 (2012). The emergence of the Internet, the smartphone, and other complex digital devices has changed the way Americans do business, communicate, and store and transmit information. Riley v. California, 134 S. Ct. 2473, 2484 (2014). (highlighting the pervasiveness of cell phones in American society). In the modern digital era, courts have had to re-define constitutional rights within the scope of many new technologies. Id. at The Fourth Amendment establishes the right of people to be secure against unreasonable searches and seizures. U.S. Const. amend. IV. This protection proscribes only governmental action; it is wholly inapplicable to a search and seizure, even an unreasonable one, effected by a private individual not acting as an agent of the government or with the participation or knowledge of a government official. Burdeau v. McDowell, 256 U.S. 465 (1921). When a private party provides police with evidence obtained in the course of a private search, the police need not stop the private party or avert their eyes. Coolidge v. New Hampshire, 403 U.S. 443, 489 (1971). Rather, the question becomes whether the police exceed the scope of the private search. United States v. Jacobson, 466 U.S. 109 (1984). Any additional invasions of privacy by the government must be tested by the degree which they exceeded the scope of the private search. Id. at 115. Recently, courts have struggled to define how the Fourth Amendment applies to police searches of digital items that have already been inspected by private parties. See United States v. 7

15 Sparks, 806 F.3d 1323, 1336 (11th Cir. 2015) (ruling that an officer s warrantless search of a video exceeded--not replicated the breadth of the private search ); United States v. Lichtenberger, 786 F.3d 478, 488 (6th Cir. 2015) (concluding that the officer s search of a personal laptop must stay within the scope of the initial search ); Rann v. Atchison, 689 F.3d 832, 836 (7th Cir. 2012) (finding no Fourth Amendment violation because police were substantially certain their search of defendant s digital media devices would reveal child pornography); United States v. Runyan, 275 F.3d 449, 465 (5th Cir. 2001) ( police do not exceed the scope of a prior private search when they examine particular items within a container that were not examined by the private searchers ). Defining the scope of the private search doctrine and its application to digital devices has been the subject of a current circuit split. The two varying approaches taken by the circuits are most commonly referred to as the broad approach and the narrow approach. See Sparks, 806 F.3d 1323; Runyan, 275 F.3d 449. The broad approach, which has been adopted by the Fifth and Seventh circuits, states that when a private party searches any part of a single unit, the privacy interests in the entire unit are frustrated and the unit may be searched in its entirety without implicating the Fourth Amendment. See Runyan, 275 F.3d at 463; Rann, 689 F.3d at 837. The narrow approach, which has been adopted by the Sixth and Eleventh Circuits, states that when a private party searches only a part of a single unit, only the privacy interest in those specific items is frustrated, rather than the entire unit, and any subsequent search requires a warrant. Sparks, 806 F.3d at 1336; Lichtenberger, 786 F.3d at 489. Some prevailing factors emerge from the totality of the cases that must be present for the broad approach to apply. First, the private search must reveal indicia of illegal conduct. See Jacobson, 466 U.S. at 117. Second, the responding government agent or law enforcement official must remain within the container that was 8

16 previously searched by the private party, although the officer may search that container in greater detail. See Runyan, 275 F. 3d at 464; Rann, 689 F.3d at 837. Third, the government must demonstrate a compelling interest that outweighs the individual s interest in privacy. Riley, 134 S.Ct. at If all of these factors are met, the broad approach affords officers the most reasonable procedure to safeguard the public, while not infringing on the Fourth Amendment. A. WHEN A PRIVATE SEARCH REVEALS ILLEGAL CONDUCT, THE BROAD INTERPRETATION OF THE PRIVATE SEARCH DOCTRINE BEST ENCOMPASSES THE REASONABLENESS STANDARD OF THE FOURTH AMENDMENT. When a private search reveals indicia of illegal conduct, principles of reasonableness permit government officials to search the opened container in its entirety. Jacobson, 466 U.S The key question in any Fourth Amendment case is the extent to which the government invaded a person s reasonable expectation of privacy. Burdeau, 256 U.S. at 465. Within the context of the private search doctrine, the reasonableness test must be applied to government action taken subsequent to a private search and must be appraised on the basis of the facts as they existed at the time the invasion occurred. Jacobson, 466 U.S. at 115. The Fourth Amendment is implicated only if the authorities use information with respect to which the expectation of privacy has not already been frustrated. Id. at 117. In Jacobson, this Court found that when a private party s search discloses indicia of illegal conduct, the privacy interests in that container are frustrated and government agents are permitted to search the remainder of the container when they are virtually certain what the subsequent search will reveal. See Jacobson, 466 U.S. at (holding that defendant had no reasonable privacy interests in concealing contraband). Each of the circuits that have applied the private search doctrine to digital items and devices have held that privacy interests in those items are, at least in part, frustrated when those items contain illegal information or data. See Sparks, 9

17 806 F.3d at 1336 (holding that discovery of child pornography by Walmart employee permitted subsequent search by authorities); Lichtenberger, 786 F.3d at 488 (officers subsequent search of defendant s laptop, which contained child pornography, was permissible as long as it remained within the scope of private search); Rann, 689 F.3d at 837 (police search of data files that contained child pornography did not exceed scope of private search); Runyan, 275 F.3d at 465 (when a private party has disclosed illicit content within a container, government agents are permitted to search the container in greater detail). The broad approach, advanced by the Fifth and Seventh circuits, best encompasses the reasonableness standard of the Fourth Amendment and should be adopted by this Court. The broad approach allows officers and other law enforcement personnel to use their professional training and experience to diagnose potential criminal conduct in the most efficient manner. The present action provides illustrative facts of the superiority of the broad approach, while also illustrating the narrow approach s shortcomings. The private citizen here, Larry Nightingale, saw suspicious activity occurring in a local public park when an anonymous man taped a cell phone to the bottom of the park bench. (R. at 1132). Out of curiosity, Nightingale removed the phone, opened it, and was able to discover several photos, one of which bore the heading: TOP SECRET UNAUTHORIZED DISTRIBUTION FORBIDDEN UNDER PENALTY OF LAW. (R. at 1133). Startled by what he had seen, Nightingale promptly notified the local police before viewing any more photos. (R. at 1133). Officer Kramer, a local policeman, arrived and was faced with the key question this Court is now considering: to what extent may he view the contents of the phone beyond what Nightingale had already seen? The narrow approach would strictly forbid Officer Kramer from further inspection of the phone, including the remainder of the photo album that Nightingale had already opened. The broad 10

18 approach would permit Officer Kramer to inspect the remainder of the photo album, but not view other contents of the phone. Under the principles of reasonableness that guide Fourth Amendment analysis, it becomes clear that the broad approach is most logical. When a law enforcement officer is virtually certain that a subsequent search will reveal details of a crime, he should be permitted to search the already compromised container in greater detail. See Jacobson, 466 U.S. at 117. Adopting the alternative would leave officers at the mercy of the private citizen s curiosity and would draw an arbitrary line based on the extent of the prior search. Law enforcement officials are trained to identify, investigate, and combat criminal conduct private citizens, generally speaking, are not. The broad approach best equips law enforcement to protect the public from criminal conduct without infringing on Fourth Amendment rights. B. OFFICER KRAMER REMAINED WITHIN ONE CONTAINER WHEN HE SEARCHED THE CELL PHONE AND, THEREFORE, REMAINED WITHIN THE SCOPE OF NIGHTINGALE S SEARCH. The fear that this court expressed in Riley concerning the unique storage capabilities of cell phones, and thus the heightened privacy interests at stake, is well-founded, and the broad approach would not threaten this privacy interest. 134 S.Ct. at Looking to the circuits is instructive on this manner. Even if this Court adopts the broadest of approaches, the Fifth Circuit, in Runyan, stated that an officer may search an already compromised container in greater detail, but he may not open new containers that were not already viewed by the private party. 275 F.3d at 464. Although Runyan dealt with substantial amounts of compact disks, floppy disks, and ZIP drives, and some of the most recent private search precedent deals with other physical containers, the reasoning can be applied to cell phones with fluidity. 11

19 Specifically, cell phones should be viewed as storing unlimited amounts of containers each application or folder functioning as its own miniature container. In reference to Justice Roberts concerns in Riley and for illustrative purposes, imagine the text message, electronic mail, bank account, and photograph applications all functioning as separate containers. Simply because a private party is able to compromise the privacy interests in one container does not expose the entire phone to warrantless inspection. Rather, law enforcement officials, even under the broad approach, would only be permitted to further search the single container that the private citizen had already viewed, albeit in greater detail. Id. In Jacobson, that meant viewing the remaining contents of the FedEx box and testing the suspicious white powder. 466 U.S. at 115. In Runyan and Rann, that meant viewing the remaining files contained within the compact disks and ZIP drives, which contained images of child pornography, and which the private party had already viewed in part. 275 F.3d at 464; 689 F.3d at No approach, broad or narrow, would permit Officer Kramer to take Nightingale s private discovery as an invitation to view the entire phone. However, it would be a modest application of the traditional private search doctrine to permit law enforcement agents to search, in greater detail, the containers within a cell phone that have already been compromised by a private party. The essential purpose of law enforcement is to safeguard American lives, reduce the incidence of crime, and promote public safety. About DOJ, The United States Department of Justice, (Feb. 9, 2018). The broad approach allows them to carry out this mission. Officer Kramer did not violate the Fourth Amendment when he searched, in greater detail, the one photo album that had already been seen by Nightingale because he remained within one container. 12

20 C. THE GOVERNMENT S INTEREST IN PROMOTING PUBLIC HEALTH AND NATIONAL SECURITY GREATLY OUTWEIGHS PETITIONER S INTEREST IN SOLICITING CONFIDENTIAL GOVERNMENT INFORMATION. Lastly, the government must prove a compelling interest that permits a warrantless search and that interest must outweigh the individual s interest in privacy. Riley, 134 S. Ct. at In Riley, this Court laid out this balancing test as a critical test in Fourth Amendment analysis. Id. In the present action, the government s interests are substantial: preserving public health and safety, safeguarding national security, and enforcing a federal statute designed to prevent breaches of our national defense. (R. at 1134). These interests greatly outweigh petitioner s interests in using a cell phone s photography features to solicit illegal information. (R. at 1133). Moreover, petitioner s solicitation of confidential government information is strictly prohibited by 18 U.S.C Once the government agent becomes aware of threats to the above interests, the agent should be afforded the broadest discretion to safeguard those interests. Again, the broad approach is the best method to accomplish this goal. In addition, the government s interests are heightened when law enforcement officials become aware of a crime in progress, yet lack necessary details about that crime, such as the identity of the offender. In all of the circuit cases previously mentioned, the identity of the defendant was never in question. See Runyan, 275 F.3d at 464; Rann, 689 F.3d at 837; Lichtenberger, 786 F.3d at 480. The information disclosed to law enforcement by the private parties already was linked to the criminal offender. However, in the present action, while Officer Kramer was certain Nightingale saw photos that were indicative of criminal conduct, he was not able to identify the potential offender without further searching the photo album. (R. at 1133). When private parties disclose potential criminal conduct to law enforcement, the broad approach affords officers the necessary procedure to respond promptly. This timely response time becomes 13

21 ever more important when dealing with cyber crimes, since the paper trail can be eliminated in mere seconds and the potential offenders may never be found. The petitioner will argue that her interests in cell phone privacy are substantial and those protections are further solidified by Riley. 134 S.Ct. at However, the defendant in Riley had his phone seized from his person, incident to an arrest, and the contents of defendant s phone had not been previously viewed by a private party. Id. at Allowing the government to search petitioner s phone in the present action does not disrupt the Riley holding. The phone in question here was found in a public park with no clear owner in sight, was viewed by a private party, and disclosed indicia of criminal conduct. (R. at ). The facts are entirely different from the situation in Riley. Ruling in petitioner s favor today would place American society in grave danger. If petitioner prevails, future criminals will be put on notice that perpetration of a crime can be protected through use of a cell phone. This Court should not let its fear of a cell phone s capacity limit its ability to redefine the private search doctrine within the scope of modern day digital devices. The broad approach, adopted by the Fifth and Seventh circuit, affords officers the most reasonable procedure when a private party searches a container that discloses indicia of criminal conduct. Officers should be granted the authority to further inspect containers and use their professional training and experience to identify and combat criminal conduct. The government has substantial interests in public safety and national security and, although cell phone privacy is a legitimate interest of nearly every American, the Court must be careful not to extend that interest too far. 14

22 For the foregoing reasons, we pray that this court affirm the Fourteenth Circuit s holding, overruling the district court s suppression of the photos because Officer Kramer was permitted to search the album in greater detail under the private search doctrine. II. THE FOURTEENTH CIRCUIT S DECISION SHOULD BE UPHELD BECAUSE THE USE OF A CELL-SITE SIMULATOR IS NOT A SEARCH UNDER THE FOURTH AMENDMENT WHEN PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY AND SOCIETY IS NOT PREPARED TO RECOGNIZE HER EXPECATION OF PRIVACY AS REASONABLE. The Fourth Amendment guarantees the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures. U.S. Const. amend. IV. A search under the Fourth Amendment is a two-pronged inquiry. The first prong that must be addressed is whether the individual, by his conduct, has exhibited an actual (subjective) expectation of privacy whether the individual has shown that he seeks to preserve something as private. Katz v. United States, 389 U.S. 347, 351, 361 (1967). The second prong is whether the individual s subjective expectation of privacy is one that society is prepared to recognize as reasonable whether the individual s expectation, viewed objectively, is justifiable under the circumstances. Id. at 351, 353. Unreasonable searches can occur when the government violates an individual s reasonable expectation of privacy. Id. at 351. In applying this analysis, it is important to determine the nature of the specific activity at issue. Smith v. Maryland, 442 U.S. 735, 741 (1979). The activity here took the form of using a cell-site simulator to provide the location information of Petitioner s pay-as-you-go smartphone. (R ). Petitioner challenges that the phone found on her at the time of the arrest should be suppressed because the use of a Stingray constituted an unlawful search under the Fourth Amendment. The Respondent respectfully asks this Honorable Court to affirm the Fourteenth Circuit s ruling and find Petitioner as not having an actual expectation of privacy, and even if this Court finds that 15

23 Petitioner did have an actual expectation of privacy, her expectation is one that society is not prepared to recognize as reasonable. A. PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY BECAUSE SHE KNEW INFORMATION WAS CONVEYED THROUGH THE VOLUNATRY USE OF A CELL PHONE. The Fourteenth Circuit correctly determined that the Petitioner did not harbor a subjective expectation of privacy in the information her phone broadcasted to the world. A constitutional violation under the Fourth Amendment cannot occur unless the individual had a subjective expectation of privacy. Katz, 398 U.S. at 361. In determining whether the individual had a subjective expectation of privacy, the Court will inquire whether the individual sought to preserve the information as private. Id. at 351; Smith, 442 U.S. at 740. When criminals use modern technological devices to carry out criminal acts and to reduce the possibility of detection, they can hardly complain when the police take advantage of the inherent characteristics of those very devices to capture them. U.S. v. Skinner, 690 F.3d 772, 774 (2012). If a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal. Id. at 777. The law cannot be that a criminal is entitled to rely on the expected untrackability of his tools. Id. The Constitution does not protect criminals from their erroneous expectations regarding the undetectability of their modern tools. Id. If it did, then technology would help criminals at the expense of the police. Id. The crux of the issue is whether the Petitioner had harbored a subjective expectation of privacy in the information her phone broadcasted to the world. There is no inherent constitutional difference between trailing a defendant and tracking him via such technology. Id at 778. Law enforcement tactics must be allowed to advance with technological changes, in order to prevent criminals from circumventing the justice system. Id. Otherwise, dogs could not be used 16

24 to track a fugitive if the fugitive did not know that the dog hounds had his scent. Id at 777. A getaway car could not be identified and followed based on the license plate number if the driver reasonably thought that he had gotten away unseen. Skinner, at 777. Insofar as previous Petitioners complaints appear to be simply that scientific devices such as the beeper enabled the police to be more effective in detecting crime, it simply has no constitutional foundation. Id at 778. The Courts have never equated police efficiency with unconstitutionality, and this Honorable Court should decline to do so now. There have been several landmark cases in which the government has stated that criminals have no expectation of privacy through the using technology as surveillance. In Smith, after a robbery, the police traced the license plate number of the suspect. Smith v. Maryland, 442 U.S. 735, 737 (1979). The next day, the telephone company, at police request, installed a pen register at its central offices to record the numbers dialed from the telephone at the petitioner s home. Id. The police did not get a warrant or court order before having the pen register installed. Id. The register revealed that a call was soon placed from the petitioner s home to the victim s phone. Id. On the basis of this phone call and other evidence, the petitioner s home was searched and he was subsequently arrested. Id. This Court held that where a defendant was found to have no reasonable expectation of privacy in the numbers he dialed on his phone, even after that information was automated by the phone company. Skinner, at 778. The Court compared this technology to giving the numbers to a telephone operator, where they would not be confidential and said, We are not inclined to hold that a different constitutional result is required because the telephone company has decided to automate. United States v. Knotts, 460 U.S. 276, 283 (1983). Knotts was another case where the Court decided that a person does not exhibit a subjective expectation of privacy through the use of technology. In Knotts, the police, with the 17

25 consent of a chemical company, placed a beeper in a five-gallon drum of chloroform in order to track the movements of a defendant and discover the location of a clandestine drug laboratory. Knotts, at 279. Using visual surveillance, as well as the signal emitted from the beeper when police lost visual contact, law enforcement officials traced the car to a secluded cabin, where the defendant and others had been manufacturing illicit drugs. Knotts, at 278. The Supreme Court held that this monitoring did not violate the Constitution because the governmental surveillance conducted by means of the beeper in this case amounted principally to the following of an automobile on public streets and highways... a person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another. Id. at 281. Additionally, the Supreme Court noted that there was no indication that the beeper was used in any way to reveal information that would not have been visible to the naked eye. Id. at 285. United States v. Forest reveals that the court had not deterred from precedent some twenty years later. In Forest, DEA agents had lost visual contact of the defendant as he traveled on public roads to meet two suspected drug couriers. United States v. Forest, 355 F.3d 942, 947 (6th Cir. 2004). To reestablish contact, agents called the defendant s cell phone, hanging up before it rang, in order to ping or gather data on the phone s physical location. Id. Using this information, agents were able to determine the defendant s movements along a public roadway, and ultimately to arrest the defendant. Id. at 948. The Supreme Court held a similar holding as they did in Knotts, stating that such monitoring did not violate the Fourth Amendment because the DEA agents could have obtained the same information by following the defendant s car. Id. at 951. Although the DEA agents were not able to maintain visual contact with the defendant s car at all times, visual observation was possible by any member of the public. Id. The DEA 18

26 agents simply used the cell-site data to augment the sensory facilities bestowed upon them at birth, which became permissible under Knotts. Id. (quoting Knotts, at 282). United States v. Skinner is a more recent example of when the Supreme Court holds that the use of technology to catch a criminal does not constitute a Fourth Amendment violation. In Skinner, the drug runners used pay-as-you-go phones to communicate during their cross-country shipment of drugs. United States v. Skinner, 690 F.3d 772, 774 (2012). The government used data emanating from the Petitioner s pay-as-you-go phone to determine its real time location. Id. This information was used to determine the Petitioner s location and as a result of tracking the cell phone, DEA agents located the Petitioner with over 1,100 pounds of marijuana. Id. The Supreme Court held that the Petitioner did not have a reasonable expectation of privacy in the data emanating from his cell phone that showed its location. Id. at 775. The case at bar is analogous to Smith, Knotts, Forest, and Skinner. In all four of those cases, authorities used the technology they have been given to locate and arrest criminals. Even if the authorities did not have any physical surveillance on the Petitioners, the Court has constantly held that the use of technology to track a criminal does not constitute a Fourth Amendment search. The Supreme Court should not reverse its holding here. The petitioners in cases such as Skinner have also argued that they were unaware that the pay-as-you-go phones contained GPS tracking devices and therefore the technology was used to supplement, not augment, the sensory facilities. This argument is not persuasive enough to overturn the Courts twenty plus years of reasoning. Just because an individual is unaware that phones and other devices have GPS tracking, does not equate to an individual having a Fourth Amendment action. Just like Skinner, the Petitioner s movements could have been observed by any member of the public. Using a more efficient means of discovering this information does not 19

27 amount to a Fourth Amendment violation. Skinner, at 779. In any event, the Court determines whether a defendant s reasonable expectation of privacy has been violated by looking at what the defendant is disclosing to the public, and not what information is known to the police. Skinner, at 779. In this case, Petitioner had at least a minimum expectation that she could be tracked when she told Owens, these burners are untraceable, but still, they can track everyone now. (R. at 1132). If the defendant in Skinner does not find safe haven under their Fourth Amendment subjective expectation of privacy due to ignorance, then certainly Petitioner here cannot find a remedy under the Fourth Amendment when she has at least a minimum expectation that the FBI can trace her. There have been cases that have said that police intrusion using technology was a Fourth Amendment violation, but the facts in those cases are very distinguishable to the cases aforementioned and the case at bar. One of the major cases that is distinguishable from the line of reasoning aforementioned is United States v. Jones. In Jones, a tracking device was secretly placed on the defendant s car. United States v. Jones, 132 S. Ct. 945, 948 (2012). The Court explicitly relied on the trespassory nature of the police action rather than the surveillance nature of the police action. Id. at 949. The Supreme Court held that Fourth Amendment violations do occur when the government engages in the physical intrusion of a constitutionally protected area in order to obtain information. (Emphasis Added). Id. at 951. In our case, no physical intrusion occurred. The Petitioner herself obtained the cell phone for the purpose of communicating, and that phone included the GPS technology used to track the phone s whereabouts. Additionally, at the time of Petitioner s arrest, the FBI agents were twenty-five feet away from the cabin on a rural street, without any structures in the 20

SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent.

SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent. SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. No. 10-1011 NOTICE IS HEREBY GIVEN THAT the petition for writ

More information

IMPORTANT - PROVIDE THIS INFORMATION TO PERSON SIGNING SD 572. Title 18 Crimes and Criminal Procedures

IMPORTANT - PROVIDE THIS INFORMATION TO PERSON SIGNING SD 572. Title 18 Crimes and Criminal Procedures 641. Public money, property or records Title 18 Crimes and Criminal Procedures United States Code Sections 641, 793, 794, 798, and 952 Whoever embezzles, steals, purloins, or knowingly converts to his

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 10-1011 In the Supreme Court of the United States ELIZABETH JENNINGS, Petitioner, V. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent.

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent. Case No. 10-1011 In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. BRIEF FOR PETITIONER Team 15 Counsel for the Petitioner

More information

Supreme Court of The United States

Supreme Court of The United States TEAM 2 DOCKET NO. 10-1011 IN THE Supreme Court of The United States ELIZABETH JENNINGS, PETITIONER, V. UNITED STATE OF AMERICA, RESPONDENT. ON WRIT OF CERTIORARI FROM THE UNITED STATES COURT OF APPEALS,

More information

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents.

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

Supreme Court of The United States

Supreme Court of The United States No. 10-1011 In The Supreme Court of The United States ELIZABETH JENNINGS Petitioner, v. UNITED STATES OF AMERICA Respondent. ON PETITION FOR A WRIT OF CERTIORARI TO THE SUPREME COURT OF THE UNITED STATES

More information

Espionage Act of 1917

Espionage Act of 1917 Espionage Act of 1917 This act, passed during World War I, strictly limited Americans' freedom of speech in the name of wartime security. Since the Alien and Sedition Acts of the late eighteenth century,

More information

Petitioner and Cross-Respondent, Respondent and Cross-Petitioner. In the Supreme Court of the United States UNITED STATES, DAVID ELLIS,

Petitioner and Cross-Respondent, Respondent and Cross-Petitioner. In the Supreme Court of the United States UNITED STATES, DAVID ELLIS, In the Supreme Court of the United States UNITED STATES, v. Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner. On Writ of Certiorari to The United States Court of Appeals For

More information

Briefing from Carpenter v. United States

Briefing from Carpenter v. United States Written Material for Inside Oral Argument Briefing from Carpenter v. United States The mock oral argument will be based Carpenter v. United States, which is pending before the Supreme Court of the United

More information

Digitizing the Private Search Doctrine: Is a Computer a Container?

Digitizing the Private Search Doctrine: Is a Computer a Container? Digitizing the Private Search Doctrine: Is a Computer a Container? by TAYLOR J. PFINGST* Introduction The digital era has ushered in a new age, where the technology of today is almost instantaneously surpassed

More information

By Jane Lynch and Jared Wagner

By Jane Lynch and Jared Wagner Can police obtain cell-site location information without a warrant? - The crossroads of the Fourth Amendment, privacy, and technology; addressing whether a new test is required to determine the constitutionality

More information

Warrantless Access to Cell Site Location Information Takes a Hit in the Fourth Circuit:

Warrantless Access to Cell Site Location Information Takes a Hit in the Fourth Circuit: Warrantless Access to Cell Site Location Information Takes a Hit in the Fourth Circuit: The Implications of United States v. Graham for Law Enforcement Wesley Cheng Assistant Attorney General Office of

More information

United States Court of Appeals

United States Court of Appeals United States of America, v. Antoine Jones, Case: 08-3034 Document: 1278562 Filed: 11/19/2010 Page: 1 Appellee Appellant ------------------------------ Consolidated with 08-3030 1:05-cr-00386-ESH-1 Filed

More information

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES v. LICHTENBERGER Abstract: In 2015 in United States v. Lichtenberger,

More information

THE BURMA OFFICIAL SECRETS ACT

THE BURMA OFFICIAL SECRETS ACT THE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923) 1 1. This Act extends to the whole of the Union of Burma, and applies also to all citizens of the Union and all servants of the Government

More information

THE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923)

THE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923) THE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923) 1 1. This Act extends to the whole of the Union of Burma, and applies also to all all citizens of the Union and all servants of the

More information

SUPREME COURT OF THE UNITED STATES OF AMERICA

SUPREME COURT OF THE UNITED STATES OF AMERICA DOCKET NO. 2015-11 OCTOBER TERM 2015 SUPREME COURT OF THE UNITED STATES OF AMERICA ALBERT GREENE, Petitioner V. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellant, FOR PUBLICATION November 6, 2014 9:00 a.m. v No. 310416 Kent Circuit Court MAXIMILIAN PAUL GINGRICH, LC No. 11-007145-FH

More information

OFFICIAL SECRETS ACT CHAPTER 187 LAWS OF KENYA

OFFICIAL SECRETS ACT CHAPTER 187 LAWS OF KENYA LAWS OF KENYA OFFICIAL SECRETS ACT CHAPTER 187 Revised Edition 2016 [2012] Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev. 2016] CAP.

More information

The GPS Tracking Case Fourth Amendment United States Constitution

The GPS Tracking Case Fourth Amendment United States Constitution Fourth Amendment United States Constitution The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no

More information

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant.

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant. IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA JEFFREY SCOTT FAWDRY, v. Appellant, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED CASE NO.

More information

Appendix H Title 18 Crimes and Criminal Procedure, U. S. Code

Appendix H Title 18 Crimes and Criminal Procedure, U. S. Code Title 18 Crimes and Criminal Procedure, U. S. Code Part I Crimes Chapter 113 Stolen Property * * * * * * * 2318 Trafficking in counterfeit labels, illicit labels, or counterfeit documentation or packaging1

More information

Court Security Act 2005 No 1

Court Security Act 2005 No 1 New South Wales Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Objects of Act 2 4 Definitions 2 5 Operation of Act and effect on other powers 5 Entry and use of court premises

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 06-2741 UNITED STATES OF AMERICA, v. Plaintiff-Appellee, BERNARDO GARCIA, Defendant-Appellant. Appeal from the United States District Court

More information

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding CELL PHONE SEARCHES IN SCHOOLS: THE NEW FRONTIER ANDREA KLIKA I. Introduction In the age of smart phones, what once was a simple device to make phone calls has become a personal computer that stores a

More information

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Ensure that you don t go from investigator to investigated Categories of law: Stalking, online harassment & cyberstalking

More information

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District No. 13-132 IN THE DAVID LEON RILEY, v. Petitioner, STATE OF CALIFORNIA, Respondent. On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District REPLY BRIEF FOR PETITIONER Patrick

More information

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States,

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States, P21. In The SUPREME COURT OF THE UNITED STATES October Term, 2015 Docket No. 2015-11 Albert Greene, v. United States, Petitioner, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS

More information

No Supreme Court of the United States. UNITED STATES, Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner.

No Supreme Court of the United States. UNITED STATES, Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner. No. 42-9001 Supreme Court of the United States UNITED STATES, Petitioner and Cross-Respondent, v. DAVID ELLIS, Respondent and Cross-Petitioner. On Writ of Certiorari to the United States Court of Appeals

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8 Case 1:16-cr-00169-WHP Document 125 Filed 07/18/17 Page 1 of 8 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ------------------------------------------------------------X UNITED STATES OF

More information

Divided Supreme Court Requires Warrants for Cell Phone Location Data

Divided Supreme Court Requires Warrants for Cell Phone Location Data Divided Supreme Court Requires Warrants for Cell Phone Location Data July 2, 2018 On June 22, 2018, the United States Supreme Court decided Carpenter v. United States, in which it held that the government

More information

Lesson 1: Role of the Judicial Branch in the US

Lesson 1: Role of the Judicial Branch in the US Judicial Branch Powerpoint Questions 1. What is the role of federal courts? Lesson 1: Role of the Judicial Branch in the US 2. What is the purpose of the Supreme Court? 3. Define District Courts. 4. What

More information

Petitioner, Respondent.

Petitioner, Respondent. No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, Petitioner, vs. UNITED STATES OF AMERICA, Respondent. PETITIONER S REPLY BRIEF HANNAH VALDEZ GARST Law Offices of Hannah Garst 121 S.

More information

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0 1 HB410 2 191614-1 3 By Representative Williams (P) 4 RFD: Technology and Research 5 First Read: 13-FEB-18 Page 0 1 191614-1:n:02/13/2018:CMH*/bm LSA2018-168 2 3 4 5 6 7 8 SYNOPSIS: This bill would create

More information

IN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION

IN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION NORTH CAROLINA WAKE COUNTY IN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION STATE OF NORTH CAROLINA ) ) VS. ) REQUEST FOR ) VOLUNTARY DISCOVERY ) (ALTERNATIVE MOTION FOR ) DISCOVERY) Defendant.

More information

OFFICIAL SECRETS ACT OFFICIAL SECRETS ACT. Revised Laws of Mauritius. Act 13 of June Short title

OFFICIAL SECRETS ACT OFFICIAL SECRETS ACT. Revised Laws of Mauritius. Act 13 of June Short title Revised Laws of Mauritius OFFICIAL SECRETS ACT Act 13 of 1972 26 June 1972 ARRANGEMENT OF SECTIONS SECTION 1. Short title 2. Interpretation 3. Acts prejudicial to Mauritius 4. Reports of Cabinet proceedings

More information

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010 First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition

More information

Department of Legislative Services Maryland General Assembly 2011 Session

Department of Legislative Services Maryland General Assembly 2011 Session Department of Legislative Services Maryland General Assembly 2011 Session HB 599 FISCAL AND POLICY NOTE House Bill 599 Judiciary (Delegates Waldstreicher and Rosenberg) Courts and Judicial Proceedings

More information

Department of Legislative Services

Department of Legislative Services Department of Legislative Services Maryland General Assembly 2008 Session SB 972 FISCAL AND POLICY NOTE Senate Bill 972 Judicial Proceedings (Senator Forehand) Identity Fraud - Seizure and Forfeiture This

More information

III/96 OFFICIAL SECRETS CHAPTER 50. (2) If a person. 1. This Act may be cited as the Official Secrets Act.

III/96 OFFICIAL SECRETS CHAPTER 50. (2) If a person. 1. This Act may be cited as the Official Secrets Act. CHAPTER 50 Act No. 32 of 1955. AN ACT TO RESTRICT ACCESS TO AND SECRET DOCUMENTS AND TO PREVENT UNAUTHORIZED DISCLOSURE THEREOF. [1st September, 1955.} Short title. Declaration of prohibited places. 1.

More information

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception?

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception? Catholic University Law Review Volume 66 Issue 2 Winter 2016 Article 9 3-23-2017 The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2013-08 Appellant ) ) v. ) ) ORDER Technical Sergeant (E-6) ) SAMUEL A. WICKS, ) USAF, ) Appellee ) Special Panel

More information

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has FOURTH AMENDMENT WARRANTLESS SEARCHES FIFTH CIRCUIT UPHOLDS STORED COMMUNICATIONS ACT S NON- WARRANT REQUIREMENT FOR CELL-SITE DATA AS NOT PER SE UNCONSTITUTIONAL. In re Application of the United States

More information

Third District Court of Appeal State of Florida

Third District Court of Appeal State of Florida Third District Court of Appeal State of Florida Opinion filed September 24, 2014. Not final until disposition of timely filed motion for rehearing. No. 3D10-3264 Lower Tribunal No. 06-1071 K Omar Ricardo

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, JUAN PINEDA-MORENO, No. 08-30385 Plaintiff-Appellee, D.C. No. v. 1:07-CR-30036-PA Defendant-Appellant. OPINION

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-5 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENROLLED, An Act, 5 Relating to consumer protection; to require certain 6 entities

More information

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Defending Freedom on the Electronic Frontier eff.org Know Your Rights Your computer, phone, and other digital devices hold vast amounts of personal

More information

United States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment

United States v. Jones: The Foolish revival of the Trespass Doctrine in Addressing GPS Technology and the Fourth Amendment Valparaiso University Law Review Volume 47 Number 2 pp.277-288 Winter 2013 United States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment Brittany

More information

Appellate Division, Third Department - People v. Mabeus

Appellate Division, Third Department - People v. Mabeus Touro Law Review Volume 26 Number 3 Annual New York State Constitutional Issue Article 14 July 2012 Appellate Division, Third Department - People v. Mabeus Christina Pinnola Follow this and additional

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 13-212 In the Supreme Court of the United States UNITED STATES OF AMERICA, PETITIONER v. BRIMA WURIE ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT

More information

United States Court of Appeals

United States Court of Appeals cr United States v. Jones 0 0 0 In the United States Court of Appeals For the Second Circuit AUGUST TERM, 0 ARGUED: AUGUST, 0 DECIDED: JUNE, 0 No. cr UNITED STATES OF AMERICA, Appellee, v. RASHAUD JONES,

More information

COVINGTON POLICE DEPARTMENT STANDARD OPERATING PROCEDURE

COVINGTON POLICE DEPARTMENT STANDARD OPERATING PROCEDURE COVINGTON POLICE DEPARTMENT STANDARD OPERATING PROCEDURE Subject: SEARCH AND SEIZURE Date of Issue: 01-01-1999 Number of Pages: 6 Policy No. P220 Review Date: 06-01-2007 Distribution: Departmental Revision

More information

2:12-cr SFC-MKM Doc # 227 Filed 12/06/13 Pg 1 of 12 Pg ID 1213 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

2:12-cr SFC-MKM Doc # 227 Filed 12/06/13 Pg 1 of 12 Pg ID 1213 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION 2:12-cr-20218-SFC-MKM Doc # 227 Filed 12/06/13 Pg 1 of 12 Pg ID 1213 United States of America, Plaintiff, UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION v. Criminal Case No.

More information

IC Chapter 5. Search and Seizure

IC Chapter 5. Search and Seizure IC 35-33-5 Chapter 5. Search and Seizure IC 35-33-5-0.1 Application of certain amendments to chapter Sec. 0.1. The amendments made to section 5 of this chapter by P.L.17-2001 apply to all actions of a

More information

A BRIEF REVIEW OF PROBABLE CAUSE PROCEDURES IN THE HARRIS COUNTY JUSTICE COURTS

A BRIEF REVIEW OF PROBABLE CAUSE PROCEDURES IN THE HARRIS COUNTY JUSTICE COURTS A BRIEF REVIEW OF PROBABLE CAUSE PROCEDURES IN THE HARRIS COUNTY JUSTICE COURTS What is Probable Cause The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-4 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENGROSSED 5 6 7 A BILL 8 TO BE ENTITLED 9 AN ACT 10 11 Relating to consumer protection;

More information

THE SUPREME COURT OF NEW HAMPSHIRE THE STATE OF NEW HAMPSHIRE JONATHAN BALL. Argued: June 13, 2012 Opinion Issued: September 28, 2012

THE SUPREME COURT OF NEW HAMPSHIRE THE STATE OF NEW HAMPSHIRE JONATHAN BALL. Argued: June 13, 2012 Opinion Issued: September 28, 2012 NOTICE: This opinion is subject to motions for rehearing under Rule 22 as well as formal revision before publication in the New Hampshire Reports. Readers are requested to notify the Reporter, Supreme

More information

Cell Site Simulator Privacy Model Bill

Cell Site Simulator Privacy Model Bill Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellee, UNPUBLISHED March 21, 2013 v No. 309961 Washtenaw Circuit Court LYNDON DALE ABERNATHY, LC No. 10-002051-FH Defendant-Appellant.

More information

STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY. vs. Case No. 12 CF BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE

STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY. vs. Case No. 12 CF BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY STATE OF WISCONSIN, Plaintiff, vs. Case No. 12 CF 000000 JOHN DOE, Defendant. BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE THE DEFENDANT, John Doe,

More information

STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT STATE OF LOUISIANA VERSUS. Judgment Rendered June

STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT STATE OF LOUISIANA VERSUS. Judgment Rendered June STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT NO 2007 KA 2009 STATE OF LOUISIANA VERSUS ll n MATTHEW G L CONWAY Judgment Rendered June 6 2008 Appealed from the 18th Judicial District Court In and for

More information

No IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, PETITIONER UNITED STATES OF AMERICA

No IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, PETITIONER UNITED STATES OF AMERICA No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, PETITIONER v. UNITED STATES OF AMERICA ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SEVENTH CIRCUIT

More information

THE OFFICIAL SECRETS ACT, 1923 ARRANGEMENT OF SECTIONS

THE OFFICIAL SECRETS ACT, 1923 ARRANGEMENT OF SECTIONS SECTIONS 1. Short title, extent and application. 2. Definitions. 3. Penalties for spying. THE OFFICIAL SECRETS ACT, 1923 ARRANGEMENT OF SECTIONS 4. Communications with foreign agents to be evidence of

More information

State of New York Supreme Court, Appellate Division Third Judicial Department

State of New York Supreme Court, Appellate Division Third Judicial Department State of New York Supreme Court, Appellate Division Third Judicial Department Decided and Entered: June 5, 2008 101104 THE PEOPLE OF THE STATE OF NEW YORK, Respondent, v OPINION AND ORDER SCOTT C. WEAVER,

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

Court of Appeals of New York - People v. Weaver

Court of Appeals of New York - People v. Weaver Touro Law Review Volume 26 Number 3 Annual New York State Constitutional Issue Article 13 July 2012 Court of Appeals of New York - People v. Weaver Michelle Kliegman Follow this and additional works at:

More information

CASE NO. 1D The petition in this matter seeks to quash a discovery order in a wrongful

CASE NO. 1D The petition in this matter seeks to quash a discovery order in a wrongful IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA TAMMY LEE ANTICO, PERSONAL REPRESENTATIVE OF THE ESTATE OF TABITHA FRANCES GUYTON ANTICO, DECEASED, NOT FINAL UNTIL TIME EXPIRES TO FILE

More information

Act Name : THE OFFICIAL SECRETS ACT, 1923 Act title : ACT NO. 19 OF * 3* * * * * Enactment date : [2nd April, 1923.]

Act Name : THE OFFICIAL SECRETS ACT, 1923 Act title : ACT NO. 19 OF * 3* * * * * Enactment date : [2nd April, 1923.] Act Name : THE OFFICIAL SECRETS ACT, 1923 Act title : ACT NO. 19 OF 1923 1* 3* * * * * Enactment date : [2nd April, 1923.] THE OFFICIAL SECRETS ACT, 1923 ACT NO. 19 OF 1923 1* 3* * * * * [2nd April, 1923.]

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN DECISION AND ORDER DENYING DEFENDANT S MOTION TO SUPPRESS EVIDENCE (DKT. NO.

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN DECISION AND ORDER DENYING DEFENDANT S MOTION TO SUPPRESS EVIDENCE (DKT. NO. UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN UNITED STATES OF AMERICA, Case No. 15-CR-216-PP Plaintiff, v. JAMES G. WHEELER, Defendant. DECISION AND ORDER DENYING DEFENDANT S MOTION TO SUPPRESS

More information

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION Many of us 1 have experienced that sinking feeling before: the moment you realize that your cell phone is missing. First, it is the

More information

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 No. 15 of 2017 Second Session Eleventh Parliament Republic of Trinidad and Tobago HOUSE OF REPRESENTATIVES BILL

More information

Chief of Police: Review Date: July 1

Chief of Police: Review Date: July 1 Directive Type: General Order Effective Date 05-17-2016 General Order Number: 05.09 Subject: Legal Process and Court Appearances Amends/Supersedes: Section 05, Chapter 09, Legal Process, revised 2008 Distribution:

More information

Act Implementing Article 26(2) of the Basic Law (War Weapons Control Act) of April 20, 1961 (1961 Federal Law Gazette I 444)

Act Implementing Article 26(2) of the Basic Law (War Weapons Control Act) of April 20, 1961 (1961 Federal Law Gazette I 444) Act Implementing Article 26(2) of the Basic Law (War Weapons Control Act) of April 20, 1961 (1961 Federal Law Gazette I 444) (as amended by Article 2 of the Act of July 6, 1998 Implementing the Convention

More information

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes BUSINESS LAW Chapter 8 Criminal Law and Cyber Crimes Learning Objectives List and describe the essential elements of a crime. Describe criminal procedure, including arrest, indictment, arraignment, and

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 14 1003 UNITED STATES OF AMERICA, Plaintiff Appellee, v. FRANK CAIRA, Defendant Appellant. Appeal from the United States District Court

More information

3121. General prohibition on pen register and trap and trace device use; exception

3121. General prohibition on pen register and trap and trace device use; exception UNITED STATES CODE ANNOTATED TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART II--CRIMINAL PROCEDURE CHAPTER 206--PEN REGISTERS AND TRAP AND TRACE DEVICES 3121. General prohibition on pen register and trap

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 16-402 In the Supreme Court of the United States TIMOTHY IVORY CARPENTER, PETITIONER v. UNITED STATES OF AMERICA ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SIXTH

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO Case 2:13-cv-00257-BLW Document 27 Filed 06/03/14 Page 1 of 8 ANNA J. SMITH IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO Plaintiff, Case No. 2:13-CV-257-BLW v. MEMORANDUM DECISION BARACK

More information

MOTION TO SUPPRESS. 1. Approximately 78 grams of marijuana seized from the co-defendants vehicle on

MOTION TO SUPPRESS. 1. Approximately 78 grams of marijuana seized from the co-defendants vehicle on STATE OF NORTH CAROLINA COUNTY OF WAKE IN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION FILE NO. 08CRSXXXXX STATE OF NORTH CAROLINA vs. SP MOTION TO SUPPRESS COMES NOW, Defendant, SP, by and through

More information

NAPD Formal Ethics Opinion 16-1

NAPD Formal Ethics Opinion 16-1 NAPD Formal Ethics Opinion 16-1 Question: The Ethics Counselors of the National Association for Public Defense (NAPD) have been asked to address the following scenario: An investigator working for Defense

More information

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as "the Contracting Parties";

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as the Contracting Parties; Draft AGREEMENT BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE SWISS CONFEDERATION REGARDING MUTUAL ASSISTANCE BETWEEN THEIR CUSTOMS ADMINISTRATIONS The Government of

More information

IN THE SUPREME COURT OF THE UNITED STATES. OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner. UNITED STATES OF AMERICA, Respondent

IN THE SUPREME COURT OF THE UNITED STATES. OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner. UNITED STATES OF AMERICA, Respondent IN THE SUPREME COURT OF THE UNITED STATES OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner v. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS

More information

UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME

UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME UNITED NATIONS 2000 UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Article 1 Statement of purpose The purpose of this Convention

More information

CASE NO. 1D Pamela Jo Bondi, Attorney General, Jay Kubica, Assistant Attorney General, Tallahassee, for Appellant/Cross-Appellee.

CASE NO. 1D Pamela Jo Bondi, Attorney General, Jay Kubica, Assistant Attorney General, Tallahassee, for Appellant/Cross-Appellee. IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA STATE OF FLORIDA, v. Appellant/Cross-Appellee, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED

More information

2. In this Act, unless the context otherwise. 1. This Act may be cited as the Official Secrets Act , No. 77

2. In this Act, unless the context otherwise. 1. This Act may be cited as the Official Secrets Act , No. 77 1951] Official Secrets [No. 77 555 NEW ZEALAND ANALYSIS Title. 1. Short Title. 2. Interpretation. 3. Spying. 4. Communications with for e i g n agents to be evidence of certain offences. 5. Unlawful use

More information

CARPENTER V. UNITED STATES: HOW MANY CELL PHONE LOCATION POINTS CONSTITUTE A SEARCH UNDER THE FOURTH AMENDMENT?

CARPENTER V. UNITED STATES: HOW MANY CELL PHONE LOCATION POINTS CONSTITUTE A SEARCH UNDER THE FOURTH AMENDMENT? CARPENTER V. UNITED STATES: HOW MANY CELL PHONE LOCATION POINTS CONSTITUTE A SEARCH UNDER THE FOURTH AMENDMENT? DOUGLAS HARRIS* INTRODUCTION Did you know that cell-phone service providers collect and store

More information

CRS Report for Congress

CRS Report for Congress Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act

More information

State of Wisconsin: Circuit Court: Milwaukee County: v. Case No. 2008CF000567

State of Wisconsin: Circuit Court: Milwaukee County: v. Case No. 2008CF000567 State of Wisconsin: Circuit Court: Milwaukee County: State of Wisconsin, Plaintiff, v. Case No. 2008CF000567 Miguel Ayala, and Carlos Gonzales, Defendant. Motion to Suppress Evidence Seized as a Result

More information

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms

Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms By: Jacob Trombley All Canadian citizens have the right to be secure against unreasonable

More information

No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent.

No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES 2016 ALBERTA CAPINE, Petitioner. v. UNITED STATES, Respondent. On Argument to the United States Supreme Court from Judgment Entered by the Twelfth

More information

United States District Court

United States District Court Case:0-cr-00-JSW Document Filed0/0/0 Page of NOT FOR CITATION IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA UNITED STATES OF AMERICA, 0 Plaintiff, No. CR 0-00 JSW v. ANDREW

More information

OFFICIAL SECRETS ACT

OFFICIAL SECRETS ACT OFFICIAL SECRETS ACT ARRANGEMENT OF SECTIONS 1. Protection of official information, etc. 2. Protection of defence establishments, etc. 3. Restrictions on photography, etc., during periods of emergency.

More information

Follow this and additional works at:

Follow this and additional works at: University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange Tennessee Department of State, Opinions from the Administrative Procedures Division Law 3-24-2008 TENNESSEE DEPARTMENT

More information

TELECOMMUNICATIONS AND POSTAL OFFENCES ACT

TELECOMMUNICATIONS AND POSTAL OFFENCES ACT TELECOMMUNICATIONS AND POSTAL OFFENCES ACT ARRANGEMENT OF SECTIONS PART I Telecommunication offences 1. Tampering with wireless cables, etc. 2. Illegal operation of telephone call offices, etc. 3. Radio

More information

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL.

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. Riley v. California, 134 S. Ct. 2473 (2014). 1 STEWART JAMES ALVIS In

More information

DEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense.

DEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense. DEFINITIONS Words and Phrases The following words and phrases have the meanings indicated when used in this chapter according to Black s Law Dictionary, common dictionary, and/or are distinctive to law

More information

Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED. Updated to 30 June 2017

Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED. Updated to 30 June 2017 Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED Updated to 30 June 2017 This Revised Act is an administrative consolidation of the. It is prepared by the Law Reform Commission in accordance

More information