No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent.
|
|
- Philomena Mitchell
- 5 years ago
- Views:
Transcription
1 No IN THE SUPREME COURT OF THE UNITED STATES Elizabeth Jennings, Petitioner v. United States of America, Respondent. On Writ of Certiorari to the United States Supreme Court of the United States Court of Appeals for the Fourteenth Circuit BRIEF FOR RESPONDENT TEAM 4 Counsel for Respondent 1
2 Table of Contents QUESTIONS PRESENTED... iii OPINIONS BELOW... iii CONSTITUTIONAL PROVISIONS AND RULES...iv INTRODUCTION... 1 STATEMENT OF THE CASE... 3 ARGUMENT... 7 I. THE FOURTEENTH CIRCUIT PROPERLY REVERSED THE DISTRICT COURT S SUPPRESSION OF THE PHOTOS BECAUSE THE PRIVATE SEARCH DOCTRINE PERMITTED OFFICER KRAMER TO SEARCH THE PHONE S PHOTO ALBUM IN GREATER DETAIL A. WHEN A PRIVATE SEARCH REVEALS ILLEGAL CONDUCT, THE BROAD INTERPRETATION OF THE PRIVATE SEARCH DOCTRINE BEST ENCOMPASSES THE REASONABLENESS STANDARD OF THE FOURTH AMENDMENT B. OFFICER KRAMER REMAINED WITHIN ONE CONTAINER WHEN HE SEARCHED THE CELL PHONE AND, THEREFORE, REMAINED WITHIN THE SCOPE OF NIGHTINGALE S SEARCH C. THE GOVERNMENT S INTEREST IN PROMOTING PUBLIC HEALTH AND NATIONAL SECURITY GREATLY OUTWEIGHS PETITIONER S INTEREST IN SOLICITING CONFIDENTIAL GOVERNMENT INFORMATION. 13 II. THE FOURTEENTH CIRCUIT S DECISION SHOULD BE UPHELD BECAUSE THE USE OF A CELL-SITE SIMULATOR IS NOT A SEARCH UNDER THE FOURTH AMENDMENT WHEN PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY AND SOCIETY IS NOT PREPARED TO RECOGNIZE HER EXPECATION OF PRIVACY AS REASONABLE A. PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY BECAUSE SHE KNEW INFORMATION WAS CONVEYED THROUGH THE VOLUNATRY USE OF A CELL PHONE B. PETITIONER S OBJECTIVE EXPECTATION OF PRIVACY IS UNREASONABLE BECAUSE SHE VOLUNTARILY DISCLOSED HER LOCATION INFORMATION TO THIRD PARTIES C. PETITIONER S OBJECTIVE EXPECTATION OF PRIVACY IS UNREASONABLE BECAUSE THE SURVEILLANCE DONE BY AUTHORITIES WAS LESS INTRUSIVE THAN PRECEDENT CONCLUSION i
3 TABLE OF AUTHORITIES UNITED STATES SUPREME COURT CASES Burdeau v. McDowell, 256 U.S. 465 (1921)... 7, 9 Coolidge v. New Hampshire, 403 U.S. 443 (1971)... 7 Katz v. United States, 389 U.S. 347 (1967)... 15, 16, 21 Riley v. California, 134 S. Ct (2014)... passim Smith v. Maryland, 442 U.S. 735 (1979)... passim United States v. Jacobson, 466 U.S. 109 (1984)... passim United States v. Jones, 132 S. Ct. 945 (2012)... 7, 20, 22, 23 United States v. Knotts, 460 U.S. 276 (1983)... 17, 18 United States v. Miller, 425 U.S. 435 (1976) OTHER FEDERAL CASES Rann v. Atchison, 689 F.3d 832 (7th Cir. 2012)... passim U.S. v. Skinner, 690 F.3d 772 (2012)... 16, 17, 19, 23 United States v. Forest, 355 F.3d 942 (6th Cir. 2004) United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015)... 8, 10, 13 United States v. Runyan, 275 F.3d 449 (5th Cir. 2001)... passim United States v. Sparks, 806 F.3d 1323 (11th Cir. 2015)... 8, 9 CONSTITUTIONAL PROVISIONS U.S. Const. amend. IV... 7, 15 STATUTES 18 U.S.C OTHER SOURCES About DOJ, The United States Department of Justice, (Feb. 9, 2018) ii
4 QUESTIONS PRESENTED I. Under what circumstances the private search exception to the Fourth Amendment permits a law enforcement agent to view photos on a cell phone beyond those viewed by the private party. II. Whether and when use of a cell-site simulator to identify the location of a target s mobile phone is a Fourth Amendment search. OPINIONS BELOW The United States District Court for the District of Arcadia ( District Court ) granted Petitioner s motion to suppress the photos viewed by Officer Kramer that were not viewed by Larry Nightingale on the phone Dr. Sam Owens used, and the phone found on Petitioner at the time of her arrest. The United States Court of Appeals for the Fourteenth Circuit ( Fourteenth Circuit ) reversed the order of the District Court in United States v. Jennings because, under the private search doctrine, the photographs were improperly suppressed and the use of a cell-site simulator is not a search because there is no expectation of privacy in information conveyed through the voluntary use of a cell phone. Jennings, 913 F.3d 1131, 1134, 1136 (14th Cir. 2017). iii
5 CONSTITUTIONAL PROVISIONS AND RULES The Fourth Amendment of the U.S. Constitution: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. Const. amend. IV. Gathering, transmitting or losing defense information: (a) Whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information is to be used to the injury of the United States, or to the advantage of any foreign nation, goes upon, enters, flies over, or otherwise obtains information concerning any vessel, aircraft, work of defense, navy yard, naval station, submarine base, fueling station, fort, battery, torpedo station, dockyard, canal, railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or signal station, building, office, research laboratory or station or other place connected with the national defense owned or constructed, or in progress of construction by the United States or under the control of the United States, or of any of its officers, departments, or agencies, or within the exclusive jurisdiction of the United States, or any place in which any vessel, aircraft, arms, munitions, or other materials or instruments for use in time of war are being made, prepared, repaired, stored, or are the subject of research or development, under any contract or agreement with the United States, or any department or agency thereof, or with any person on behalf of the United States, or otherwise on behalf of the United States, or any prohibited place so designated by the President by proclamation in time of war or in case of national emergency in which anything for the use of the Army, Navy, or Air Force is being prepared or constructed or stored, information as to which prohibited place the President has determined would be prejudicial to the national defense; or (b) Whoever, for the purpose aforesaid, and with like intent or reason to believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or obtain, any sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, document, writing, or note of anything connected with the national defense; or (c) Whoever, for the purpose aforesaid, receives or obtains or agrees or attempts to receive or obtain from any person, or from any source whatever, any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note, of anything connected with the national defense, knowing or having reason to believe, at the time he receives or obtains, or agrees or attempts to receive or obtain it, that it has been or will be obtained, taken, made, or disposed of by any person contrary to the provisions of this chapter; or (d) Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, iv
6 plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it; or (e) Whoever having unauthorized possession of, access to, or control over any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it; or (f) Whoever, being entrusted with or having lawful possession or control of any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, note, or information, relating to the national defense, (1) through gross negligence permits the same to be removed from its proper place of custody or delivered to anyone in violation of his trust, or to be lost, stolen, abstracted, or destroyed, or (2) having knowledge that the same has been illegally removed from its proper place of custody or delivered to anyone in violation of its trust, or lost, or stolen, abstracted, or destroyed, and fails to make prompt report of such loss, theft, abstraction, or destruction to his superior officer-- Shall be fined under this title or imprisoned not more than ten years, or both. (g) If two or more persons conspire to violate any of the foregoing provisions of this section, and one or more of such persons do any act to effect the object of the conspiracy, each of the parties to such conspiracy shall be subject to the punishment provided for the offense which is the object of such conspiracy. (h)(1) Any person convicted of a violation of this section shall forfeit to the United States, irrespective of any provision of State law, any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, from any foreign government, or any faction or party or military or naval force within a foreign country, whether recognized or unrecognized by the United States, as the result of such violation. For the purposes of this subsection, the term State includes a State of the United States, the District of Columbia, and any commonwealth, territory, or possession of the United States. (2) The court, in imposing sentence on a defendant for a conviction of a violation of this section, shall order that the defendant forfeit to the United States all property described in paragraph (1) of this subsection. v
7 (3) The provisions of subsections (b), (c), and (e) through (p) of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853(b), (c), and (e)- (p)) shall apply to-- (A) property subject to forfeiture under this subsection; (B) any seizure or disposition of such property; and (C) any administrative or judicial proceeding in relation to such property, if not inconsistent with this subsection. (4) Notwithstanding section 524(c) of title 28, there shall be deposited in the Crime Victims Fund in the Treasury all amounts from the forfeiture of property under this subsection remaining after the payment of expenses for forfeiture and sale authorized by law. 18 U.S.C.A. 793 (West). vi
8 INTRODUCTION This Court should affirm the Fourteenth Circuit s opinion because it correctly held that the private search doctrine permitted Officer Kramer to search the phone s photo album in greater detail. Additionally, the Fourteenth Circuit correctly held that the use of a cell-site simulator is not a search under the Fourth Amendment when Ms. Jennings did not exhibit an actual expectation of privacy, and even if Ms. Jennings did exhibit an actual expectation of privacy, society is not prepared to recognize her expectation of privacy as reasonable. The Fourteenth Circuit correctly held that the private search doctrine permitted Officer Kramer to search the phone s photo album in greater detail. The Fourth Amendment protects citizens from unreasonable searches and seizures; however, that protection is only valid against government action and is inapplicable to a search performed by a private party. The private search doctrine permits law enforcement officials to perform a warrantless search of a container when the reasonable expectation of privacy in that container has already been frustrated by a private party. When Ms. Jennings s phone was found in a public park, opened by a private party, and disclosed illegal conduct, Ms. Jennings lost all privacy interests in that specific container. Although the private search doctrine has been applied to digital devices inconsistently, the broad interpretation best equips law enforcement to carry out its mission of ensuring public safety, preventing and controlling crime, and safeguarding our nation s security against foreign or domestic threats. Ms. Jennings s solicitation of confidential government documents was in direct violation of a federal statute and thus Officer Kramer should be permitted, under the broad interpretation of the private search doctrine, to search the phone s photo album in greater detail. Additionally, the Fourteenth Circuit correctly held that the use of a cell-site simulator is not a search under the Fourth Amendment. A search under the Fourth Amendment is a two- 1
9 pronged inquiry. The first prong that must be addressed is whether the individual, by his conduct, has exhibited an actual expectation of privacy. The second prong is whether the individual s actual expectation of privacy is one that society is prepared to recognize as reasonable under the circumstances. In determining whether Ms. Jennings had an actual expectation of privacy, the Court inquires whether the individual sought to preserve the information as private. There has been a line of precedent cases of more than twenty years that has held that there is no constitutional difference between trailing a defendant and tracking him via technology. This case falls right in line with precedent because the FBI used a cell-site simulator to track the location services of Ms. Jennings s cell phone. Furthermore, she told Dr. Owens explicitly that the FBI is able to track anyone now. Even if Ms. Jennings did exhibit an actual expectation of privacy, society is not ready to declare her expectation of privacy as reasonable. The Courts have consistently held that a person has no legitimate expectation of privacy in the information he or she voluntarily turns over to third parties. In this instance, Ms. Jennings, in using the cell phone, voluntarily handed over her information to the cell-phone company. Additionally, the Court has looked at the operative facts surrounding surveillance in precedent cases and has held that surveillance for even a few days does not entitle Ms. Jennings to an expectation of privacy that society is ready to declare reasonable. 2
10 STATEMENT OF THE CASE This case involves the use of a cell phone to perpetrate crime and threaten national security. Elizabeth Jennings (hereinafter Petitioner ) was a co-manager of a small travel agency and lived in suburban Arcadia with her two children and her husband, Philip. (R. at 1131). By her own account, Petitioner lived an entirely ordinary life. (R. at 1131). The FBI alleges, however, that Petitioner and her husband are both undercover agents working for the FSB, the Russian equivalent of the CIA. (R. at 1131). Specifically, the FBI alleges that Petitioner and her husband illegally entered the United States some time during the 1980 s, assumed false identities, and have lived as American citizens since that time. (R. at 1131). Additionally, the FBI further alleges that Petitioner and her husband have worked to recruit agents within the United States to provide themselves with intelligence on U.S. defense systems in exchange for money. (R. at 1131). Petitioner contests these accusations. (R. at 1131). On an undisclosed date, Petitioner was at a bar and struck up a conversation with a patron next to her, Dr. Sam Owens (hereinafter Owens ). (R. at 1132). Owens was a nuclear physicist employed by the private corporation Network Simulations Company (hereinafter Netsimco ). (R. at 1131). Owens suffers from a gambling addiction and was several hundreds of thousands of dollars in debt when he met Petitioner. (R. at 1132). Netsimco was on contract with the U.S. Department of Energy and has been working on a space laser, which would destroy incoming nuclear weapons. (R. at ). At the bar, Owens, in an inebriated state, revealed to Petitioner that he worked on a space laser at Netsimco and was deeply in debt. (R. at 1132). At the time of the suppression hearing, Owens was cooperating with the FBI and testified that Petitioner suggested that in exchange for money, Owens would take pictures of the space laser schematics with a cell phone provided by 3
11 Petitioner. (R. at 1132). Owens agreed. (R. at 1132). Petitioner handed Owens a pay-as-you-go cellphone and told him to memorize three steps: (1) take pictures of the space laser and its schematics with the phone; (2) tape the phone to the bottom of a certain park bench in Arcadia Central Park; and (3) call a specified phone number, allow it to ring four times, and then hang up. (R. at 1132). The final step would indicate to Petitioner to come and collect the phone from the bench. (R. at 1132). Petitioner instructed Owens to remove the battery until he was ready to use it since, Petitioner explained, these burners are untraceable, but still, they can track everyone now. (R. at 1132). Owens agreed to follow instructions. (R. at 1132). Uncertain he would remember the number, Owens took a picture of the napkin with the phone number Petitioner had given him. (R. at 1132). Owens had no other information on the phone at this point. (R. at 1132). The next day, Owens snuck into his supervisor s office and took pictures of the schematics, took pictures of the laser itself, and walked to the agreed park bench in Arcadia Central Park. (R. at 1132). He called the number Petitioner gave him, allowed it to ring four times, hung up, and fastened the phone to the bottom of the bench. (R. at 1132). As Owens left the park, Larry Nightingale (hereinafter Nightingale ) had watched Owens tape the phone to the bench. (R. at 1132). Nightingale removed the phone from the bench, activated it, unlocked it using the passcode , and opened the Photos application. (R. at 1132). Nightingale opened several photos and saw one containing a document with the heading TOP SECRET UNAUTHORIZED DISTRIBUTION FORBIDDEN UNDER PENALTY OF LAW. (R. at ). Alarmed by the suspicious circumstances, Nightingale called the police and described the images he saw. (R. at 1133). He did not scroll through the entire album. (R. at 1133). 4
12 Officer Kramer (hereinafter Kramer ), an Arcadia police officer, arrived on the scene. (R. at 1133). Nightingale showed Kramer the image of the schematic he observed. (R. at 1133). Kramer took the phone and then zoomed out to a screen full of smaller thumbnail images. (R. at 1133). Kramer scrolled through the album of around 100 photos and focused his attention on the photographs that depicted schematics. (R. at 1133). There were approximately 24 other photographs unseen by Nightingale that all depicted schematics and bore the Top Secret heading. (R. at 1133). He saw another photo that looked like a satellite. (R. at 1133). The final photograph in the album was of the phone number Petitioner provided written on a napkin. (R. at 1133). Kramer tapped on the image with the napkin because this was the only photo he was not able to clearly see. (R. at 1133). After viewing the image, he recorded the phone number. (R. at 1133). Arcadia police then transferred the investigation to the FBI. (R. at 1133). The FBI was able to quickly identify Owens through security footage of the park. (R. at 1133). The FBI found and interrogated Owens. (R. at 1133). Owens told them that he had no idea who the woman was and that he didn t know how to contact her except by using the number found on the napkin. (R. at 1133). To begin their investigation, the FBI contacted the cell provider for the number, and the company voluntarily informed the FBI that the phone had most recently connected with a cell phone tower somewhere within a 10-mile radius around the Arcadia National Forest. (R. at 1133). The FBI set out to find the user of the cell-phone in the forest using a cell-phone simulator (hereinafter stingray ). (R. at 1133). FBI agents drove around the Arcadia National Forest area until their stingray informed them that they were 25 feet away from the cell phone, which was inside a cabin. (R. at 1134). The agents were parked on a rural street. (R. at 1134). There were no other structures in the area. 5
13 (R. at 1134). As they were parked, they heard the sound of a door close, and went around the back of the cabin where they discovered Petitioner running away. (R. at 1134). On her person at the time of the arrest, FBI agents discovered the cell phone with the number Owens had written on the napkin and called. (R. at 1134). This phone was also a pay-as-you-go smartphone with no other contents than a record of a call from the phone Owens had used. (R. at 1134). The government charged Petitioner with conspiracy to obtain information relating to national defense that she was not entitled to receive in violation of 18 U.S.C (R. at 1134). The government and defense have stipulated that (1) Petitioner had standing to challenge the search of her phone; and (2) the phone was not abandoned. (R. at 1134). 6
14 ARGUMENT I. THE FOURTEENTH CIRCUIT PROPERLY REVERSED THE DISTRICT COURT S SUPPRESSION OF THE PHOTOS BECAUSE THE PRIVATE SEARCH DOCTRINE PERMITTED OFFICER KRAMER TO SEARCH THE PHONE S PHOTO ALBUM IN GREATER DETAIL. Justice Sotomayor asserted that technology may alter the relationship between citizen and government in a way that is inimical to democratic society. United States v. Jones, 132 U.S. 945 (2012). The emergence of the Internet, the smartphone, and other complex digital devices has changed the way Americans do business, communicate, and store and transmit information. Riley v. California, 134 S. Ct. 2473, 2484 (2014). (highlighting the pervasiveness of cell phones in American society). In the modern digital era, courts have had to re-define constitutional rights within the scope of many new technologies. Id. at The Fourth Amendment establishes the right of people to be secure against unreasonable searches and seizures. U.S. Const. amend. IV. This protection proscribes only governmental action; it is wholly inapplicable to a search and seizure, even an unreasonable one, effected by a private individual not acting as an agent of the government or with the participation or knowledge of a government official. Burdeau v. McDowell, 256 U.S. 465 (1921). When a private party provides police with evidence obtained in the course of a private search, the police need not stop the private party or avert their eyes. Coolidge v. New Hampshire, 403 U.S. 443, 489 (1971). Rather, the question becomes whether the police exceed the scope of the private search. United States v. Jacobson, 466 U.S. 109 (1984). Any additional invasions of privacy by the government must be tested by the degree which they exceeded the scope of the private search. Id. at 115. Recently, courts have struggled to define how the Fourth Amendment applies to police searches of digital items that have already been inspected by private parties. See United States v. 7
15 Sparks, 806 F.3d 1323, 1336 (11th Cir. 2015) (ruling that an officer s warrantless search of a video exceeded--not replicated the breadth of the private search ); United States v. Lichtenberger, 786 F.3d 478, 488 (6th Cir. 2015) (concluding that the officer s search of a personal laptop must stay within the scope of the initial search ); Rann v. Atchison, 689 F.3d 832, 836 (7th Cir. 2012) (finding no Fourth Amendment violation because police were substantially certain their search of defendant s digital media devices would reveal child pornography); United States v. Runyan, 275 F.3d 449, 465 (5th Cir. 2001) ( police do not exceed the scope of a prior private search when they examine particular items within a container that were not examined by the private searchers ). Defining the scope of the private search doctrine and its application to digital devices has been the subject of a current circuit split. The two varying approaches taken by the circuits are most commonly referred to as the broad approach and the narrow approach. See Sparks, 806 F.3d 1323; Runyan, 275 F.3d 449. The broad approach, which has been adopted by the Fifth and Seventh circuits, states that when a private party searches any part of a single unit, the privacy interests in the entire unit are frustrated and the unit may be searched in its entirety without implicating the Fourth Amendment. See Runyan, 275 F.3d at 463; Rann, 689 F.3d at 837. The narrow approach, which has been adopted by the Sixth and Eleventh Circuits, states that when a private party searches only a part of a single unit, only the privacy interest in those specific items is frustrated, rather than the entire unit, and any subsequent search requires a warrant. Sparks, 806 F.3d at 1336; Lichtenberger, 786 F.3d at 489. Some prevailing factors emerge from the totality of the cases that must be present for the broad approach to apply. First, the private search must reveal indicia of illegal conduct. See Jacobson, 466 U.S. at 117. Second, the responding government agent or law enforcement official must remain within the container that was 8
16 previously searched by the private party, although the officer may search that container in greater detail. See Runyan, 275 F. 3d at 464; Rann, 689 F.3d at 837. Third, the government must demonstrate a compelling interest that outweighs the individual s interest in privacy. Riley, 134 S.Ct. at If all of these factors are met, the broad approach affords officers the most reasonable procedure to safeguard the public, while not infringing on the Fourth Amendment. A. WHEN A PRIVATE SEARCH REVEALS ILLEGAL CONDUCT, THE BROAD INTERPRETATION OF THE PRIVATE SEARCH DOCTRINE BEST ENCOMPASSES THE REASONABLENESS STANDARD OF THE FOURTH AMENDMENT. When a private search reveals indicia of illegal conduct, principles of reasonableness permit government officials to search the opened container in its entirety. Jacobson, 466 U.S The key question in any Fourth Amendment case is the extent to which the government invaded a person s reasonable expectation of privacy. Burdeau, 256 U.S. at 465. Within the context of the private search doctrine, the reasonableness test must be applied to government action taken subsequent to a private search and must be appraised on the basis of the facts as they existed at the time the invasion occurred. Jacobson, 466 U.S. at 115. The Fourth Amendment is implicated only if the authorities use information with respect to which the expectation of privacy has not already been frustrated. Id. at 117. In Jacobson, this Court found that when a private party s search discloses indicia of illegal conduct, the privacy interests in that container are frustrated and government agents are permitted to search the remainder of the container when they are virtually certain what the subsequent search will reveal. See Jacobson, 466 U.S. at (holding that defendant had no reasonable privacy interests in concealing contraband). Each of the circuits that have applied the private search doctrine to digital items and devices have held that privacy interests in those items are, at least in part, frustrated when those items contain illegal information or data. See Sparks, 9
17 806 F.3d at 1336 (holding that discovery of child pornography by Walmart employee permitted subsequent search by authorities); Lichtenberger, 786 F.3d at 488 (officers subsequent search of defendant s laptop, which contained child pornography, was permissible as long as it remained within the scope of private search); Rann, 689 F.3d at 837 (police search of data files that contained child pornography did not exceed scope of private search); Runyan, 275 F.3d at 465 (when a private party has disclosed illicit content within a container, government agents are permitted to search the container in greater detail). The broad approach, advanced by the Fifth and Seventh circuits, best encompasses the reasonableness standard of the Fourth Amendment and should be adopted by this Court. The broad approach allows officers and other law enforcement personnel to use their professional training and experience to diagnose potential criminal conduct in the most efficient manner. The present action provides illustrative facts of the superiority of the broad approach, while also illustrating the narrow approach s shortcomings. The private citizen here, Larry Nightingale, saw suspicious activity occurring in a local public park when an anonymous man taped a cell phone to the bottom of the park bench. (R. at 1132). Out of curiosity, Nightingale removed the phone, opened it, and was able to discover several photos, one of which bore the heading: TOP SECRET UNAUTHORIZED DISTRIBUTION FORBIDDEN UNDER PENALTY OF LAW. (R. at 1133). Startled by what he had seen, Nightingale promptly notified the local police before viewing any more photos. (R. at 1133). Officer Kramer, a local policeman, arrived and was faced with the key question this Court is now considering: to what extent may he view the contents of the phone beyond what Nightingale had already seen? The narrow approach would strictly forbid Officer Kramer from further inspection of the phone, including the remainder of the photo album that Nightingale had already opened. The broad 10
18 approach would permit Officer Kramer to inspect the remainder of the photo album, but not view other contents of the phone. Under the principles of reasonableness that guide Fourth Amendment analysis, it becomes clear that the broad approach is most logical. When a law enforcement officer is virtually certain that a subsequent search will reveal details of a crime, he should be permitted to search the already compromised container in greater detail. See Jacobson, 466 U.S. at 117. Adopting the alternative would leave officers at the mercy of the private citizen s curiosity and would draw an arbitrary line based on the extent of the prior search. Law enforcement officials are trained to identify, investigate, and combat criminal conduct private citizens, generally speaking, are not. The broad approach best equips law enforcement to protect the public from criminal conduct without infringing on Fourth Amendment rights. B. OFFICER KRAMER REMAINED WITHIN ONE CONTAINER WHEN HE SEARCHED THE CELL PHONE AND, THEREFORE, REMAINED WITHIN THE SCOPE OF NIGHTINGALE S SEARCH. The fear that this court expressed in Riley concerning the unique storage capabilities of cell phones, and thus the heightened privacy interests at stake, is well-founded, and the broad approach would not threaten this privacy interest. 134 S.Ct. at Looking to the circuits is instructive on this manner. Even if this Court adopts the broadest of approaches, the Fifth Circuit, in Runyan, stated that an officer may search an already compromised container in greater detail, but he may not open new containers that were not already viewed by the private party. 275 F.3d at 464. Although Runyan dealt with substantial amounts of compact disks, floppy disks, and ZIP drives, and some of the most recent private search precedent deals with other physical containers, the reasoning can be applied to cell phones with fluidity. 11
19 Specifically, cell phones should be viewed as storing unlimited amounts of containers each application or folder functioning as its own miniature container. In reference to Justice Roberts concerns in Riley and for illustrative purposes, imagine the text message, electronic mail, bank account, and photograph applications all functioning as separate containers. Simply because a private party is able to compromise the privacy interests in one container does not expose the entire phone to warrantless inspection. Rather, law enforcement officials, even under the broad approach, would only be permitted to further search the single container that the private citizen had already viewed, albeit in greater detail. Id. In Jacobson, that meant viewing the remaining contents of the FedEx box and testing the suspicious white powder. 466 U.S. at 115. In Runyan and Rann, that meant viewing the remaining files contained within the compact disks and ZIP drives, which contained images of child pornography, and which the private party had already viewed in part. 275 F.3d at 464; 689 F.3d at No approach, broad or narrow, would permit Officer Kramer to take Nightingale s private discovery as an invitation to view the entire phone. However, it would be a modest application of the traditional private search doctrine to permit law enforcement agents to search, in greater detail, the containers within a cell phone that have already been compromised by a private party. The essential purpose of law enforcement is to safeguard American lives, reduce the incidence of crime, and promote public safety. About DOJ, The United States Department of Justice, (Feb. 9, 2018). The broad approach allows them to carry out this mission. Officer Kramer did not violate the Fourth Amendment when he searched, in greater detail, the one photo album that had already been seen by Nightingale because he remained within one container. 12
20 C. THE GOVERNMENT S INTEREST IN PROMOTING PUBLIC HEALTH AND NATIONAL SECURITY GREATLY OUTWEIGHS PETITIONER S INTEREST IN SOLICITING CONFIDENTIAL GOVERNMENT INFORMATION. Lastly, the government must prove a compelling interest that permits a warrantless search and that interest must outweigh the individual s interest in privacy. Riley, 134 S. Ct. at In Riley, this Court laid out this balancing test as a critical test in Fourth Amendment analysis. Id. In the present action, the government s interests are substantial: preserving public health and safety, safeguarding national security, and enforcing a federal statute designed to prevent breaches of our national defense. (R. at 1134). These interests greatly outweigh petitioner s interests in using a cell phone s photography features to solicit illegal information. (R. at 1133). Moreover, petitioner s solicitation of confidential government information is strictly prohibited by 18 U.S.C Once the government agent becomes aware of threats to the above interests, the agent should be afforded the broadest discretion to safeguard those interests. Again, the broad approach is the best method to accomplish this goal. In addition, the government s interests are heightened when law enforcement officials become aware of a crime in progress, yet lack necessary details about that crime, such as the identity of the offender. In all of the circuit cases previously mentioned, the identity of the defendant was never in question. See Runyan, 275 F.3d at 464; Rann, 689 F.3d at 837; Lichtenberger, 786 F.3d at 480. The information disclosed to law enforcement by the private parties already was linked to the criminal offender. However, in the present action, while Officer Kramer was certain Nightingale saw photos that were indicative of criminal conduct, he was not able to identify the potential offender without further searching the photo album. (R. at 1133). When private parties disclose potential criminal conduct to law enforcement, the broad approach affords officers the necessary procedure to respond promptly. This timely response time becomes 13
21 ever more important when dealing with cyber crimes, since the paper trail can be eliminated in mere seconds and the potential offenders may never be found. The petitioner will argue that her interests in cell phone privacy are substantial and those protections are further solidified by Riley. 134 S.Ct. at However, the defendant in Riley had his phone seized from his person, incident to an arrest, and the contents of defendant s phone had not been previously viewed by a private party. Id. at Allowing the government to search petitioner s phone in the present action does not disrupt the Riley holding. The phone in question here was found in a public park with no clear owner in sight, was viewed by a private party, and disclosed indicia of criminal conduct. (R. at ). The facts are entirely different from the situation in Riley. Ruling in petitioner s favor today would place American society in grave danger. If petitioner prevails, future criminals will be put on notice that perpetration of a crime can be protected through use of a cell phone. This Court should not let its fear of a cell phone s capacity limit its ability to redefine the private search doctrine within the scope of modern day digital devices. The broad approach, adopted by the Fifth and Seventh circuit, affords officers the most reasonable procedure when a private party searches a container that discloses indicia of criminal conduct. Officers should be granted the authority to further inspect containers and use their professional training and experience to identify and combat criminal conduct. The government has substantial interests in public safety and national security and, although cell phone privacy is a legitimate interest of nearly every American, the Court must be careful not to extend that interest too far. 14
22 For the foregoing reasons, we pray that this court affirm the Fourteenth Circuit s holding, overruling the district court s suppression of the photos because Officer Kramer was permitted to search the album in greater detail under the private search doctrine. II. THE FOURTEENTH CIRCUIT S DECISION SHOULD BE UPHELD BECAUSE THE USE OF A CELL-SITE SIMULATOR IS NOT A SEARCH UNDER THE FOURTH AMENDMENT WHEN PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY AND SOCIETY IS NOT PREPARED TO RECOGNIZE HER EXPECATION OF PRIVACY AS REASONABLE. The Fourth Amendment guarantees the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures. U.S. Const. amend. IV. A search under the Fourth Amendment is a two-pronged inquiry. The first prong that must be addressed is whether the individual, by his conduct, has exhibited an actual (subjective) expectation of privacy whether the individual has shown that he seeks to preserve something as private. Katz v. United States, 389 U.S. 347, 351, 361 (1967). The second prong is whether the individual s subjective expectation of privacy is one that society is prepared to recognize as reasonable whether the individual s expectation, viewed objectively, is justifiable under the circumstances. Id. at 351, 353. Unreasonable searches can occur when the government violates an individual s reasonable expectation of privacy. Id. at 351. In applying this analysis, it is important to determine the nature of the specific activity at issue. Smith v. Maryland, 442 U.S. 735, 741 (1979). The activity here took the form of using a cell-site simulator to provide the location information of Petitioner s pay-as-you-go smartphone. (R ). Petitioner challenges that the phone found on her at the time of the arrest should be suppressed because the use of a Stingray constituted an unlawful search under the Fourth Amendment. The Respondent respectfully asks this Honorable Court to affirm the Fourteenth Circuit s ruling and find Petitioner as not having an actual expectation of privacy, and even if this Court finds that 15
23 Petitioner did have an actual expectation of privacy, her expectation is one that society is not prepared to recognize as reasonable. A. PETITIONER DID NOT EXHIBIT AN ACTUAL EXPECTATION OF PRIVACY BECAUSE SHE KNEW INFORMATION WAS CONVEYED THROUGH THE VOLUNATRY USE OF A CELL PHONE. The Fourteenth Circuit correctly determined that the Petitioner did not harbor a subjective expectation of privacy in the information her phone broadcasted to the world. A constitutional violation under the Fourth Amendment cannot occur unless the individual had a subjective expectation of privacy. Katz, 398 U.S. at 361. In determining whether the individual had a subjective expectation of privacy, the Court will inquire whether the individual sought to preserve the information as private. Id. at 351; Smith, 442 U.S. at 740. When criminals use modern technological devices to carry out criminal acts and to reduce the possibility of detection, they can hardly complain when the police take advantage of the inherent characteristics of those very devices to capture them. U.S. v. Skinner, 690 F.3d 772, 774 (2012). If a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal. Id. at 777. The law cannot be that a criminal is entitled to rely on the expected untrackability of his tools. Id. The Constitution does not protect criminals from their erroneous expectations regarding the undetectability of their modern tools. Id. If it did, then technology would help criminals at the expense of the police. Id. The crux of the issue is whether the Petitioner had harbored a subjective expectation of privacy in the information her phone broadcasted to the world. There is no inherent constitutional difference between trailing a defendant and tracking him via such technology. Id at 778. Law enforcement tactics must be allowed to advance with technological changes, in order to prevent criminals from circumventing the justice system. Id. Otherwise, dogs could not be used 16
24 to track a fugitive if the fugitive did not know that the dog hounds had his scent. Id at 777. A getaway car could not be identified and followed based on the license plate number if the driver reasonably thought that he had gotten away unseen. Skinner, at 777. Insofar as previous Petitioners complaints appear to be simply that scientific devices such as the beeper enabled the police to be more effective in detecting crime, it simply has no constitutional foundation. Id at 778. The Courts have never equated police efficiency with unconstitutionality, and this Honorable Court should decline to do so now. There have been several landmark cases in which the government has stated that criminals have no expectation of privacy through the using technology as surveillance. In Smith, after a robbery, the police traced the license plate number of the suspect. Smith v. Maryland, 442 U.S. 735, 737 (1979). The next day, the telephone company, at police request, installed a pen register at its central offices to record the numbers dialed from the telephone at the petitioner s home. Id. The police did not get a warrant or court order before having the pen register installed. Id. The register revealed that a call was soon placed from the petitioner s home to the victim s phone. Id. On the basis of this phone call and other evidence, the petitioner s home was searched and he was subsequently arrested. Id. This Court held that where a defendant was found to have no reasonable expectation of privacy in the numbers he dialed on his phone, even after that information was automated by the phone company. Skinner, at 778. The Court compared this technology to giving the numbers to a telephone operator, where they would not be confidential and said, We are not inclined to hold that a different constitutional result is required because the telephone company has decided to automate. United States v. Knotts, 460 U.S. 276, 283 (1983). Knotts was another case where the Court decided that a person does not exhibit a subjective expectation of privacy through the use of technology. In Knotts, the police, with the 17
25 consent of a chemical company, placed a beeper in a five-gallon drum of chloroform in order to track the movements of a defendant and discover the location of a clandestine drug laboratory. Knotts, at 279. Using visual surveillance, as well as the signal emitted from the beeper when police lost visual contact, law enforcement officials traced the car to a secluded cabin, where the defendant and others had been manufacturing illicit drugs. Knotts, at 278. The Supreme Court held that this monitoring did not violate the Constitution because the governmental surveillance conducted by means of the beeper in this case amounted principally to the following of an automobile on public streets and highways... a person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another. Id. at 281. Additionally, the Supreme Court noted that there was no indication that the beeper was used in any way to reveal information that would not have been visible to the naked eye. Id. at 285. United States v. Forest reveals that the court had not deterred from precedent some twenty years later. In Forest, DEA agents had lost visual contact of the defendant as he traveled on public roads to meet two suspected drug couriers. United States v. Forest, 355 F.3d 942, 947 (6th Cir. 2004). To reestablish contact, agents called the defendant s cell phone, hanging up before it rang, in order to ping or gather data on the phone s physical location. Id. Using this information, agents were able to determine the defendant s movements along a public roadway, and ultimately to arrest the defendant. Id. at 948. The Supreme Court held a similar holding as they did in Knotts, stating that such monitoring did not violate the Fourth Amendment because the DEA agents could have obtained the same information by following the defendant s car. Id. at 951. Although the DEA agents were not able to maintain visual contact with the defendant s car at all times, visual observation was possible by any member of the public. Id. The DEA 18
26 agents simply used the cell-site data to augment the sensory facilities bestowed upon them at birth, which became permissible under Knotts. Id. (quoting Knotts, at 282). United States v. Skinner is a more recent example of when the Supreme Court holds that the use of technology to catch a criminal does not constitute a Fourth Amendment violation. In Skinner, the drug runners used pay-as-you-go phones to communicate during their cross-country shipment of drugs. United States v. Skinner, 690 F.3d 772, 774 (2012). The government used data emanating from the Petitioner s pay-as-you-go phone to determine its real time location. Id. This information was used to determine the Petitioner s location and as a result of tracking the cell phone, DEA agents located the Petitioner with over 1,100 pounds of marijuana. Id. The Supreme Court held that the Petitioner did not have a reasonable expectation of privacy in the data emanating from his cell phone that showed its location. Id. at 775. The case at bar is analogous to Smith, Knotts, Forest, and Skinner. In all four of those cases, authorities used the technology they have been given to locate and arrest criminals. Even if the authorities did not have any physical surveillance on the Petitioners, the Court has constantly held that the use of technology to track a criminal does not constitute a Fourth Amendment search. The Supreme Court should not reverse its holding here. The petitioners in cases such as Skinner have also argued that they were unaware that the pay-as-you-go phones contained GPS tracking devices and therefore the technology was used to supplement, not augment, the sensory facilities. This argument is not persuasive enough to overturn the Courts twenty plus years of reasoning. Just because an individual is unaware that phones and other devices have GPS tracking, does not equate to an individual having a Fourth Amendment action. Just like Skinner, the Petitioner s movements could have been observed by any member of the public. Using a more efficient means of discovering this information does not 19
27 amount to a Fourth Amendment violation. Skinner, at 779. In any event, the Court determines whether a defendant s reasonable expectation of privacy has been violated by looking at what the defendant is disclosing to the public, and not what information is known to the police. Skinner, at 779. In this case, Petitioner had at least a minimum expectation that she could be tracked when she told Owens, these burners are untraceable, but still, they can track everyone now. (R. at 1132). If the defendant in Skinner does not find safe haven under their Fourth Amendment subjective expectation of privacy due to ignorance, then certainly Petitioner here cannot find a remedy under the Fourth Amendment when she has at least a minimum expectation that the FBI can trace her. There have been cases that have said that police intrusion using technology was a Fourth Amendment violation, but the facts in those cases are very distinguishable to the cases aforementioned and the case at bar. One of the major cases that is distinguishable from the line of reasoning aforementioned is United States v. Jones. In Jones, a tracking device was secretly placed on the defendant s car. United States v. Jones, 132 S. Ct. 945, 948 (2012). The Court explicitly relied on the trespassory nature of the police action rather than the surveillance nature of the police action. Id. at 949. The Supreme Court held that Fourth Amendment violations do occur when the government engages in the physical intrusion of a constitutionally protected area in order to obtain information. (Emphasis Added). Id. at 951. In our case, no physical intrusion occurred. The Petitioner herself obtained the cell phone for the purpose of communicating, and that phone included the GPS technology used to track the phone s whereabouts. Additionally, at the time of Petitioner s arrest, the FBI agents were twenty-five feet away from the cabin on a rural street, without any structures in the 20
SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent.
SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. No. 10-1011 NOTICE IS HEREBY GIVEN THAT the petition for writ
More informationIMPORTANT - PROVIDE THIS INFORMATION TO PERSON SIGNING SD 572. Title 18 Crimes and Criminal Procedures
641. Public money, property or records Title 18 Crimes and Criminal Procedures United States Code Sections 641, 793, 794, 798, and 952 Whoever embezzles, steals, purloins, or knowingly converts to his
More informationIn the Supreme Court of the United States
No. 10-1011 In the Supreme Court of the United States ELIZABETH JENNINGS, Petitioner, V. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth
More informationCase No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent.
Case No. 10-1011 In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. BRIEF FOR PETITIONER Team 15 Counsel for the Petitioner
More informationSupreme Court of The United States
TEAM 2 DOCKET NO. 10-1011 IN THE Supreme Court of The United States ELIZABETH JENNINGS, PETITIONER, V. UNITED STATE OF AMERICA, RESPONDENT. ON WRIT OF CERTIORARI FROM THE UNITED STATES COURT OF APPEALS,
More informationNo IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents.
No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth
More informationSupreme Court of The United States
No. 10-1011 In The Supreme Court of The United States ELIZABETH JENNINGS Petitioner, v. UNITED STATES OF AMERICA Respondent. ON PETITION FOR A WRIT OF CERTIORARI TO THE SUPREME COURT OF THE UNITED STATES
More informationEspionage Act of 1917
Espionage Act of 1917 This act, passed during World War I, strictly limited Americans' freedom of speech in the name of wartime security. Since the Alien and Sedition Acts of the late eighteenth century,
More informationPetitioner and Cross-Respondent, Respondent and Cross-Petitioner. In the Supreme Court of the United States UNITED STATES, DAVID ELLIS,
In the Supreme Court of the United States UNITED STATES, v. Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner. On Writ of Certiorari to The United States Court of Appeals For
More informationBriefing from Carpenter v. United States
Written Material for Inside Oral Argument Briefing from Carpenter v. United States The mock oral argument will be based Carpenter v. United States, which is pending before the Supreme Court of the United
More informationDigitizing the Private Search Doctrine: Is a Computer a Container?
Digitizing the Private Search Doctrine: Is a Computer a Container? by TAYLOR J. PFINGST* Introduction The digital era has ushered in a new age, where the technology of today is almost instantaneously surpassed
More informationBy Jane Lynch and Jared Wagner
Can police obtain cell-site location information without a warrant? - The crossroads of the Fourth Amendment, privacy, and technology; addressing whether a new test is required to determine the constitutionality
More informationWarrantless Access to Cell Site Location Information Takes a Hit in the Fourth Circuit:
Warrantless Access to Cell Site Location Information Takes a Hit in the Fourth Circuit: The Implications of United States v. Graham for Law Enforcement Wesley Cheng Assistant Attorney General Office of
More informationUnited States Court of Appeals
United States of America, v. Antoine Jones, Case: 08-3034 Document: 1278562 Filed: 11/19/2010 Page: 1 Appellee Appellant ------------------------------ Consolidated with 08-3030 1:05-cr-00386-ESH-1 Filed
More informationVIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES
VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES v. LICHTENBERGER Abstract: In 2015 in United States v. Lichtenberger,
More informationTHE BURMA OFFICIAL SECRETS ACT
THE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923) 1 1. This Act extends to the whole of the Union of Burma, and applies also to all citizens of the Union and all servants of the Government
More informationTHE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923)
THE BURMA OFFICIAL SECRETS ACT [INDIA ACT XIX, 1923] (2nd April, 1923) 1 1. This Act extends to the whole of the Union of Burma, and applies also to all all citizens of the Union and all servants of the
More informationSUPREME COURT OF THE UNITED STATES OF AMERICA
DOCKET NO. 2015-11 OCTOBER TERM 2015 SUPREME COURT OF THE UNITED STATES OF AMERICA ALBERT GREENE, Petitioner V. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES
More informationRecording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in
More informationSTATE OF MICHIGAN COURT OF APPEALS
STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellant, FOR PUBLICATION November 6, 2014 9:00 a.m. v No. 310416 Kent Circuit Court MAXIMILIAN PAUL GINGRICH, LC No. 11-007145-FH
More informationOFFICIAL SECRETS ACT CHAPTER 187 LAWS OF KENYA
LAWS OF KENYA OFFICIAL SECRETS ACT CHAPTER 187 Revised Edition 2016 [2012] Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev. 2016] CAP.
More informationThe GPS Tracking Case Fourth Amendment United States Constitution
Fourth Amendment United States Constitution The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
More informationCASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant.
IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA JEFFREY SCOTT FAWDRY, v. Appellant, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED CASE NO.
More informationAppendix H Title 18 Crimes and Criminal Procedure, U. S. Code
Title 18 Crimes and Criminal Procedure, U. S. Code Part I Crimes Chapter 113 Stolen Property * * * * * * * 2318 Trafficking in counterfeit labels, illicit labels, or counterfeit documentation or packaging1
More informationCourt Security Act 2005 No 1
New South Wales Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Objects of Act 2 4 Definitions 2 5 Operation of Act and effect on other powers 5 Entry and use of court premises
More informationUnited States Court of Appeals
In the United States Court of Appeals For the Seventh Circuit No. 06-2741 UNITED STATES OF AMERICA, v. Plaintiff-Appellee, BERNARDO GARCIA, Defendant-Appellant. Appeal from the United States District Court
More informationI. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding
CELL PHONE SEARCHES IN SCHOOLS: THE NEW FRONTIER ANDREA KLIKA I. Introduction In the age of smart phones, what once was a simple device to make phone calls has become a personal computer that stores a
More informationIndiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter
Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Ensure that you don t go from investigator to investigated Categories of law: Stalking, online harassment & cyberstalking
More informationNo IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District
No. 13-132 IN THE DAVID LEON RILEY, v. Petitioner, STATE OF CALIFORNIA, Respondent. On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District REPLY BRIEF FOR PETITIONER Patrick
More informationIn The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States,
P21. In The SUPREME COURT OF THE UNITED STATES October Term, 2015 Docket No. 2015-11 Albert Greene, v. United States, Petitioner, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS
More informationNo Supreme Court of the United States. UNITED STATES, Petitioner and Cross-Respondent, DAVID ELLIS, Respondent and Cross-Petitioner.
No. 42-9001 Supreme Court of the United States UNITED STATES, Petitioner and Cross-Respondent, v. DAVID ELLIS, Respondent and Cross-Petitioner. On Writ of Certiorari to the United States Court of Appeals
More informationTestimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute
Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory
More informationCase 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8
Case 1:16-cr-00169-WHP Document 125 Filed 07/18/17 Page 1 of 8 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ------------------------------------------------------------X UNITED STATES OF
More informationDivided Supreme Court Requires Warrants for Cell Phone Location Data
Divided Supreme Court Requires Warrants for Cell Phone Location Data July 2, 2018 On June 22, 2018, the United States Supreme Court decided Carpenter v. United States, in which it held that the government
More informationLesson 1: Role of the Judicial Branch in the US
Judicial Branch Powerpoint Questions 1. What is the role of federal courts? Lesson 1: Role of the Judicial Branch in the US 2. What is the purpose of the Supreme Court? 3. Define District Courts. 4. What
More informationPetitioner, Respondent.
No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, Petitioner, vs. UNITED STATES OF AMERICA, Respondent. PETITIONER S REPLY BRIEF HANNAH VALDEZ GARST Law Offices of Hannah Garst 121 S.
More information1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0
1 HB410 2 191614-1 3 By Representative Williams (P) 4 RFD: Technology and Research 5 First Read: 13-FEB-18 Page 0 1 191614-1:n:02/13/2018:CMH*/bm LSA2018-168 2 3 4 5 6 7 8 SYNOPSIS: This bill would create
More informationIN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION
NORTH CAROLINA WAKE COUNTY IN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION STATE OF NORTH CAROLINA ) ) VS. ) REQUEST FOR ) VOLUNTARY DISCOVERY ) (ALTERNATIVE MOTION FOR ) DISCOVERY) Defendant.
More informationOFFICIAL SECRETS ACT OFFICIAL SECRETS ACT. Revised Laws of Mauritius. Act 13 of June Short title
Revised Laws of Mauritius OFFICIAL SECRETS ACT Act 13 of 1972 26 June 1972 ARRANGEMENT OF SECTIONS SECTION 1. Short title 2. Interpretation 3. Acts prejudicial to Mauritius 4. Reports of Cabinet proceedings
More informationFirst Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010
First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition
More informationDepartment of Legislative Services Maryland General Assembly 2011 Session
Department of Legislative Services Maryland General Assembly 2011 Session HB 599 FISCAL AND POLICY NOTE House Bill 599 Judiciary (Delegates Waldstreicher and Rosenberg) Courts and Judicial Proceedings
More informationDepartment of Legislative Services
Department of Legislative Services Maryland General Assembly 2008 Session SB 972 FISCAL AND POLICY NOTE Senate Bill 972 Judicial Proceedings (Senator Forehand) Identity Fraud - Seizure and Forfeiture This
More informationIII/96 OFFICIAL SECRETS CHAPTER 50. (2) If a person. 1. This Act may be cited as the Official Secrets Act.
CHAPTER 50 Act No. 32 of 1955. AN ACT TO RESTRICT ACCESS TO AND SECRET DOCUMENTS AND TO PREVENT UNAUTHORIZED DISCLOSURE THEREOF. [1st September, 1955.} Short title. Declaration of prohibited places. 1.
More informationThe Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception?
Catholic University Law Review Volume 66 Issue 2 Winter 2016 Article 9 3-23-2017 The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or
More informationUNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS
UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2013-08 Appellant ) ) v. ) ) ORDER Technical Sergeant (E-6) ) SAMUEL A. WICKS, ) USAF, ) Appellee ) Special Panel
More information1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has
FOURTH AMENDMENT WARRANTLESS SEARCHES FIFTH CIRCUIT UPHOLDS STORED COMMUNICATIONS ACT S NON- WARRANT REQUIREMENT FOR CELL-SITE DATA AS NOT PER SE UNCONSTITUTIONAL. In re Application of the United States
More informationThird District Court of Appeal State of Florida
Third District Court of Appeal State of Florida Opinion filed September 24, 2014. Not final until disposition of timely filed motion for rehearing. No. 3D10-3264 Lower Tribunal No. 06-1071 K Omar Ricardo
More informationUNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, JUAN PINEDA-MORENO, No. 08-30385 Plaintiff-Appellee, D.C. No. v. 1:07-CR-30036-PA Defendant-Appellant. OPINION
More information1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0
1 SB318 2 192523-5 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENROLLED, An Act, 5 Relating to consumer protection; to require certain 6 entities
More informationKnow Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org
ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Defending Freedom on the Electronic Frontier eff.org Know Your Rights Your computer, phone, and other digital devices hold vast amounts of personal
More informationUnited States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment
Valparaiso University Law Review Volume 47 Number 2 pp.277-288 Winter 2013 United States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment Brittany
More informationAppellate Division, Third Department - People v. Mabeus
Touro Law Review Volume 26 Number 3 Annual New York State Constitutional Issue Article 14 July 2012 Appellate Division, Third Department - People v. Mabeus Christina Pinnola Follow this and additional
More informationIn the Supreme Court of the United States
No. 13-212 In the Supreme Court of the United States UNITED STATES OF AMERICA, PETITIONER v. BRIMA WURIE ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT
More informationUnited States Court of Appeals
cr United States v. Jones 0 0 0 In the United States Court of Appeals For the Second Circuit AUGUST TERM, 0 ARGUED: AUGUST, 0 DECIDED: JUNE, 0 No. cr UNITED STATES OF AMERICA, Appellee, v. RASHAUD JONES,
More informationCOVINGTON POLICE DEPARTMENT STANDARD OPERATING PROCEDURE
COVINGTON POLICE DEPARTMENT STANDARD OPERATING PROCEDURE Subject: SEARCH AND SEIZURE Date of Issue: 01-01-1999 Number of Pages: 6 Policy No. P220 Review Date: 06-01-2007 Distribution: Departmental Revision
More information2:12-cr SFC-MKM Doc # 227 Filed 12/06/13 Pg 1 of 12 Pg ID 1213 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION
2:12-cr-20218-SFC-MKM Doc # 227 Filed 12/06/13 Pg 1 of 12 Pg ID 1213 United States of America, Plaintiff, UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION v. Criminal Case No.
More informationIC Chapter 5. Search and Seizure
IC 35-33-5 Chapter 5. Search and Seizure IC 35-33-5-0.1 Application of certain amendments to chapter Sec. 0.1. The amendments made to section 5 of this chapter by P.L.17-2001 apply to all actions of a
More informationA BRIEF REVIEW OF PROBABLE CAUSE PROCEDURES IN THE HARRIS COUNTY JUSTICE COURTS
A BRIEF REVIEW OF PROBABLE CAUSE PROCEDURES IN THE HARRIS COUNTY JUSTICE COURTS What is Probable Cause The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable
More information1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0
1 SB318 2 192523-4 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENGROSSED 5 6 7 A BILL 8 TO BE ENTITLED 9 AN ACT 10 11 Relating to consumer protection;
More informationTHE SUPREME COURT OF NEW HAMPSHIRE THE STATE OF NEW HAMPSHIRE JONATHAN BALL. Argued: June 13, 2012 Opinion Issued: September 28, 2012
NOTICE: This opinion is subject to motions for rehearing under Rule 22 as well as formal revision before publication in the New Hampshire Reports. Readers are requested to notify the Reporter, Supreme
More informationCell Site Simulator Privacy Model Bill
Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner
More informationSTATE OF MICHIGAN COURT OF APPEALS
STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellee, UNPUBLISHED March 21, 2013 v No. 309961 Washtenaw Circuit Court LYNDON DALE ABERNATHY, LC No. 10-002051-FH Defendant-Appellant.
More informationSTATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY. vs. Case No. 12 CF BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE
STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY STATE OF WISCONSIN, Plaintiff, vs. Case No. 12 CF 000000 JOHN DOE, Defendant. BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE THE DEFENDANT, John Doe,
More informationSTATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT STATE OF LOUISIANA VERSUS. Judgment Rendered June
STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT NO 2007 KA 2009 STATE OF LOUISIANA VERSUS ll n MATTHEW G L CONWAY Judgment Rendered June 6 2008 Appealed from the 18th Judicial District Court In and for
More informationNo IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, PETITIONER UNITED STATES OF AMERICA
No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, PETITIONER v. UNITED STATES OF AMERICA ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SEVENTH CIRCUIT
More informationTHE OFFICIAL SECRETS ACT, 1923 ARRANGEMENT OF SECTIONS
SECTIONS 1. Short title, extent and application. 2. Definitions. 3. Penalties for spying. THE OFFICIAL SECRETS ACT, 1923 ARRANGEMENT OF SECTIONS 4. Communications with foreign agents to be evidence of
More informationState of New York Supreme Court, Appellate Division Third Judicial Department
State of New York Supreme Court, Appellate Division Third Judicial Department Decided and Entered: June 5, 2008 101104 THE PEOPLE OF THE STATE OF NEW YORK, Respondent, v OPINION AND ORDER SCOTT C. WEAVER,
More informationCoordinated text from 10 August 2011 Version applicable from 1 September 2011
Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending
More informationCourt of Appeals of New York - People v. Weaver
Touro Law Review Volume 26 Number 3 Annual New York State Constitutional Issue Article 13 July 2012 Court of Appeals of New York - People v. Weaver Michelle Kliegman Follow this and additional works at:
More informationCASE NO. 1D The petition in this matter seeks to quash a discovery order in a wrongful
IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA TAMMY LEE ANTICO, PERSONAL REPRESENTATIVE OF THE ESTATE OF TABITHA FRANCES GUYTON ANTICO, DECEASED, NOT FINAL UNTIL TIME EXPIRES TO FILE
More informationAct Name : THE OFFICIAL SECRETS ACT, 1923 Act title : ACT NO. 19 OF * 3* * * * * Enactment date : [2nd April, 1923.]
Act Name : THE OFFICIAL SECRETS ACT, 1923 Act title : ACT NO. 19 OF 1923 1* 3* * * * * Enactment date : [2nd April, 1923.] THE OFFICIAL SECRETS ACT, 1923 ACT NO. 19 OF 1923 1* 3* * * * * [2nd April, 1923.]
More informationUNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN DECISION AND ORDER DENYING DEFENDANT S MOTION TO SUPPRESS EVIDENCE (DKT. NO.
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN UNITED STATES OF AMERICA, Case No. 15-CR-216-PP Plaintiff, v. JAMES G. WHEELER, Defendant. DECISION AND ORDER DENYING DEFENDANT S MOTION TO SUPPRESS
More informationTHE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION
THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION Many of us 1 have experienced that sinking feeling before: the moment you realize that your cell phone is missing. First, it is the
More informationLegal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017
Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 No. 15 of 2017 Second Session Eleventh Parliament Republic of Trinidad and Tobago HOUSE OF REPRESENTATIVES BILL
More informationChief of Police: Review Date: July 1
Directive Type: General Order Effective Date 05-17-2016 General Order Number: 05.09 Subject: Legal Process and Court Appearances Amends/Supersedes: Section 05, Chapter 09, Legal Process, revised 2008 Distribution:
More informationAct Implementing Article 26(2) of the Basic Law (War Weapons Control Act) of April 20, 1961 (1961 Federal Law Gazette I 444)
Act Implementing Article 26(2) of the Basic Law (War Weapons Control Act) of April 20, 1961 (1961 Federal Law Gazette I 444) (as amended by Article 2 of the Act of July 6, 1998 Implementing the Convention
More informationBUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes
BUSINESS LAW Chapter 8 Criminal Law and Cyber Crimes Learning Objectives List and describe the essential elements of a crime. Describe criminal procedure, including arrest, indictment, arraignment, and
More informationUnited States Court of Appeals
In the United States Court of Appeals For the Seventh Circuit No. 14 1003 UNITED STATES OF AMERICA, Plaintiff Appellee, v. FRANK CAIRA, Defendant Appellant. Appeal from the United States District Court
More information3121. General prohibition on pen register and trap and trace device use; exception
UNITED STATES CODE ANNOTATED TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART II--CRIMINAL PROCEDURE CHAPTER 206--PEN REGISTERS AND TRAP AND TRACE DEVICES 3121. General prohibition on pen register and trap
More informationIn the Supreme Court of the United States
No. 16-402 In the Supreme Court of the United States TIMOTHY IVORY CARPENTER, PETITIONER v. UNITED STATES OF AMERICA ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SIXTH
More informationIN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO
Case 2:13-cv-00257-BLW Document 27 Filed 06/03/14 Page 1 of 8 ANNA J. SMITH IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO Plaintiff, Case No. 2:13-CV-257-BLW v. MEMORANDUM DECISION BARACK
More informationMOTION TO SUPPRESS. 1. Approximately 78 grams of marijuana seized from the co-defendants vehicle on
STATE OF NORTH CAROLINA COUNTY OF WAKE IN THE GENERAL COURT OF JUSTICE SUPERIOR COURT DIVISION FILE NO. 08CRSXXXXX STATE OF NORTH CAROLINA vs. SP MOTION TO SUPPRESS COMES NOW, Defendant, SP, by and through
More informationNAPD Formal Ethics Opinion 16-1
NAPD Formal Ethics Opinion 16-1 Question: The Ethics Counselors of the National Association for Public Defense (NAPD) have been asked to address the following scenario: An investigator working for Defense
More informationThe Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as "the Contracting Parties";
Draft AGREEMENT BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE SWISS CONFEDERATION REGARDING MUTUAL ASSISTANCE BETWEEN THEIR CUSTOMS ADMINISTRATIONS The Government of
More informationIN THE SUPREME COURT OF THE UNITED STATES. OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner. UNITED STATES OF AMERICA, Respondent
IN THE SUPREME COURT OF THE UNITED STATES OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner v. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS
More informationUNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME
UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME UNITED NATIONS 2000 UNITED NATIONS CONVENTION AGAINST TRANSNATIONAL ORGANIZED CRIME Article 1 Statement of purpose The purpose of this Convention
More informationCASE NO. 1D Pamela Jo Bondi, Attorney General, Jay Kubica, Assistant Attorney General, Tallahassee, for Appellant/Cross-Appellee.
IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA STATE OF FLORIDA, v. Appellant/Cross-Appellee, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED
More information2. In this Act, unless the context otherwise. 1. This Act may be cited as the Official Secrets Act , No. 77
1951] Official Secrets [No. 77 555 NEW ZEALAND ANALYSIS Title. 1. Short Title. 2. Interpretation. 3. Spying. 4. Communications with for e i g n agents to be evidence of certain offences. 5. Unlawful use
More informationCARPENTER V. UNITED STATES: HOW MANY CELL PHONE LOCATION POINTS CONSTITUTE A SEARCH UNDER THE FOURTH AMENDMENT?
CARPENTER V. UNITED STATES: HOW MANY CELL PHONE LOCATION POINTS CONSTITUTE A SEARCH UNDER THE FOURTH AMENDMENT? DOUGLAS HARRIS* INTRODUCTION Did you know that cell-phone service providers collect and store
More informationCRS Report for Congress
Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act
More informationState of Wisconsin: Circuit Court: Milwaukee County: v. Case No. 2008CF000567
State of Wisconsin: Circuit Court: Milwaukee County: State of Wisconsin, Plaintiff, v. Case No. 2008CF000567 Miguel Ayala, and Carlos Gonzales, Defendant. Motion to Suppress Evidence Seized as a Result
More informationAdapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms
Adapting Search and Seizure Jurisprudence to the Digital Age: Section 8 of the Canadian Charter of Rights and Freedoms By: Jacob Trombley All Canadian citizens have the right to be secure against unreasonable
More informationNo IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent.
No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES 2016 ALBERTA CAPINE, Petitioner. v. UNITED STATES, Respondent. On Argument to the United States Supreme Court from Judgment Entered by the Twelfth
More informationUnited States District Court
Case:0-cr-00-JSW Document Filed0/0/0 Page of NOT FOR CITATION IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA UNITED STATES OF AMERICA, 0 Plaintiff, No. CR 0-00 JSW v. ANDREW
More informationOFFICIAL SECRETS ACT
OFFICIAL SECRETS ACT ARRANGEMENT OF SECTIONS 1. Protection of official information, etc. 2. Protection of defence establishments, etc. 3. Restrictions on photography, etc., during periods of emergency.
More informationFollow this and additional works at:
University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange Tennessee Department of State, Opinions from the Administrative Procedures Division Law 3-24-2008 TENNESSEE DEPARTMENT
More informationTELECOMMUNICATIONS AND POSTAL OFFENCES ACT
TELECOMMUNICATIONS AND POSTAL OFFENCES ACT ARRANGEMENT OF SECTIONS PART I Telecommunication offences 1. Tampering with wireless cables, etc. 2. Illegal operation of telephone call offices, etc. 3. Radio
More informationCRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL.
CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. Riley v. California, 134 S. Ct. 2473 (2014). 1 STEWART JAMES ALVIS In
More informationDEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense.
DEFINITIONS Words and Phrases The following words and phrases have the meanings indicated when used in this chapter according to Black s Law Dictionary, common dictionary, and/or are distinctive to law
More informationNumber 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED. Updated to 30 June 2017
Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED Updated to 30 June 2017 This Revised Act is an administrative consolidation of the. It is prepared by the Law Reform Commission in accordance
More information