No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent.

Size: px
Start display at page:

Download "No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent."

Transcription

1 No IN THE SUPREME COURT OF THE UNITED STATES 2016 ALBERTA CAPINE, Petitioner. v. UNITED STATES, Respondent. On Argument to the United States Supreme Court from Judgment Entered by the Twelfth Circuit Court of Appeals Decision BRIEF OF RESPONDENT Team 6 Counsel for Respondent

2 TABLE OF CONTENTS TABLE OF AUTHORITIES.ii QUESTIONS PRESENTED...1 OPINIONS BELOW 1 CONSTITUTIONAL PROVISIONS AND RULES..1 INTRODUCTION.2 STATEMENT OF THE CASE 5 ARGUMENT.7 I. THE COURT OF APPEALS DECISION SHOULD BE UPHELD BECAUSE THE PRIVATE SEARCH EXCEPTION TO THE FOURTH AMMENDMENT APPLIES TO OFFICER MILLER S SEARCH OF MS. CAPINE S COMPUTER FILES.7 A. Alberta Capine had no reasonable expectation of privacy under the Fourth Amendment in the computer files at issue because the private search doctrine applies.8 B. The application of the private search exception should be upheld in this case because Officer Miller was virtually certain to uncover incriminating evidence.13 II. THE COURT OF APPEALS DECISION SHOULD BE AFFIRMED BECAUSE ALBERTA CAPINE EXCEEDED HER AUTHORIZED ACCESS WHEN SHE USED HER EMPLOYEE USERNAME AND PASSWORD TO ACCESS AND DOWNLOAD PRIVATE INFORMATION TO FURTHER A CRIMINAL ENTERPRISE..17 A. Alberta Capine exceeded authorized access by using her work credentials to download, store, and later access private information for a criminal and nonbusiness purpose..18 B. The broad definition of exceeds authorized access is most true to the goals and purpose of the Computer Fraud and Abuse Act...20 C. The application of the broad definition of exceeds authorized access will not raise any fair notice concerns as to what is prohibited by the CFAA..24 CONCLUSION 25 SIGNATURE BLOCK...26 i

3 TABLE OF AUTHORITIES UNITED STATES SUPREME COURT CASES Brigham City v. Stuart, 547 U.S. 398, 403 (2006).8 Chickasaw Nation v. United States, 534 U.S. 84 (2001) 23 Coolidge v. New Hampshire, 493 U.S. 443, 489 (1971) 10 United States v. Jacobsen, 466 U.S. 109 (1984) 7, 9, 10, 11, 13 United States v. Knotts, 460 U.S. 276, 280 (1982).7, 8 UNITED STATES COURT OF APPEALS CASES In re Application of the United States for Historical Cell Site Data, 724 F. 3d 600, 609 (5th Cir. 2013)..7 Int'l Airport Centers, L.L.C. v. Citrin, 440 F.3d 418 (7th Cir. 2006).20, 21 LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009)..22 Rann v. Atchison, 689 F.3d 832 (7th Cir. 2012)..13, 15 Robbins v. Chronister, 402 F.3d 1047, 1050 (10th Cir. 2005) on reh'g en banc, 435 F.3d (10th Cir. 2006) (citing Griffin v. Oceanic Contractors, Inc., 458 U.S. 564, 575, 102 S.Ct. 3245, 73 L.Ed.2d 973 (1982)) 23 United States v. John, 597 F.3d 263 (5th Cir. 2010)...19, 20, 24, 25 United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) 22, 23 United States v. Oliver, 630 F.3d 397, 408 (5th Cir 2011)...15 United States v. Rodriguez, 628 F.3d 1258 (11th Cir. 2010) 19, 20, 24 U.S v. Rouse, 148 F.3d. 1040, 1041 (8 th Cir. 1998)..12 U.S v. Runyan, 275 F. 3d 397 (5 th Circ. 2001).11, 12 WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199 (4th Cir. 2012)...22 ii

4 UNITED STATES DISTRICT COURT CASES Diamond Power Int'l, Inc. v. Davidson, 540 F. Supp. 2d 1322 (N.D. Ga. 2007) 22 Calyon v. Mizuho Sec. USA, Inc., No. 07 CIV (RO), 2007 WL , at *1 (S.D.N.Y. July 24, 2007)..24 People v. Emerson, 766 N.Y.S 2d 482 (Sup. Cit. 2003).12 FEDERAL REGULATIONS 18 U.S.C (2006) 17, 18, 22 ADDITIONAL SOURCES Garrett D. Urban, Causing Damage Without Authorization: The Limitations of Current Judicial Interpretations of Employee Authorization Under the Computer Fraud and Abuse Act, 52 WM. & MARY L. REV. 1369, 1387 (2011).21 Orin S. Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 MINN. L. REV. 1561, 1564 (2010) 21, 22 S. REP , at 6-7 (1986), as reprinted in 1986 U.S.C.C.A.N. 2479, iii

5 QUESTIONS PRESENTED 1. Does the private search exception to the Fourth Amendment permit a police officer to view computer files within the same file folder beyond those viewed by the private party when conducting a reasonable search? 2. Does an employee exceed authorized access in violation of Section 1030(a)(2)(C) of the Computer Fraud and Abuse Act when she uses her work credentials in violation of company policy to access and store private information for a criminal enterprise? OPINIONS BELOW The Court of Appeal s opinion in Capine v. United States is reported at 913 F.3d 1131 (12th Cir. 2015). CONSTITUTIONAL PROVISIONS AND RULES In this case, the Petitioner was charged with multiple counts of drug trafficking, attempted identity theft, and violation of the Computer Fraud and Abuse Act, 18 U.S.C. 1030(a)(2)(C). This appeal further implicates the United States Constitution amend IV. regarding unreasonable search and seizures. 1

6 INTRODUCTION This case is about boundaries of access. Petitioner Alberta Capine is an employee at Find Funds, Inc., who utilized her work credentials and computer to conduct a criminal narcotics operation. Although company policy prohibited personal use of financial data, Ms. Capine asserts that she did not exceed her authorized access under the terms of the Computer Fraud and Abuse Act. Yet, Ms. Capine used her employer-granted username and password to access, download, and store highly confidential information that she later accessed for a criminal and non-business purpose. Additionally, Ms. Capine claims that the search of her work computer conducted by Officer Miller on September 23rd exceeded the bounds of the private search performed by her roommate and coworker Ester Sundon. Although Officer Miller limited his search to the single file folder investigated by Ms. Sundon labeled transaction history that had already been determined to contain information on Ms. Capine s criminal activities, Ms. Capine argues that the private search exception should not be utilized. First, the private search exception doctrine should apply in this case. Per the requirements of Fourth Amendment jurisprudence, Ms. Capine must demonstrate that she had a reasonable expectation of privacy in the transaction history file folder. However, this is impossible as Ms. Capine had no reasonable expectation of privacy in her computer. The computer she was utilizing belonged to her employer Find Funds, Inc. and she was aware that the computer policies of her company prevented her from utilizing the computer for personal use. She had reason to expect that the files in her computer would not be kept confidential as they could presumably be accessed by her employer. Moreover, even if an expectation of privacy is found, whether or not a search was reasonable is entirely dependent on government action. The Fourth Amendment does not protect against searches conducted by private parties regardless of whether they are 2

7 reasonable or not. In this case, Ms. Sundon had already opened the transaction history file folder and viewed files within it. Based on prior precedent, the file folder could be viewed as a closed container. Because the police do not exceed the scope or a prior private search when they examine the same closed container more thoroughly than a private party, Officer Miller s search should be considered reasonable. Furthermore, Officer Miller was virtually certain to uncover further incriminating evidence in the transaction history file folder. The files were all approximately the same size and utilized a very descriptive naming system detailing the names of Ms. Capine s business associates. It was eminently clear to a police officer with Officer Miller s training, or even to Ms. Sundon, that the files would contain further information regarding narcotics trafficking. In every step of his investigation, Officer Miller followed best police practices and took abundant precautions to preserve Ms. Capine s privacy interests by limiting his search to the single folder already opened by Ms. Capine. He made a legitimate, good-faith effort to ensure that the spirit of the Fourth Amendment was followed before obtaining a warrant for the rest of the computer. If the facts of this case do not demonstrate that it was virtually certain that incriminating evidence would be uncovered, no case will. Just because Ms. Capine utilized a computer, she should not be allowed to escape prosecution solely because a computer can contain legally irrelevant privacy interests. Police should not be handicapped just because evidence is contained in a digital medium. Such a policy would hamper police efficiency and ensure that they cannot confront cyber crime issues to the detriment of the public interest. Second, Alberta Capine exceeded authorized access and violated Section 1030(a)(2) of the Computer Fraud and Abuse act when she used her employee username and password to access and download personal identifying information to create a client list which she would 3

8 later use in the sale of illegal narcotics. Section 1030 of the Computer Fraud and Abuse Act prohibits obtaining information from a private computer without authorization or by exceeding authorized access. 18 U.S.C. 1030(a)(2)(C). When first enacted, the CFAA was primarily targeted towards hackers who accessed private information without authorization. The CFAA has been amended multiple times since its enactment and each amendment has expanded the statute s reach to cover not just hacking, but other forms of computer fraud and abuse. As the statute has been interpreted more broadly by the courts, Section 1030 has been applied to instances of insider-employee abuse of private company computer resources. In the present case, Ms. Capine undoubtedly abused company resources and exceeded her authorized access by using her Find Funds company credentials in furtherance of a criminal enterprise. Ms. Capine s employer had a policy prohibiting the use of company computer resources for personal purposes. Despite this policy, Ms. Capine a supervisor in charge of employee computer access used her username and password to access highly sensitive and confidential information, which she saved to her computer and accessed later to create a client list for drug sales. If Ms. Capine had a work purpose to access this information, she could have done so with her username and password. Her access of the PDF files was for a personal, criminal purpose, thereby exceeding any authorization she was given by her employer. Furthermore, Ms. Capine had reason to know that her employer did not authorize her to take information from a work-related database in furtherance of a criminal objective. The egregious abuse of Ms. Capine s access calls for the application of the CFAA in this case. For the reasons stated above, the Court should affirm the Twelfth Circuit s decision to apply the private search exception to the Fourth Amendment and find Ms. Capine in violation of Section 1030(a)(2)(C) of the Computer Fraud and Abuse Act. 4

9 STATEMENT OF THE CASE On September 23 rd, Officer Miller responded to a citizen tip describing a potential drug trafficking ring. (R. at 2 3). When he arrived at the Petitioner Alberta Capine s apartment, he was allowed entrance by her roommate and coworker, Ester Sundon. (R. at 3). Ms. Sundon revealed that she had discovered suspicious files on Ms. Capine s work computer in a file folder labeled transaction history. (R. at 3). The file folder contained sixteen excel documents and sixteen corresponding pdf files, each clearly labeled with the name of an individual narcotics customer. (R. at 2 3). In addition, each document was roughly the same size as the other documents in the folder. (R. at 3). Utilizing best police practices, Officer Miller asked Ms. Sundon to show him the three files that she had already opened. (R. at 3). Each spreadsheet included a transaction which had previously occurred, listing the date, dollar amounts, and quantities of marijuana, cocaine, methamphetamine and various other controlled substances that had been sold. (R. at 3). Each pdf file contained the names, addresses, social security numbers, dates of birth, telephone numbers, family connections, employment, bank and credit card account information of Ms. Capine s alleged clients. (R. at 3). Because of his extensive training, Officer Miller immediately recognized that he was dealing with a large criminal enterprise. (R. at 3). He asked Ms. Sundon to allow him access to the laptop, which she granted. (R. at 3). In order to preserve the evidence, he copied all sixteen files and pdfs within the transaction history folder onto a flash drive and examined the rest of the files within the folder so that he could personally testify to their contents. (R. at 3). After viewing these documents, Officer Miller had the probable cause necessary to secure a warrant for the rest of the files on Ms. Capine s computer. (R. at 3). He did not examine any additional files or folders on Ms. Capine s computer until the warrant was executed and the police were 5

10 able to seize the computer. (R. at 3). Ms. Capine was subsequently indicted for multiple counts of drug trafficking, attempted identity theft, and violation of the Computer Fraud and Abuse Act. (R. at 3). The resulting investigation revealed that Ms. Capine had utilized her employment at Find Funds, Inc., a local debt collections agency, to identify and extort her narcotics customers. In her work as a small claims supervisor, Ms. Capine had significant responsibility over the computers of the agency and for employee s access to the financial information databases. (R. at 2). Each employee at the agency was given a unique username and password to access financial databases so they could find information on individuals for debt collection purposes. (R. at 2). Find Funds had explicit policies that did not authorize employees to used company computer resources for personal purposes and took great efforts to preserve the confidentiality of the information by deactivating the usernames and passwords of former employees when they left the company. (R. at 2). It quickly became apparent during the course of the investigation that Ms. Capine had been using the information from her employer s financial database at Sureinf.com to target potential narcotics consumers in furtherance of her drug enterprise. (R. at 3). Once she had identified a potential target, she saved these PDFs to her work computer for later use. (R. at 2 3). The trial court convicted Ms. Capine on all counts. (R. at 3). On appeal, she argued that her use of Find Fund s computer system to hand pick marginalized individuals in order to approach for drug sales was an authorized use of her company s computer system. (R. at 3). Additionally, she argued that Officer Miller s search of the transaction history file folder went beyond established private search exception doctrine and violated Fourth Amendment Protections against unreasonable search and seizure. (R. at 3). Agreeing with the trial court, the Twelfth Circuit Court of Appeals found that she had exceeded authorized access under the 6

11 CFAA and that Officer Miller s search of the transaction history file folder was reasonable under the Fourth Amendment. (R. at 3). This court granted certiorari on both issues. (R. at 1). ARGUMENT I. THE COURT OF APPEALS DECISION SHOULD BE UPHELD BECAUSE THE PRIVATE SEARCH EXCEPTION TO THE FOURTH AMMENDMENT APPLIES TO OFFICER MILLER S SEARCH OF MS. CAPINE S COMPUTER FILES. The Fourth Amendment to the Constitution of the United States of America grants citizens the right to be secure against unreasonable searches and seizures U.S. Const. amend. IV. Traditionally, application of Fourth Amendment depends on whether the person invoking its protection has experienced a legitimate search or seizure. This analysis is contingent on whether a person can claim a justifiable and reasonable expectation of privacy that has been invaded by government action. United States v. Knotts, 460 U.S. 276, 280 (1982). The United States holds paramount these fundamental protections, and usually requires police officers and other government agents to obtain a warrant before conducting a criminal search. However, in cases where there has been no government action Fourth Amendment protections are significantly curtailed. Id. at 281. The Fourth Amendment is not a general right to privacy; it only protects against certain governmental intrusions. In re Application of the United States for Historical Cell Site Data, 724 F. 3d 600, 609 (5th Cir. 2013). If a private citizen conducts a search and then reports their findings to police officers, the Fourth Amendment analysis fundamentally changes. Because the private party has already viewed the evidence in question, any reasonable expectation of privacy is extinguished and police officers may proceed with a legitimate search. This Court has upheld these actions through the common law private search exception. U.S. v. Jacobsen, 466 U.S. 109 (1984). In this case, the private search exception is applicable and the opinion of the Court 7

12 of Appeals should be upheld for the following reasons. First, Ms. Capine had no reasonable expectation of privacy in regards to the computer files at issue as it had been destroyed by Ms. Sundon s viewing of the files. Second, Officer Miller was virtually certain to uncover incriminating evidence in the remaining computer files, which allowed him search Ms. Capine s transaction history file folder. A. Albert Capine had no reasonable expectation of privacy under the Fourth Amendment in the computer files at issue because the private search exception applies. This court has previously held that the touchstone of the Fourth Amendment is reasonableness. Brigham City v. Stuart, 547 U.S. 398, 403 (2006). A person seeking to invoke Fourth Amendment protection must be able to claim that a justifiable expectation of privacy has been invaded by government action. United States v. Knotts, 460 U.S. 276, 280 (1982). As such, there are two analytical prongs that must be considered; (1) whether the Petitioner had a reasonable privacy interest, and (2) whether this interest was unduly invaded by government action. In order to prove that they had a justifiable privacy interest, the Petitioner must show that they had both actual, subjective expectation of privacy and that this subjective expectation of privacy is one that society is prepared to recognize as reasonable. Id. at 281. Fourth amendment analysis is an inherently a case-by-case factual inquiry that rejects arbitrary bright line rules. As such, the Court must only consider the surrounding facts in this case when determining if Ms. Capine had a legitimate privacy interest in the file folder labeled transaction history. It can be reasonably concluded that she did not. Ms. Capine could not have possessed an actual expectation of privacy to the transaction history file folder because it was found on the work computer provided to her by Find Funds, Inc. (R. at 11). Ms. Capine was a small claims supervisor at her company with significant responsibility over the computers of the 8

13 agency and controlled employee s access to the financial information database. (R. at 2). She must have been intimately aware of Find Fund s company policy that prevented employees to use company computer resources for their personal use. (R. at 2). Given this knowledge, it cannot be legitimately inferred that she actually believed that the information on her work computer was private. Moreover, even if Ms. Capine did believe that the filed folders on her work computer were confidential, this is not a belief that society is prepared to recognize as reasonable. Most employees are aware that a work computer is not their own personal property, but rather the property of their employer. Typically, even password protected computers can be overridden by company controls and accessed by employers and coworkers. Passwords in these scenarios are not meant to protect employee privacy, but rather to secure proprietary company and customer information. It is evident that this was Find Funds intent as they deactivated the usernames and passwords of employees when they left the company. (R. at 2). Arguably, Find Funds had a privacy interest in the computer files at issue, but Ms. Capine could not expect that these file folders would remain confidential. Therefore, no legitimate privacy interest was invaded in the case at hand. Even if Ms. Capine did have a legitimate privacy interest in the transaction history file folder, Fourth Amendment protections are still dependent on the reasonableness of searches and seizures. Usually, this has required police to secure a warrant before conducting criminal investigations. However, the key analysis here is dependent on government action. Under the private search exception doctrine, no warrant is required to search materials that a private party has already independently viewed. U.S v. Jacobsen, 466 U.S. 109, 121 (1984). 9

14 Private searches guarantee no fourth amendment protection. This Court has held that the Fourth Amendment is wholly inapplicable to a search to a search or seizure, even an unreasonable one, effected by a private individual not acting as an agent with the Government or with the participation or knowledge of any government official. Id. at 129. The private party is not subject to the same constitutional constraints of a police officer and their searches are not held to the same reasonableness standard. Once the original frustration of privacy occurs, the Fourth Amendment does not prohibit governmental use of the now non-private information. When a private party reveals to police information that they have obtained during private search, the police have done no more than ail to avert their eyes. Coolidge v. New Hampshire, 493 U.S. 443, 489 (1971). Without such a rule, the police would be unreasonably constrained from fulfilling their duty to investigate criminal activity. In U.S v. Jacobsen, the Court held that police officers could search a package that had been previously inspected by a private party without a warrant. Jacobsen, 466 U.S. at 126. In this case, FedEx employees were inspecting a package that had been damaged in transit. Id. at 111. Inside the box, they discovered a duct-taped tube surrounded by newspaper. When they cut open the tube, they found multiple zip-lock bags containing a white, powdery substance they believed to be narcotics. Id. Subsequently, the employees called the Drug Enforcement Administration who observed the open box and removed the bags from the plastic tube. Id. An agent then opened the bag and completed an on-site field test, which positively identified the substance and cocaine. Id. Based on these findings, the DEA received a warrant to search the place to which the package had been addressed and arrested the defendants. Id. The Supreme Court considered whether the DEA s search of the package and field test violated Fourth Amendment protections as they were conducted without a warrant. Appling the 10

15 private search exception and considering the overall reasonableness of the situation, the Court determined that this was valid search, stating that the search in this instance infringed no legitimate expectation of privacy and hence was not a search within the meaning of the Fourth Amendment. Id. at 120. Even more critically the Court held, once the frustration of the original expectation of privacy occurs, the Fourth Amendment does not prohibit governmental use of the now-non private information. Id. at 117. Since it was apparent that the box contained contraband and very little else, the search was found to be reasonable. Similarly in this case, a private party, Esther Sundon, discovered computer files containing excel spreadsheets with information on marijuana, cocaine, and methamphetamine sales on Ms. Capine s computer. These files were located in a folder labeled transaction history which contained files notated with a very distinct labeling system detailing each of Ms. Capine s business associates. Each excel spreadsheet corresponded to pdf file that contained deeply personal information about Ms. Capine s customers that was later found to have been misappropriated from Ms. Capine s employer, Find Funds Inc. Ms. Sundon viewed three of these files and recognizing the potential criminal implications, much like the Fed Ex workers in Jacobsen, Ms. Capine performed her civic duty and called the police. Officer Miller was dispatched to the scene to investigate. He reviewed the three files that Ms. Sundon had personally viewed as well as the remaining files located within the file folder labeled transaction history in order to preserve evidence and confirm the criminal activity. It is well established precedent that Officer Miller was able to legitimately view the three files searched by Ms. Sundon. The issue is whether he was allowed to investigate the remaining files within the transaction history file folder without a warrant. Once a private search has occurred, a police officer may exceed the bounds of the private search subject to reasonable 11

16 conditions. U.S. v. Runyan, 275 F. 3d 449 (5th Cir. 2001). Prior precedent has held that an extended search is reasonable if it occurs after a private investigation of a closed container. U.S v. Rouse, 148 F.3d. 1040, 1041 (8th Cir. 1998). Per the private search exception, once a closed container has been opened, any further police search of that container is simply a continuation of the valid search and seizure conducted by the private party. People v. Emerson, 766 N.Y.S 2d 482 (Sup Cit. 2003). The police do not exceed the scope or a prior private search when they examine the same material more thoroughly than the private party. In the context of a closed container search, this means that the police do not exceed the private search when they examine more items within a closed container than did the private searchers. Runyan, U.S. 275 F. 3d at 461 (2001). While a legitimate privacy interest may have existed at one point in time, the individual s expectation of privacy was already compromised if the container was opened and examined by private searchers. Therefore, the police do not engage in a new search if they examine a particular item found in the container. Courts have previously analogized computer file folders to this established closed container precedent. Id. at 465. If computer files are closed and their contents not apparent from the exterior, the reasonable expectation of privacy is continued so long as the file folder had not been searched before contact with the government occurred. Reopening file folders that had already been opened by a private party, become reasonable when done by the police alone. Id. Analogizing computer file folders to floppy disks, police may search any material on a computer file folder provided that the private party had viewed at least one file. Id. at 461. Using the judgment they have gained from extensive police training, police officers are allowed to ascertain what items in the container are subject to a reasonable search. 12

17 Here, Officer Miller limited his search to the single transaction history file folder that had already been viewed by Ms. Sundon. Ms. Sundon had inspected three files within that folder that she had determined potentially contained evidence of criminal activity. Based on his extensive police training, Officer Miller was able to confirm that these files did contain proof of narcotics trafficking. Because the file folder had already been opened and Ms. Sundon had viewed these three files, Officer Miller s search becomes reasonable. As the closed transaction history file folder had been opened by a private party, Officer Miller was free to investigate the remainder of its contents as a continuation of the original private search. B. The application of the private search exception should be upheld in this case because Officer Miller was virtually certain to uncover incriminating evidence. Even if this Court determines that Ms. Capine had a reasonable privacy interest in the file folder at issue, Officer Miller s search was additionally reasonable because it was almost completely certain that he would discover additional incriminating evidence. The Government has a strong interest in confirming evidence of criminal activity. When police are virtually certain that container hold evidence of incriminating materials, they do not extend the scope of a private search, even when they search beyond what the private party accessed. Jacobsen, 466 U.S at 120. To the extent that additional invasions of a privacy interest occur, they must be tested by the degree to which they exceeded the scope of the original private search. Id. at 131.Generally, police are allowed to move beyond the scope of the private search if they possess a virtual certainty that they will only find evidence of further evidence of criminal activity and not irrelevant legally protected private material. Id. at As such, the Court must balance the degree to which the additional search intrudes upon an individual s privacy versus the degree 13

18 to which it is needed for the promotion of legitimate government interest. Riley v. California, 134 S. Ct. 247 (2014). Such governmental interests generally include legitimate concerns such as public safety and the preservation of evidence. Rann v. Atkinson, 689 F. 3d 832, (7th Cir. 2012). When Officer Miller arrived at the scene, he acted according to best police practices which allowed him to reach the high level of certainty mandated by Fourth Amendment protections. He had received a citizen s tip from Ms. Sundon who had informed police that she had viewed files containing extensive evidence of numerous narcotics transactions conducted by Ms. Capine. Subsequently, he asked Ms. Sundon to show him the three computer files that she had already opened in order to confirm that the files did contain the information she had alleged. As part of his police training, Officer Miller immediately recognized the spreadsheets in the transaction history file folder described various dealings in illicit substances. All of the files in the folder utilized a very descriptive naming system detailing the names of one of Ms. Capine s business associates. For instance, the first two file pairs in the folder were named LitlAl.xlsx, LitlAl.pdf, BigJim.pdf and BigJim.xlsx. This was clearly deliberate on the part of Ms. Capine. Moreover, each excel spread sheet and pdf were approximately the same size as the other documents in the folder. Based on these facts, Officer Miller had every reason to believe that the other files within the transaction history folder contained further incriminating evidence. Recognizing that these files were virtually certain to hold additional evidence, Officer Miller copied the files onto a flash drive to preserve evidence. This is an accepted governmental interest, as computer files can be accessed remotely by co-conspirators or otherwise destroyed by hackers. He then looked through each of the sixteen spreadsheets and their corresponding pdf documents, presumably so 14

19 that he could personally testify to their contents. Notably, he did not search any other files on the Ms. Capine s work computer. He acted in good faith that he did not need any additional warrant based on the fact that he was continuing Ms. Sundon s legitimate private search. After viewing the spreadsheets and the documents, Officer Miller had probable cause to confiscate that laptop and obtained a valid warrant to search the rest of the computer. Both the 5th circuit and 7th circuits have allowed similar searches. United States v. Oliver, 630 F. 3d. 397 (5th Circ. 2011); Rann v. Atkinson, 689 F. 3d 832 (7th Cir. 2012). In these cases, the likelihood that officers would view private information was much higher than the case at bar. When the police were presented with camera memory cards and flash drives containing evidence of child pornography, the court validated their search even though it was highly likely that these two mediums could contain additional, legally irrelevant private information. This is because when a private party has produced evidence that a digital medium contains evidence of illegality, the police can be virtually certain that the device holds additional incriminating evidence and search it without receiving a warrant. Here the analysis is much simpler, as all of the steps that Officer Miller took in his search were profoundly reasonable. Once police have discovered evidence of illegality as the result of a private search, police may judge the contents of an object by its environment and may search something whose contents would be obviously incriminating based on the contents. Rann, 689 F. 3d at 838. Moreover, police officers are always allowed to use their common sense in determining if something contains evidence of illegality in light of the surrounding circumstances. See generally Oliver, 630 F. 3d. at 397. Because the transaction history file folder was a closed container that had already been found to contain incrimination evidence, Officer Miller took clearly reasonable precautions to 15

20 secure the evidence and was virtually certain that he would find further evidence. He searched a singular file folder which had already been shown to contain evidence of drug transactions, not an entire hard drive, flash drive, or camera memory card. The chance that he would find private information was far less likely than any of these previously decided cases. Moreover, the documents utilized an extremely detailed naming system and were all approximately the same size. They each had corresponding names that appeared to list one of Ms. Capine s business associates. Ms. Sundon had already opened three of the files and was absolutely certain that they contained evidence of methamphetamine, marijuana and cocaine sales. The fact that all the documents in the file were nearly identical only further supported Officer Miller s sense that they contained further evidence of criminal activity. It was profoundly unlikely based on the facts of this case that he would have found legally irrelevant information that utilized such a precise nomenclature and clear organizational system. If he had opened other folders besides the one labeled transaction history such as photos, documents or even the eponymous C-drive there might be more grounds for stating that the search was unreasonable as such categories are broad and could have contained private non-relevant information. However, no such action occurred here, making it virtually certain that the remaining files within the folder contained further incriminating evidence. There was such a negligible chance that the additional search of the files at issue would be legally irrelevant and protected by legitimate privacy interests that Officer Miller s reasonable and good faith search of the remaining files should be preserved. The dissent of the Court of Appeals court argues that Office Miller could not have reached the high level of certainty necessitated by the Fourth Amendment mostly because computers can contain large amounts of personal and private information. But it is against public policy that different rules be utilized by police in handling cyber-crime issues. Police have never 16

21 been barred from using their common sense or extensive training in determining whether evidence of criminal activity exists. There should not be a vacuum of law where criminals can be reasonably certain to avoid prosecution for their acts just because they utilized technology. The law must develop with the times, and the public is best served by adapting existing private search doctrine case law to cyber-crime issues. The government does not fail to acknowledge that computers can contain private information beyond what is relevant to a Fourth Amendment search. But when there is such a clear and convincing example of the expansion of a private search that was virtually certain to uncover illegal activity that exists in the case at hand, criminals should not be able to shield themselves with a veil of technology to escape legal due process. Police should not be handicapped just because the evidence at issue is contained in a digital medium and the Court should not create a policy that so hampers police efficiency that cyber-crime issues cannot be adequately combated. Officer Miller took every reasonable step to preserve what may or may not have been Ms. Capine s legitimate privacy interests. If the facts of this case do not demonstrate a virtually certain chance that further illegal evidence would be uncovered within a computer file folder, there could be no case that would satisfy the dissent s requirements. Therefore, the private search exception to the Fourth Amendment should apply and the opinion of the Court of Appeals should be upheld. II. THE COURT OF APPEALS DECISION SHOULD BE AFFIRMED BECAUSE ALBERTA CAPINE EXCEEDED HER AUTHORIZED ACCESS WHEN SHE USED HER EMPLOYEE USERNAME AND PASSWORD TO ACCESS AND DOWNLOAD PRIVATE INFORMATION TO FURTHER A CRIMINAL ENTERPRISE. Alberta Capine was charged and convicted of violating Section 1030(a)(2)(C) of the Computer Fraud and Abuse Act. (R. at 3). Section 1030(a)(2)(C) states that whoever (2) intentionally accesses a computer without authorization or exceeds authorized access, and 17

22 thereby obtains (C) information from any protected computer is in violation of the Act. 18 U.S.C. 1030(a)(2)(C) (2006). Section 1030(e)(6) defines exceeding authorized access as to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter. 18 U.S.C. 1030(e)(6). Courts have applied the definition of exceeds authorized access differently, but the broad definition is the most true to the overall intent and purpose of the statute and should be applied in this case. A. Alberta Capine exceeded authorized access by using her work credentials to download, store, and later access private information for a criminal and nonbusiness purpose. The Court of Appeals correctly applied the broad definition of exceeds authorized access and found that Ms. Capine exceeded her authorized access. Find Funds company policy dictated that employees were not to use company computer resources for personal purposes. (R. at 2). Since Ms. Capine had significant responsibility over the computers at Find Funds and employee access to the financial information databases used by the company, Ms. Capine was almost certainly aware of this policy. (R. at 2). This policy set the limits on Ms. Capine s access. Ms. Capine was provided with a username and password to access Sureinf.com to find information on individuals for debt collection purposes. (R. at 2 3). Ms. Capine went far beyond this purpose when she accessed, downloaded, and stored highly detailed and sensitive information, including names, social security numbers, dates of birth, phone numbers, employment history, and credit information. (R. at 3). She then stored this information in a folder on her computer, where she would later access them for the purpose of selling illegal narcotics. (R. at 3). Furthermore, it is unclear that Ms. Capine needed to access these individuals information on Sureinf.com at all, and nothing in the record suggests that Ms. Capine needed to download 18

23 this information to her computer to perform her work tasks. (R. at 2 3). Using her username and password, Ms. Capine could have accessed this information whenever she needed to. There does not appear to be any work purpose behind Ms. Capine s actions. When Ms. Capine opened these files on her computer for a personal purpose, she violated her company s policy and exceeded authorized access under the CFAA. Ms. Capine s abuse of her access mirrors the facts of a variety of other cases in which the courts have found CFAA violations under the broad definition of exceeds authorized access. In United States v. John, the Fifth Circuit found a CFAA violation when the defendant used her employer-granted access to remove highly sensitive financial information to perpetuate fraud on the employer and its customers. United States v. John, 597 F.3d 263 (5th Cir. 2010). The court stated that exceeding the purposes for which access was authorized can qualify as exceeding authorized access, noting that John s use of Citigroup s computer system to perpetuate fraud was not an intended use of that system. Id. at 272. The facts of John are strikingly similar to our current case, in that Ms. Capine accessed highly confidential information, removed this information from a work database and stored it to her computer, and later accessed this information for a purpose not authorized or approved by her employer. Ms. Capine s use of the information taken from a work-related database was not an intended use of her access, and she therefore exceeded authorized access in violation of the CFAA. Similarly, in United States v. Rodriguez, an employee of the Social Security Administration accessed personal identifying information despite company policy forbidding the access of this data for nonbusiness purposes. United States v. Rodriguez, 628 F.3d 1258, 1260 (11th Cir. 2010). The court found that Rodriguez exceeded his authorized access by accessing the personal information without any business purpose. Id. at While Ms. Capine may have 19

24 initially needed to research the targeted individuals for work reasons (although whether this is the case is not clear), she later accessed this information to further a criminal enterprise. Like Rodriguez, Ms. Capine accessed this information without any business purpose, contrary to company policy, and should therefore be held liable under the CFAA. Finally, in International Airport Centers v. Citrin, the Seventh Circuit found that while the defendant-employee had general permission to access, he did not have authorization to destroy valuable company information in violation of company policy. Int'l Airport Centers, L.L.C. v. Citrin, 440 F.3d 418, (7th Cir. 2006). Invoking principles of agency, the court found that Citrin s general permission to access was terminated when he decided to act contrary to his company s interests. Id. at 420. The factual similarities between the facts of this case and the case at hand strongly support the application of the broad definition to Ms. Capine. Not only did Ms. Capine violate company policy, she acted completely contrary to her employer s interests when she used company credentials to target Find Funds customers for the sale of illegal narcotics. Like Citrin, Ms. Capine s abuse of her employer-granted access supports finding her in violation of the CFAA. B. The broad definition of exceeds authorized access is most true to the goals and purpose of the Computer Fraud and Abuse Act. The statute s definition of exceeding authorized access has led to a circuit split over how Section 1030(a)(2) is to be applied. The Fifth, Seventh, and Eleventh circuits have applied the broad definition of exceeds authorized access. United States v. John, 597 F.3d 263 (5th Cir. 2010). See also Int l Airport Ctrs., LLC v. Citrin, 440 F.3d 418 (7th Cir. 2006); United States v. Rodriguez, 628 F.3d 1258 (11th Cir. 2010). This theory holds that the manner in which an individual uses his access can either terminate the individual s access or qualify as exceeding 20

25 the individual s authorized access. John, 597 F.3d at 272. This idea is based largely on employer policies that are viewed as dictating the limits of an employee s access. Id. at 272. When an employee acts in contravention to the policy, he or she exceeds authorized access, since the employer did not, in theory, give the employee authorization to use his or her access in a way that is contrary to the company s interests. Id. at 273. Agency principles have also been invoked by the courts when applying this theory. Citrin, 440 F.3d at 420. Since employees are initially granted access for work-related purposes, courts have reasoned that this access is rescinded when the employee decides to use the access for a non-business purpose. Id. at In light of the abuses committed by employees using their work credentials for completely unauthorized and unintended purposes, it is the broad definition that should be applied in this case. The broad definition is most true to Congress goal of protecting against hackers and rogue employees looking to do damage with their company authorization. Citrin, 440 F.3d at 420. When first enacted, the CFAA was primarily targeted at hacking, computer misuse to obtain national security secrets, and computer misuse to obtain personal financial records. Orin S. Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 MINN. L. REV. 1561, 1564 (2010). Since its enactment, the CFAA has been amended multiple times, each time expanding the statute s reach further and further. Id. at 1563; Garrett D. Urban, Causing Damage Without Authorization: The Limitations of Current Judicial Interpretations of Employee Authorization Under the Computer Fraud and Abuse Act, 52 WM. & MARY L. REV. 1369, 1384 (2011). This trend towards expansion is indicative of Congress concern not only with hackers, but also with the abuse of authorization. Citrin, 440 F.3d at 420. In its reports discussing the CFAA, Congress has gone so far as to join insider liability with actions exceeding authorized access. Urban, 21

26 Causing Damage, supra, at As an employee of Find Funds, Ms. Capine qualifies as an insider whose actions exceeded her authorized access. Furthermore, as Congress has amended the CFAA, it has never explicitly written employees out of the CFAA s coverage. 18 U.S.C In 1986, 1994, 1996, 2001, and 2008, Congress had the opportunity to make it clear that the Computer Fraud and Abuse Act did not apply to employee abuse of access. Kerr, Vagueness Challenges, supra, at Yet it did not do so, and continued towards expansion. Id. at It also is important to note that the section under which Capine is charged is called Fraud and related activity in connection with computers, supporting the proposition that this statute not only applies to hackers but also to the variety of other abuses and crimes that can be committed using improper access to private information. 18 U.S.C The Fourth and Ninth circuits have chosen to apply what is referred to as the narrow version of exceeds authorized access. WEC Carolina Energy Solutions LLC v. Miller, 687 F.3d 199 (4th Cir. 2012). See also LVRC Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009); United States v. Nosal, 676 F.3d 854 (9th Cir. 2012). Under this definition, an individual only exceeds access when he or she has permission to access a computer, but accesses information on the computer that the individual is not permitted to access. Brekka, 581 F.3d at Proponents of this definition argue that the language of the CFAA fails to clearly indicate that exceeding authorized access occurs when an employee uses his or her access against an employer s interest. Id. at Courts applying the narrow view assert that the violation is not dependent on unauthorized use of information, but upon unauthorized use of access. Diamond Power Int'l, Inc. v. Davidson, 540 F. Supp. 2d 1322, 1343 (N.D. Ga. 2007). Yet, even in light of the Diamond Power court s distinction, Ms. Capine s actions qualify as an unauthorized use of her access. It is 22

27 completely unreasonable to assume that when Find Funds gave Ms. Capine a username and password to access Sureinf.com that the company was giving her license to do whatever she pleased with the information she accessed. Yet, adopting the narrow definition would allow just that, putting individuals whose information is stored in private databases at a substantial risk of having their information accessed and exploited by rogue employees. Since this narrow definition does not properly protect against the variety of computer abuses that the CFAA sought to combat, it should not be applied in this case. Finally, when a statute s text is unclear, we may look to the intent of the statute to decipher its true meaning. Chickasaw Nation v. United States, 534 U.S. 84, 93 94, 122 S. Ct. 528, 535, 151 L. Ed. 2d 474 (2001). Proponents of the narrow view suggest that the CFAA was enacted to primarily target hackers and intentional trespass into computers. United States v. Nosal, 676 F.3d 854, 858 (9th Cir. 2012). But to recognize the statute as protecting against hackers but not against employees who egregiously abuse company computer use policies is to ignore the very thing that Congress seeks to prevent by criminalizing hacking: the misappropriation of information. Hackers typically access private information that they will later exploit. Individuals like Ms. Capine are using their access for the same nefarious result: the exploitation of private information. Rules of statutory interpretation dictate that courts must avoid interpreting the plain language of a statute in a way that produces an absurd result. Robbins v. Chronister, 402 F.3d 1047, 1050 (10th Cir. 2005) on reh'g en banc, 435 F.3d 1238 (10th Cir. 2006) (citing Griffin v. Oceanic Contractors, Inc., 458 U.S. 564, 575, 102 S.Ct. 3245, 73 L.Ed.2d 973 (1982)). Additionally, as Congress discussed liability for employees under the CFAA, much of their concern centered on employees who might briefly access a work computer at work when they are not supposed to or for employees who access the wrong computer in their 23

28 own department. S. REP , at 6 7 (1986), as reprinted in 1986 U.S.C.C.A.N. 2479, The difference between harmless accidental access and Ms. Capine s actions is vast, and Ms. Capine s actions were not what was troubling Congress when it was discussing when employees should be held liable. Therefore, applying the language of the statute to include criminal employees like Capine would not be an absurd result. Calyon v. Mizuho Sec. USA, Inc., No. 07 CIV (RO), 2007 WL , at *1 (S.D.N.Y. July 24, 2007). C. The application of the broad definition of exceeds authorized access will not raise any fair notice concerns as to what is prohibited by the CFAA Furthermore, application of the broad definition of exceeds authorized access will not lead to claims of inadequate notice or a downpour of frivolous CFAA prosecutions. Company policies will set the parameters for access, making it clear when an employee is acting in contravention of those parameters. In Rodriguez, the Social Security Administration had a policy that prohibited employees like Rodriguez from obtaining information from the work databases without a business reason. United States v. Rodriguez, 628 F.3d 1258, 1260 (11th Cir. 2010). Similarly, in John, John s employer had an official policy prohibiting the misuse of the company s computer systems and confidential information. United States v. John, 597 F.3d 263, 272 (5th Cir. 2010). Finally, in our current case, Find Funds policy prohibited employees from using company computer resources for personal purposes. (R. at 2). The Act being applied here is the Computer Fraud and Abuse Act. Prosecutors will understand that taking a brief Sudoku break at work does not qualify as computer fraud and abuse. The application of the broad definition might require some employers to create more detailed computer policies, but it will also prevent employees from abusing access to private information databases by claiming to be authorized users. Furthermore, in Ms. Capine s case, 24

No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, UNITED STATES OF AMERICA, Respondent.

No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, UNITED STATES OF AMERICA, Respondent. No. 10-1011 In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, v. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari To The United States Court of Appeals For The Twelfth Circuit

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 10-1011 In the Supreme Court of the United States ALBERTA CAPINE v. Petitioner, UNITED STATES OF AMERICA Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE TWELFTH CIRCUIT

More information

Supreme Court of the United States

Supreme Court of the United States Case No. 10-1011 IN THE Supreme Court of the United States April Term, 2016 ALBERTA CAPINE, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals

More information

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES v. LICHTENBERGER Abstract: In 2015 in United States v. Lichtenberger,

More information

Digitizing the Private Search Doctrine: Is a Computer a Container?

Digitizing the Private Search Doctrine: Is a Computer a Container? Digitizing the Private Search Doctrine: Is a Computer a Container? by TAYLOR J. PFINGST* Introduction The digital era has ushered in a new age, where the technology of today is almost instantaneously surpassed

More information

SUPREME COURT OF THE UNITED STATES OF AMERICA

SUPREME COURT OF THE UNITED STATES OF AMERICA DOCKET NO. 2015-11 OCTOBER TERM 2015 SUPREME COURT OF THE UNITED STATES OF AMERICA ALBERT GREENE, Petitioner V. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES

More information

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Defending Freedom on the Electronic Frontier eff.org Know Your Rights Your computer, phone, and other digital devices hold vast amounts of personal

More information

Supreme Court of The United States

Supreme Court of The United States TEAM 2 DOCKET NO. 10-1011 IN THE Supreme Court of The United States ELIZABETH JENNINGS, PETITIONER, V. UNITED STATE OF AMERICA, RESPONDENT. ON WRIT OF CERTIORARI FROM THE UNITED STATES COURT OF APPEALS,

More information

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents.

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception?

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception? Catholic University Law Review Volume 66 Issue 2 Winter 2016 Article 9 3-23-2017 The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

United States District Court

United States District Court Case:0-cr-00-JSW Document Filed0/0/0 Page of NOT FOR CITATION IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA UNITED STATES OF AMERICA, 0 Plaintiff, No. CR 0-00 JSW v. ANDREW

More information

Recent Federal Developments in Trade Secrets Law:

Recent Federal Developments in Trade Secrets Law: Recent Federal Developments in Trade Secrets Law: 2012-2013 R. Mark Halligan Nixon Peabody LLP 300 S. Riverside Plaza, 16th Floor Chicago, Illinois 60606 (312) 425-3970 rmhalligan@nixonpeabody.com Economic

More information

9th Circ.'s Expansive Standard For Standing In Breach Case

9th Circ.'s Expansive Standard For Standing In Breach Case Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com 9th Circ.'s Expansive Standard For Standing

More information

Testimony of Orin S. Kerr Professor, George Washington University Law School

Testimony of Orin S. Kerr Professor, George Washington University Law School Testimony of Orin S. Kerr Professor, George Washington University Law School United States House of Representatives Committee on the Judiciary Subcommittee on the Crime, Terrorism, and Homeland Security

More information

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent.

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent. Case No. 10-1011 In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. BRIEF FOR PETITIONER Team 15 Counsel for the Petitioner

More information

Calif. Privacy Act Will Increase Data Breach Liability

Calif. Privacy Act Will Increase Data Breach Liability Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Calif. Privacy Act Will Increase Data Breach

More information

NOS ; IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE,

NOS ; IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE, Case: 14-10037, 08/26/2016, ID: 10102467, DktEntry: 73, Page 1 of 27 NOS. 14-10037; 14-10275 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, V. PLAINTIFF-APPELLEE,

More information

Supreme Court of the United States

Supreme Court of the United States No. 16-066 IN THE Supreme Court of the United States MARVIN SKRELLY Petitioner, v. UNITED STATES OF AMERICA Respondent. On Petition for Writ of Certiorari to the United States Court of Appeals for the

More information

S11G0644. HAWKINS v. THE STATE. This Court granted certiorari to the Court of Appeals to consider whether

S11G0644. HAWKINS v. THE STATE. This Court granted certiorari to the Court of Appeals to consider whether In the Supreme Court of Georgia Decided: March 23, 2012 S11G0644. HAWKINS v. THE STATE. HINES, Justice. This Court granted certiorari to the Court of Appeals to consider whether that Court properly determined

More information

Case 2:13-cr KJM Document 169 Filed 06/13/16 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA

Case 2:13-cr KJM Document 169 Filed 06/13/16 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF CALIFORNIA Case :-cr-000-kjm Document Filed 0// Page of PHILLIP A. TALBERT Acting United States Attorney MATTHEW D. SEGAL PAUL HEMESATH Assistant United States Attorneys 0 I Street, Suite 0-00 Sacramento, CA Telephone:

More information

The Private Search Doctrine After Jones Andrew MacKie-Mason

The Private Search Doctrine After Jones Andrew MacKie-Mason THE YALE LAW JOURNAL FORUM J ANUARY 2, 2017 The Private Search Doctrine After Jones Andrew MacKie-Mason introduction In United States v. Jacobsen, 1 the Supreme Court created a curious aspect of Fourth

More information

PLAIN VIEW. Priscilla M. Grantham

PLAIN VIEW. Priscilla M. Grantham PLAIN VIEW Priscilla M. Grantham GENERAL PRINCIPLES: If in the course of a lawful search, police see items that are incriminating or have evidentiary value, under the plain view doctrine they may be able

More information

United States Court of Appeals

United States Court of Appeals United States of America, v. Antoine Jones, Case: 08-3034 Document: 1278562 Filed: 11/19/2010 Page: 1 Appellee Appellant ------------------------------ Consolidated with 08-3030 1:05-cr-00386-ESH-1 Filed

More information

By Jane Lynch and Jared Wagner

By Jane Lynch and Jared Wagner Can police obtain cell-site location information without a warrant? - The crossroads of the Fourth Amendment, privacy, and technology; addressing whether a new test is required to determine the constitutionality

More information

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States,

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States, P21. In The SUPREME COURT OF THE UNITED STATES October Term, 2015 Docket No. 2015-11 Albert Greene, v. United States, Petitioner, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 10-1011 In the Supreme Court of the United States ELIZABETH JENNINGS, Petitioner, V. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

IN THE SUPREME COURT OF THE STATE OF NEW MEXICO

IN THE SUPREME COURT OF THE STATE OF NEW MEXICO IN THE SUPREME COURT OF THE STATE OF NEW MEXICO Opinion Number: 2010-NMSC-046 Filing Date: October 19, 2010 Docket No. 31,656 STATE OF NEW MEXICO, v. Plaintiff-Respondent, ERICA RIVERA, Defendant-Petitioner.

More information

Petitioner, Respondent.

Petitioner, Respondent. No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, Petitioner, vs. UNITED STATES OF AMERICA, Respondent. PETITIONER S REPLY BRIEF HANNAH VALDEZ GARST Law Offices of Hannah Garst 121 S.

More information

Case 3:16-mc RS Document 84 Filed 08/14/17 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA I.

Case 3:16-mc RS Document 84 Filed 08/14/17 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA I. Case :-mc-0-rs Document Filed 0// Page of UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA 0 In the Matter of the Search of Content Stored at Premises Controlled by Google Inc. and as Further

More information

No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent.

No IN THE SUPREME COURT OF THE UNITED STATES. Elizabeth Jennings, Petitioner. United States of America, Respondent. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES Elizabeth Jennings, Petitioner v. United States of America, Respondent. On Writ of Certiorari to the United States Supreme Court of the United States

More information

357 (1967)) U.S. 752 (1969). 4 Id. at 763. In Chimel, the Supreme Court held that a search of the arrestee s entire house

357 (1967)) U.S. 752 (1969). 4 Id. at 763. In Chimel, the Supreme Court held that a search of the arrestee s entire house CONSTITUTIONAL LAW FOURTH AMENDMENT FIRST CIR- CUIT HOLDS THAT THE SEARCH-INCIDENT-TO-ARREST EXCEP- TION DOES NOT AUTHORIZE THE WARRANTLESS SEARCH OF CELL PHONE DATA. United States v. Wurie, 728 F.3d 1

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2013-08 Appellant ) ) v. ) ) ORDER Technical Sergeant (E-6) ) SAMUEL A. WICKS, ) USAF, ) Appellee ) Special Panel

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 14 1003 UNITED STATES OF AMERICA, Plaintiff Appellee, v. FRANK CAIRA, Defendant Appellant. Appeal from the United States District Court

More information

10SA304, People v. Schutter: Fourth Amendment Warrantless Search Contents of iphone Lost or Mislaid Property.

10SA304, People v. Schutter: Fourth Amendment Warrantless Search Contents of iphone Lost or Mislaid Property. Opinions of the Colorado Supreme Court are available to the public and can be accessed through the Court s homepage at http://www.courts.state.co.us Opinions are also posted on the Colorado Bar Association

More information

IN THE SUPREME COURT OF THE STATE OF OREGON

IN THE SUPREME COURT OF THE STATE OF OREGON IN THE SUPREME COURT OF THE STATE OF OREGON STATE OF OREGON, Plaintiff-Respondent, Respondent on Review, v. CARYN ALINE NASCIMENTO, aka Caryn Aline Demars, Jefferson County Circuit Court Case No. 09FE0092

More information

Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim

Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim Three Threshold Questions Every Attorney Must Answer before Filing a Computer Fraud Claim By Pierre Grosdidier It can be tempting to file a lawsuit against a computer trespasser or wrongdoer with a claim

More information

Briefing from Carpenter v. United States

Briefing from Carpenter v. United States Written Material for Inside Oral Argument Briefing from Carpenter v. United States The mock oral argument will be based Carpenter v. United States, which is pending before the Supreme Court of the United

More information

NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT Case: 11-55436 03/20/2013 ID: 8558059 DktEntry: 47-1 Page: 1 of 5 FILED NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS MAR 20 2013 MOLLY C. DWYER, CLERK U.S. COURT OF APPEALS FOR THE NINTH CIRCUIT

More information

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has FOURTH AMENDMENT WARRANTLESS SEARCHES FIFTH CIRCUIT UPHOLDS STORED COMMUNICATIONS ACT S NON- WARRANT REQUIREMENT FOR CELL-SITE DATA AS NOT PER SE UNCONSTITUTIONAL. In re Application of the United States

More information

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding CELL PHONE SEARCHES IN SCHOOLS: THE NEW FRONTIER ANDREA KLIKA I. Introduction In the age of smart phones, what once was a simple device to make phone calls has become a personal computer that stores a

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON. v. CASE NO.: 15:16-CR CHR-ESW

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON. v. CASE NO.: 15:16-CR CHR-ESW UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON TEAM 1631D UNITED STATES OF AMERICA, v. CASE NO.: 15:16-CR-02342-CHR-ESW CHARLIE WYATT, Defendant. DEFENDANT S MEMORANDUM IN SUPPORT OF

More information

Follow this and additional works at:

Follow this and additional works at: 2003 Decisions Opinions of the United States Court of Appeals for the Third Circuit 2-19-2003 USA v. Mercedes Precedential or Non-Precedential: Non-Precedential Docket 00-2563 Follow this and additional

More information

Supreme Court of the United States

Supreme Court of the United States No. 16- IN THE Supreme Court of the United States DAVID NOSAL, v. Petitioner, UNITED STATES OF AMERICA Respondent. On Petition for a Writ of Certiorari to the United States Court of Appeals for the Ninth

More information

Supreme Court of the United States

Supreme Court of the United States No. IN THE Supreme Court of the United States ARMANDO GARCIA v. Petitioner, THE UNITED STATES OF AMERICA, Respondent. On Petition For Writ Of Certiorari To The United States Court of Appeals (7th Cir.)

More information

v. CIVIL ACTION NO. H

v. CIVIL ACTION NO. H Rajaee v. Design Tech Homes, Ltd et al Doc. 42 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION SAMAN RAJAEE, Plaintiff, v. CIVIL ACTION NO. H-13-2517 DESIGN TECH

More information

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District No. 13-132 IN THE DAVID LEON RILEY, v. Petitioner, STATE OF CALIFORNIA, Respondent. On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District REPLY BRIEF FOR PETITIONER Patrick

More information

No IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, DAVID NOSAL,

No IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, DAVID NOSAL, Case: 10-10038 10/22/2010 Page: 1 of 37 ID: 7519986 DktEntry: 27 No. 10-10038 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, v. DAVID NOSAL,

More information

The Burger Court Opinion Writing Database

The Burger Court Opinion Writing Database The Burger Court Opinion Writing Database United States v. Jacobsen 466 U.S. 109 (1984) Paul J. Wahlbeck, George Washington University James F. Spriggs, II, Washington University in St. Louis Forrest Maltzman,

More information

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant.

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant. IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA JEFFREY SCOTT FAWDRY, v. Appellant, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED CASE NO.

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF OREGON ADAM MATOT, v. OPINION AND ORDER. CH et al., Defendants.

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF OREGON ADAM MATOT, v. OPINION AND ORDER. CH et al., Defendants. Matot v. CH Doc. 31 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF OREGON ADAM MATOT, Plaintiff, Civ. No. 6:13-cv-153-MC CH et al., v. OPINION AND ORDER Defendants. MCSHANE, Judge: Plaintiff brings

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 1 1 1 0 1 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE ANCORA TECHNOLOGIES, INC., v. Plaintiff, HTC AMERICA, INC. and HTC CORPORATION, Defendants. I. INTRODUCTION HONORABLE RICHARD

More information

The State of South Carolina OFFICE OF THE ATTORNEY GENERAL. April 21, 1998

The State of South Carolina OFFICE OF THE ATTORNEY GENERAL. April 21, 1998 The State of South Carolina OFFCE OF THE ATTORNEY GENERAL CHARLES M OL ONY C ONDON ATTORN EY GENERAL Sheriff, Newberry County Post Office Box 247 Newberry, South Carolina 29108 Re: nformal Opinion Dear

More information

Computer Search and Seizure

Computer Search and Seizure Computer Search and Seizure National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org Funding! This project is supported by grants

More information

MINNESOTA v. DICKERSON 113 S.Ct (1993) United States Supreme Court

MINNESOTA v. DICKERSON 113 S.Ct (1993) United States Supreme Court Washington and Lee Journal of Civil Rights and Social Justice Volume 1 Issue 1 Article 19 Spring 4-1-1995 MINNESOTA v. DICKERSON 113 S.Ct. 2130 (1993) United States Supreme Court Follow this and additional

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellant, FOR PUBLICATION November 6, 2014 9:00 a.m. v No. 310416 Kent Circuit Court MAXIMILIAN PAUL GINGRICH, LC No. 11-007145-FH

More information

Case 2:15-cv PA-AJW Document 1 Filed 01/02/15 Page 1 of 11 Page ID #:1 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Deadline.

Case 2:15-cv PA-AJW Document 1 Filed 01/02/15 Page 1 of 11 Page ID #:1 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Deadline. Case :-cv-000-pa-ajw Document Filed 0/0/ Page of Page ID #: 0 STEVEN M. TINDALL (SBN ) stindall@rhdtlaw.com VALERIE BRENDER (SBN ) vbrender@rhdtlaw.com RUKIN HYLAND DORIA & TINDALL LLP 00 Pine Street,

More information

A (800) (800)

A (800) (800) No. 14-6166 In the Supreme Court of the United States DAVID ANTHONY TAYLOR, Petitioner, v. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari to the United States Court of Appeals for the Fourth

More information

UNITED STATES DISTRICT COURT DISTRICT OF MAINE. UNITED STATES OF AMERICA ) ) v. ) Criminal Number: P-H ) DUCAN FANFAN )

UNITED STATES DISTRICT COURT DISTRICT OF MAINE. UNITED STATES OF AMERICA ) ) v. ) Criminal Number: P-H ) DUCAN FANFAN ) UNITED STATES DISTRICT COURT DISTRICT OF MAINE UNITED STATES OF AMERICA ) ) v. ) Criminal Number: 03-47-P-H ) DUCAN FANFAN ) GOVERNMENT'S REPLY SENTENCING MEMORANDUM NOW COMES the United States of America,

More information

SUPREME COURT OF NEW YORK APPELLATE DIVISION, THIRD DEPARTMENT

SUPREME COURT OF NEW YORK APPELLATE DIVISION, THIRD DEPARTMENT SUPREME COURT OF NEW YORK APPELLATE DIVISION, THIRD DEPARTMENT People v. Devone 1 (decided December 24, 2008) Damien Devone was arrested for two counts of criminal possession of a controlled substance.

More information

SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent.

SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI. Petitioner, Respondent. SUPREME COURT OF THE UNITED STATES ORDER GRANTING WRIT OF CERTIORARI ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. No. 10-1011 NOTICE IS HEREBY GIVEN THAT the petition for writ

More information

United States Court of Appeals

United States Court of Appeals United States Court of Appeals FOR THE EIGHTH CIRCUIT No. 03-1387 United States of America, * * Plaintiff-Appellee, * * Appeal from the United States v. * District Court for the * Southern District of

More information

Texas Law Review Online Volume 97

Texas Law Review Online Volume 97 Texas Law Review Online Volume 97 Response What Am I Really Saying When I Open My Smartphone? A Response to Orin S. Kerr Laurent Sacharoff * In his article, Compelled Decryption and the Privilege Against

More information

Case 2:13-cr KJM Document 167 Filed 06/08/16 Page 1 of 12

Case 2:13-cr KJM Document 167 Filed 06/08/16 Page 1 of 12 Case -cr-000-kjm Document Filed 0/0/ Page of Tor Ekeland (PHV) Mark Jaffe (PHV) TOR EKELAND, P.C. Plymouth Street Brooklyn, NY 0 Tel -- Fax -0- tor@torekeland.com mark@torekeland.com Jason S. Leiderman,

More information

IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT. No D.C. Docket No. 1:10-cr TWT-AJB-6. versus

IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT. No D.C. Docket No. 1:10-cr TWT-AJB-6. versus USA v. Catarino Moreno Doc. 1107415071 Case: 12-15621 Date Filed: 03/27/2014 Page: 1 of 11 IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT No. 12-15621 D.C. Docket No. 1:10-cr-00251-TWT-AJB-6

More information

California v. Greenwood: Police Access to Valuable Garbage

California v. Greenwood: Police Access to Valuable Garbage Case Western Reserve Law Review Volume 39 Issue 3 1989 California v. Greenwood: Police Access to Valuable Garbage Richard A. Di Lisi Follow this and additional works at: http://scholarlycommons.law.case.edu/caselrev

More information

Supreme Court of The United States

Supreme Court of The United States No. 10-1011 In The Supreme Court of The United States ELIZABETH JENNINGS Petitioner, v. UNITED STATES OF AMERICA Respondent. ON PETITION FOR A WRIT OF CERTIORARI TO THE SUPREME COURT OF THE UNITED STATES

More information

United States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment

United States v. Jones: The Foolish revival of the Trespass Doctrine in Addressing GPS Technology and the Fourth Amendment Valparaiso University Law Review Volume 47 Number 2 pp.277-288 Winter 2013 United States v. Jones: The Foolish revival of the "Trespass Doctrine" in Addressing GPS Technology and the Fourth Amendment Brittany

More information

MEMORANDUM FOR BASIC LEGAL RESEARCH & WRITING I. QUESTIONS PRESENTED. A. Will Mr. Smeek prevail on a motion to suppress the 300 grams of hail seized

MEMORANDUM FOR BASIC LEGAL RESEARCH & WRITING I. QUESTIONS PRESENTED. A. Will Mr. Smeek prevail on a motion to suppress the 300 grams of hail seized MEMORANDUM FOR BASIC LEGAL RESEARCH & WRITING TO: MR. CONGIARDO FROM: AMANDA SCOTT SUBJECT: RE: PEOPLE V. JOSHUA SMEEK DATE: DECEMBER 10, 2015 I. QUESTIONS PRESENTED A. Will Mr. Smeek prevail on a motion

More information

In The Supreme Court of the United States

In The Supreme Court of the United States No. 08-497 In The Supreme Court of the United States -------------------------- --------------------------- AMERISOURCE CORPORATION, Petitioner, v. THE UNITED STATES OF AMERICA, --------------------------

More information

In The SUPREME COURT OF THE UNITED STATES NEW YORK, -versus- AZIM HALL, REPLY BRIEF IN SUPPORT OF PETITION FOR A WRIT OF CERTIORARI

In The SUPREME COURT OF THE UNITED STATES NEW YORK, -versus- AZIM HALL, REPLY BRIEF IN SUPPORT OF PETITION FOR A WRIT OF CERTIORARI 07-1568 In The SUPREME COURT OF THE UNITED STATES NEW YORK, -versus- AZIM HALL, Petitioner, Respondent. REPLY BRIEF IN SUPPORT OF PETITION FOR A WRIT OF CERTIORARI The State of New York submits this reply

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2009-15 Appellant ) ) v. ) ) ORDER Airman First Class (E-3) ) ADAM G. COTE, ) USAF, ) Appellee ) Special Panel

More information

UNITED STATES OF AMERICA, PETITIONER DAVID NOSAL, RESPONDENT. No BRIEF FOR PETITIONER

UNITED STATES OF AMERICA, PETITIONER DAVID NOSAL, RESPONDENT. No BRIEF FOR PETITIONER No. 10-10038 UNITED STATES OF AMERICA, PETITIONER v. DAVID NOSAL, RESPONDENT ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BRIEF FOR PETITIONER JESSICA L. DIAZ Attorney

More information

Exceeding authorized access in the workplace: Prosecuting disloyal conduct under the Computer Fraud and Abuse Act

Exceeding authorized access in the workplace: Prosecuting disloyal conduct under the Computer Fraud and Abuse Act Exceeding authorized access in the workplace: Prosecuting disloyal conduct under the Computer Fraud and Abuse Act Authors: Stephanie M. Greene, Christine Neylon O'Brien Persistent link: http://hdl.handle.net/2345/bc-ir:103632

More information

Supreme Court of the United States

Supreme Court of the United States No. 16-424 IN THE Supreme Court of the United States RODNEY CLASS, v. UNITED STATES OF AMERICA, Petitioner, Respondent. On Petition for a Writ of Certiorari to the United States Court of Appeals for the

More information

Case 1:17-cr RNS Document 37 Entered on FLSD Docket 05/01/2018 Page 1 of 17 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA

Case 1:17-cr RNS Document 37 Entered on FLSD Docket 05/01/2018 Page 1 of 17 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA Case 1:17-cr-20648-RNS Document 37 Entered on FLSD Docket 05/01/2018 Page 1 of 17 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA CASE NO. 17-CR-20648-SCOLA/TORRES UNITED STATES OF AMERICA, Plaintiff,

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN NORTHERN DIVISION. Petitioner, Case No BC v. Honorable David M.

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN NORTHERN DIVISION. Petitioner, Case No BC v. Honorable David M. UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN NORTHERN DIVISION ERIC VIDEAU, Petitioner, Case No. 01-10353-BC v. Honorable David M. Lawson ROBERT KAPTURE, Respondent. / OPINION AND ORDER DENYING

More information

Security Video Surveillance Policy

Security Video Surveillance Policy Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety

More information

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION Many of us 1 have experienced that sinking feeling before: the moment you realize that your cell phone is missing. First, it is the

More information

APPLICATION & SUBSCRIBER AGREEMENT FOR INTERNET ACCESS TO DINWIDDIE CIRCUIT COURT DOCUMENTS APPLICATION

APPLICATION & SUBSCRIBER AGREEMENT FOR INTERNET ACCESS TO DINWIDDIE CIRCUIT COURT DOCUMENTS APPLICATION APPLICATION & SUBSCRIBER AGREEMENT FOR INTERNET ACCESS TO DINWIDDIE CIRCUIT COURT DOCUMENTS The approval of this application is at the Clerk of the Circuit Court's discretion. By signing this application

More information

STATE V. GANT: DEPARTING FROM THE BRIGHT-LINE BELTON RULE IN AUTOMOBILE SEARCHES INCIDENT TO ARREST

STATE V. GANT: DEPARTING FROM THE BRIGHT-LINE BELTON RULE IN AUTOMOBILE SEARCHES INCIDENT TO ARREST STATE V. GANT: DEPARTING FROM THE BRIGHT-LINE BELTON RULE IN AUTOMOBILE SEARCHES INCIDENT TO ARREST Holly Wells INTRODUCTION In State v. Gant, 1 the Arizona Supreme Court, in a 3 to 2 decision, held that

More information

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes BUSINESS LAW Chapter 8 Criminal Law and Cyber Crimes Learning Objectives List and describe the essential elements of a crime. Describe criminal procedure, including arrest, indictment, arraignment, and

More information

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter

Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Indiana Association of Professional Investigators November 16, 2017 Stephanie C. Courter Ensure that you don t go from investigator to investigated Categories of law: Stalking, online harassment & cyberstalking

More information

IN THE COURT OF APPEALS OF NORTH CAROLINA. No. COA Filed: 20 September 2016

IN THE COURT OF APPEALS OF NORTH CAROLINA. No. COA Filed: 20 September 2016 IN THE COURT OF APPEALS OF NORTH CAROLINA No. COA16-173 Filed: 20 September 2016 Watauga County, No. 14 CRS 50923 STATE OF NORTH CAROLINA v. ANTWON LEERANDALL ELDRIDGE Appeal by defendant from judgment

More information

LAWS OF CORRECTION & CUSTODY ALABAMA PEACE OFFICERS STANDARDS & TRAINING COMMISSION

LAWS OF CORRECTION & CUSTODY ALABAMA PEACE OFFICERS STANDARDS & TRAINING COMMISSION LAWS OF CORRECTION & CUSTODY ALABAMA PEACE OFFICERS STANDARDS & TRAINING COMMISSION LESSON OBJECTIVES Understand basic jail procedures and the booking process Know prisoners constitutional rights Understand

More information

IN BRIEF SECTION 24(2) OF THE CHARTER EXCLUSION OF EVIDENCE. Learning Objectives. Materials. Extension. Teaching and Learning Strategies

IN BRIEF SECTION 24(2) OF THE CHARTER EXCLUSION OF EVIDENCE. Learning Objectives. Materials. Extension. Teaching and Learning Strategies OF THE CHARTER EXCLUSION OF EVIDENCE Learning Objectives To develop students knowledge of section 24(2) of the Charter, including the legal test used to determine whether or not evidence obtained through

More information

UNITED STATES COURT OF APPEALS ORDER AND JUDGMENT * Defendant Christopher Scott Pulsifer was convicted of possession of marijuana

UNITED STATES COURT OF APPEALS ORDER AND JUDGMENT * Defendant Christopher Scott Pulsifer was convicted of possession of marijuana UNITED STATES OF AMERICA, FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Tenth Circuit Plaintiff - Appellee, TENTH CIRCUIT October 23, 2014 Elisabeth A. Shumaker Clerk of Court v.

More information

Case 1:13-mj JMF Document 5 Filed 11/26/13 Page 1 of 16 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:13-mj JMF Document 5 Filed 11/26/13 Page 1 of 16 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:13-mj-00742-JMF Document 5 Filed 11/26/13 Page 1 of 16 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) IN THE MATTER OF THE SEARCH OF ) INFORMATION ASSOCIATED WITH THE ) FACEBOOK ACCOUNT

More information

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL.

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. Riley v. California, 134 S. Ct. 2473 (2014). 1 STEWART JAMES ALVIS In

More information

No In The Supreme Court of the United States. Gerrard Leomund, Petitioner, v. United States of America, Respondent.

No In The Supreme Court of the United States. Gerrard Leomund, Petitioner, v. United States of America, Respondent. No. 15-3996 In The Supreme Court of the United States Gerrard Leomund, Petitioner, v. United States of America, Respondent. On Writ of Certiorari to The United States Court of Appeals For the Fourteenth

More information

IN THE SUPREME COURT OF GUAM. PEOPLE OF GUAM, Plaintiff-Appellant, ZACHARY RICHARD ULLOA CAMACHO, Defendant-Appellee. OPINION. Filed: May 7, 2004

IN THE SUPREME COURT OF GUAM. PEOPLE OF GUAM, Plaintiff-Appellant, ZACHARY RICHARD ULLOA CAMACHO, Defendant-Appellee. OPINION. Filed: May 7, 2004 IN THE SUPREME COURT OF GUAM PEOPLE OF GUAM, Plaintiff-Appellant, v. ZACHARY RICHARD ULLOA CAMACHO, Defendant-Appellee. Supreme Court Case No.: CRA03-002 Superior Court Case No.: CF0070-02 OPINION Filed:

More information

IN THE SUPREME COURT OF THE STATE OF OREGON S063197

IN THE SUPREME COURT OF THE STATE OF OREGON S063197 i IN THE SUPREME COURT OF THE STATE OF OREGON STATE OF OREGON, Plaintiff-Appellee, v. CARYN ALINE NASCIMENTO, aka CARYN ALINE DEMARS, Defendant-Appellant. Jefferson County Circuit Court Case No. 09FE0092

More information

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. STATE OF NEW JERSEY, v. Plaintiff-Appellant, DAMEON L. WINSLOW, Defendant-Respondent.

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 06-2741 UNITED STATES OF AMERICA, v. Plaintiff-Appellee, BERNARDO GARCIA, Defendant-Appellant. Appeal from the United States District Court

More information

STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY. vs. Case No. 12 CF BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE

STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY. vs. Case No. 12 CF BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE STATE OF WISCONSIN : CIRCUIT COURT : BROWN COUNTY STATE OF WISCONSIN, Plaintiff, vs. Case No. 12 CF 000000 JOHN DOE, Defendant. BRIEF IN SUPPORT OF MOTION TO SUPPRESS EVIDENCE THE DEFENDANT, John Doe,

More information

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry UNDERSTANDING CYBER CRIMES Introduction The advent of internet and the revolution of cyber space in communication, commerce and information is hailed as a paradigm shift in use of technology and its percolation

More information

IN THE SUPREME COURT OF THE UNITED STATES. OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner. UNITED STATES OF AMERICA, Respondent

IN THE SUPREME COURT OF THE UNITED STATES. OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner. UNITED STATES OF AMERICA, Respondent IN THE SUPREME COURT OF THE UNITED STATES OCTOBER TERM, 2015 LEVON DEAN, JR., Petitioner v. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS

More information

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI EASTERN DIVISION. RYAN GALEY and REGINA GALEY

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI EASTERN DIVISION. RYAN GALEY and REGINA GALEY Galey et al v. Walters et al Doc. 10 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI EASTERN DIVISION RYAN GALEY and REGINA GALEY PLAINTIFFS V. CIVIL ACTION NO. 2:14cv153-KS-MTP

More information

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT USA v. Christine Estrada Case: 15-10915 Document: 00513930959 Page: 1 Date Filed: 03/29/2017Doc. 503930959 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT UNITED STATES OF AMERICA, United States

More information