No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, UNITED STATES OF AMERICA, Respondent.

Size: px
Start display at page:

Download "No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, UNITED STATES OF AMERICA, Respondent."

Transcription

1 No In The SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner, v. UNITED STATES OF AMERICA, Respondent. On Writ of Certiorari To The United States Court of Appeals For The Twelfth Circuit BRIEF OF PETITIONER Team 2 Counsel for Petitioner

2 TABLE OF CONTENTS TABLE OF AUTHORTIES... ii QUESTIONS PRESENTED... 1 OPINIONS BELOW... 1 CONSTITUTIONAL PROVISIONS AND RULES... 1 INTRODUCTION... 1 STATEMENT OF THE CASE... 4 ARGUMENT... 5 I. THE COMPUTER FILES THAT WERE NOT PART OF SUNDON S PRIVATE SEARCH SHOULD NOT BE ADMITTED UNDER THE PRIVATE SEARCH EXCEPTION A. Computer files are subject to immense privacy concerns that make them akin to private homes, two which the private search exception does not apply B. Even if a container framework is applied, the computer files should be considered containers, and are not reached by the private search exception As containers, the files that were not opened during the private search maintained their reasonable expectations of privacy The decision of United States v. Runyan is incorrect and should not be applied. Even if it were applied, Officer Miller did not have the substantial certainty that Runyan requires C. Even if the computer folders were considered containers, the private search exception does not apply The contents of the transaction history folder maintained a reasonable expectation of privacy following the private search The opening of one file within a folder does not necessitate that all files within that folder lose their expectation of privacy i

3 II. THE CFAA SHOULD BE INTERPRETED NARROWLY, IMMUNIZING CAPINE FROM LIABILITY A. Two interpretations of authorization within the CFAA have developed B. The plain language of the CFAA favors a narrow interpretation of authorization C. The rule of lenity dictates that the narrow interpretation should be adopted D. A broad interpretation of the CFAA would render it void for vagueness E. The narrow interpretation of authorization should be adopted to avoid setting a precedent in favor of overly expansive computer laws F. Applying the narrow interpretation of the CFAA leads to the conclusion that Capine did not violate the CFAA CONCLUSION TABLE OF AUTHORTIES Cases Abramski v. United States, 134 S. Ct (2014) Coates v. City of Cincinnati, 402 U.S. 611 (1971)... 26, 27 Connally v. Gen. Const. Co., 269 U.S. 385 (1926) Consumer Prod. Safety Comm'n v. GTE Sylvania, Inc., 447 U.S. 102 (1980) EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001)... 20, 27 Ex parte Jackson, 96 U.S. 727 (1877) Illinois v. Andreas, 463 U.S. 765 (1983) Int'l Airport Centers, L.L.C. v. Citrin, 440 F.3d 418 (7th Cir. 2006) LVRC Holdings LLC v. Brekka, 581 F.3d 1127, (9th Cir. 2009) Muscarello v. United States, 524 U.S. 125, 138 (1998) New York v. Belton, 453 U.S. 454 (1981)... 6, 8 Perrin v. United States, 444 U.S. 37 (1979) Riley v. California, 134 S. Ct (2014)... 6, 7, 8, 9, 11 Smith v. Goguen, 415 U.S. 566 (1974) ii

4 Smith v. Ohio, 494 U.S. 541 (1990) United States v. Allen, 106 F.3d 695, (6th Cir. 1997)... 9 United States v. Bass, 404 U.S. 336 (1971) United States v. Carey, 172 F.3d 1268 (10th Cir. 1999)... 8, 11, 18 United States v. Chesney, 86 F.3d 564 (6th Cir. 1996) United States v. Jacobsen, 466 U.S. 109 (1984)... 6, 7, 14, 15 United States v. John, 597 F.3d 263 (5th Cir. 2010) United States v. Knoll, 16 F.3d 1313 (2d Cir. 1994) United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015)... 8, 11, 13, 15, 16, 18 United States v. Mitchell, 565 F.3d 1347 (11th Cir. 2009)... 9, 11 United States v. Mitra, 405 F.3d 492 (7th Cir. 2005)... 19, 24 United States v. Nosal, 676 F.3d 854 (9th Cir. 2012)... 19, 20, 28 United States v. Oliver, 630 F.3d 397 (5th Cir 2011) United States v. Place, 462 U.S. 696 (1983) United States v. Rodriguez, 628 F.3d 1258 (11th Cir. 2010) United States v. Ross, 456 U.S. 798 (1982) United States v. Rouse, 148 F.3d 1040 (8th Cir. 1998) United States v. Runyan, 275 F.3d 449 (5th Cir. 2001)... 12, 13, 17 Statutes 18 U.S.C (2008)... 19, 21, 22, 24 Other Authorities H.R. REP. NO (1984)... 22, 25 Orin S. Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 MINN. L. REV.1561 (2010) Oxford Dictionaries (Feb. 7, 2016), 21, 23 S. REP. NO (1996) S. REP. NO (1986) U.S. CONST. amend. IV... 6 iii

5 QUESTIONS PRESENTED 1. Whether the private search exception to the Fourth Amendment applies to evidence obtained in a government search of computer files not already searched by a private party. 2. Whether the nature of the use of computer data should affect the authorization status of an individual who is otherwise authorized to access the computer as it pertains to section 1030(a)(2)(C) of the Computer Fraud and Abuse Act. OPINIONS BELOW The opinion for the United States Court of Appeals for the Twelfth Circuit is reported in Capine v. United States, 913 F.3d 1131 (12th Cir. 2015). CONSTITUTIONAL PROVISIONS AND RULES The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. CONST. amend. IV. INTRODUCTION This appeal is the product of Petitioner Alberta Capine s conviction of drug trafficking, attempted identity theft, and violation of the Computer Fraud and Abuse Act. Local law enforcement obtained evidence against Capine through a warrantless search of her home computer, following a private search by Capine s roommate. The government argued that the private search exception, which allows warrantless government searches of material following a private search, legitimized the search. The district court denied 1

6 Capine s motion to suppress any electronic evidence gathered by law enforcement that was not part of the private search. The Court of Appeals also rejected Capine s argument that the private search exception does not apply to the electronic evidence gathered by law enforcement that was not viewed in the private search. Capine appeals on the same grounds. The appellate court decision with respect to the private search exception should be reversed for three reasons. First, the private search exception should not be applied to searches of electronic storage devices because of the massive privacy concerns associated with electronic storage devices, which are similar to privacy concerns associated with homes. Second, even if a container framework is applied to computers, the individual computer files would be considered containers. Those containers that were not opened during the private search would thus retain their reasonable expectations of privacy. Because the private search exception only allows the government to search those items that have lost their expectation of privacy, the private search exception would not apply to the computer files. Additionally, the containers not opened in the private search may not be searched by the government just because they are near a container that was privately searched and revealed evidence of a crime, and are suspected to contain evidence of that same crime; and even if they could be searched in this manner, a police officer could not be certain that they contained evidence of that crime. Finally, even if computer folders, and not individual files, were considered containers, the files not viewed in the private search of petitioner s folder maintained a reasonable expectation of privacy following the private search, because unsearched items within a container maintain an expectation of privacy even after another inside the folder is searched. 2

7 Because computer files can contain such massive amounts of private information, the opening of one file within a folder does not necessitate that all files within that folder lose their expectation of privacy. Section 1030(a)(2)(C) of the Computer Fraud and Abuse Act ( CFAA ) prohibits accessing a protected computer without authorization or in excess of authorization and thereby taking information stored on that computer. In the case at bar, Capine was discovered to have various PDF files containing the personal information of numerous individuals on her personal laptop. It was determined that Capine had gathered this information using her authorized access to Sureinf.com, a database used by her employer, Find Funds, Inc. Petitioner asserts that since she had been given authorization to access the database as a condition of her employment, her intended use of that data did not alter her authorization status as it pertains to section 1030(a)(2)(C). The appellate court determined that Capine had violated the statute, however, because any access of data by an employee for non-business reasons, is an access of data without proper authorization. The appellate court erred in its broad interpretation of section 1030(a)(2)(C) for four reasons. First, the plain language of section 1030(a)(2)(C) favors a narrow interpretation of authorization as it is used in within the statute. Such a narrow interpretation would, in turn, inoculate Capine from any violation of section 1030(a)(2)(C). Second, the narrow interpretation of authorization is the proper interpretation according to the rule of lenity, which calls for criminal statutes to be interpreted in the least harsh way possible. Third, a broad interpretation of authorization would render section 1030(a)(2)(C) void-for-vagueness because it would fail to give proper guidelines to citizens and authorities concerning what conduct is 3

8 criminalized by the statute. Fourth, adopting a narrow interpretation sets an important precedent that computer related laws should be limited to their exact purpose and language. For these reasons, Petitioner impels the court to reverse the appellate court s ruling with regard to section 1030(a)(2)(C). STATEMENT OF THE CASE Petitioner Alberta Capine was a small claims supervisor for Find Funds, Inc. (R. at 2). As part of her employment, Capine held significant responsibilities over Find Funds computers and employees access to databases. (R at 2). Sureinf.com was one of the financial databases used by Find Funds. (R at 3). Find Funds gave Capine a username and password to access Sureinf.com. (R at 3). Find Funds had an internal policy prohibiting the use of company computer resources for personal purposes. (R at 2). On September 23 rd, Capine s roommate, Ester Sundon, asked Capine if she could use Capine s personal laptop; Capine refused. (R at 2). After this refusal, Sundon gained access to Capine s laptop without Capine s permission, and opened a folder labeled transaction history. (R at 2). Sundon opened this folder, which contained a list of 16.pdf documents and 16 Microsoft Excel spreadsheets. (R. at 2). Each.pdf file shared a common name with one other.xlsx file in the folder. (R. at 2). Each document was roughly the same size as the others in the folder; the.pdf files ranged from 10 to 17 kilobytes in size, while the.xlsx files ranged from 15 to 20 kilobytes. (R. at 3). Sundon clicked the first.xlsx file on the list, which opened a spreadsheet that appeared to identify a series of controlled substance sales. (R. at 3). Sundon opened two more spreadsheets at random and found similar charts that appeared to detail past sales. (R. at 3). Without viewing the other files, Sundon called the police. (R. at 3). 4

9 Officer Miller was dispatched to answer the call. (R. at 3). Miller asked Sundon to show him the three.xlsx files she had already opened; she did. (R. at 3). Miller, under the belief that the spreadsheets detailed narcotics sales, asked Sundon for permission to use the laptop. (R. at 3). She complied. (R. at 3). Miller then made copies of all 16.pdf files and all 16.xlsx files onto a flash drive. (R. at 3). He then opened and viewed the contents of each file. (R. at 3). The.pdf files indicated that they had been saved from the Sureinf.com database. (R at 3). After viewing all of the.pdf and.xlsx files, Officer Miller confiscated the laptop and obtained a warrant before searching the remainder of the computer. (R. at 3). The resulting investigation showed that the.pdf files had been accessed using Capine s employee username and password. (R. at 3). Capine was indicted for multiple counts of drug trafficking, attempted identity theft, and violation of the Computer Fraud and Abuse Act. (R at. 3). Prior to trial, Capine moved to exclude the files that Sundon had not viewed based on the Fourth Amendment s prohibition against unreasonable search and seizure. (R. at 3). The trial court denied Capine s motion based on the private search exception, and allowed the.pdf and.xlsx files to be admitted to evidence. (R. at 3). Capine was eventually convicted on all counts, and thereafter appealed her convictions arguing that she obtained the personal information as an authorized user of her company s computer system and reasserting her claim that Officer Miller s search of files not viewed by Sundon violated the Fourth Amendment. (R. at 3). The appellate court upheld the convictions. (R. at 3). ARGUMENT 5

10 I. THE COMPUTER FILES THAT WERE NOT PART OF SUNDON S PRIVATE SEARCH SHOULD NOT BE ADMITTED UNDER THE PRIVATE SEARCH EXCEPTION. A. Computer files are subject to immense privacy concerns that make them akin to private homes, two which the private search exception does not apply. The Fourth Amendment to the United States Constitution guarantees the people the right to be free of unreasonable searches and seizures of their persons, houses, papers, and effects. U.S. CONST. amend. IV. A search occurs when an expectation of privacy that society is prepared to consider reasonable is infringed by the government. United States v. Jacobsen, 466 U.S. 109, 113 (1984). In addition to individual objects, the courts have recognized an expectation of privacy within a person s containers, which are defined as any object capable of holding another object. New York v. Belton, 453 U.S. 454, 460 (1981). Government searches of both individual objects and containers are considered reasonable only if the government first secures a warrant or demonstrates that a specific exception to the warrant requirement applies. Riley v. California, 134 S. Ct. 2473, 2482 (2014). One such exception is the private search exception. The private search exception dictates that protections granted by the Fourth Amendment do not extend to searches made by private parties who are not acting on behalf of the government, no matter how unreasonable their searches might be. Jacobsen, 466 U.S. 109 at 113. Police are allowed to subsequently inspect materials that were already privately searched without a warrant. Id. But when law enforcement subsequently reviews this privately searched material without a warrant, the legality of the government s searches must be tested by the degree to which they exceed the scope of the private search. Id. At

11 The Supreme Court illustrated the applicability of the private search exception to containers with their holding in Jacobsen. There, employees of a private freight carrier were inspecting a damaged package when they observed a white, powdery substance; further searching of the package revealed several bags of the substance within a tube inside. Id. at 111. The employees called the Drug Enforcement Administration, who reopened the package, tested the powder, and confirmed it was cocaine. Id. at The Court ruled this search of the previously opened container was constitutional, because it revealed no more information than what the private search already had. Id. at 120. The container and its contents, which had been made aware to the officers by the private searchers, had no legitimate expectation of privacy left to be infringed, and thus there was no illegal search within the meaning of the Fourth Amendment. Id. at 120. Though a tube containing cocaine lends itself well to this kind of container analysis, the privacy issues implicated by the search of electronic storage devices transcend that of normal containers. While the search of the tube in Jacobsen was held constitutional because police learned nothing new, any search of an electronic storage device creates too high a chance that unexpected, private information will be discovered. As the Supreme Court has noted, electronic storage devices such as cell phones described by the Court as microcomputers hold virtually unlimited quantities of personal, private information within them, such as photographs, videos, contact lists, communications, medical records, and political affiliations. Riley v. California, 134 S. Ct. 2473, (2014). As such, allowing unrestrained searches of cell phones would thus give police officers unbridled discretion to rummage at will among a person s private effects. Id. 7

12 Computer hard drives, folders, and files, which host at least the same quality of sensitive information that microcomputer cell phones do, should be accorded the same privacy concerns that cell phones enjoy. In fact, the Sixth Circuit has held that, due to the extent of information that can be stored on a computer, it is incredibly difficult for police to conduct a search of a computer and be certain that they will find no private information while doing so. See United States v. Lichtenberger, 786 F.3d 478, 488 (6th Cir. 2015). Thus, because electronic storage devices hold such broader amounts of protected, private information than any physical storage method, relying on analogies between computers and closed containers ignores the realities of modern electronic storage, and, as a consequence, may cause courts to oversimplify a complex area of Fourth Amendment doctrines. United States v. Carey, 172 F.3d 1268, 1275 (10th Cir. 1999) (citations omitted). An additional problem to the comparison between an electronic storage device and a closed container is created by modern cloud computing. Cloud computing is the capacity of Internet-connected devices to display data stored on remote servers rather than on the device itself. Riley v. California, 134 S. Ct. at As discussed above, a container is defined as any object capable of holding another object. Belton, 453 U.S. at 460 (1981). Even if electronic information could properly be described as an object per this definition, cloud computing creates a risk that this information is not even held in the container being searched. The Supreme Court has held that the search of information that is not physically present on an electronic device being searched, but is instead located remotely, is impermissible under the Fourth Amendment. Riley, 134 S. Ct. at This problem is especially relevant to computers because law enforcement may not 8

13 be able to differentiate between information stored on a hard drive and information stored remotely. See Id. As such, some electronic information may not be stored in the container being searched at all. Accordingly, because of the immense privacy interests inherent in electronic storage devices, and because of the remote nature of cloud computing, basic container analysis should not be applied to computers. A more appropriate comparison for electronic storage devices, with their huge quantities of personal information, would be to private homes. Indeed, the Supreme Court has remarked that a search of even a cell phone would reveal more information than the most exhaustive search of a house. Id. Similarly, the Eleventh Circuit has described computers as the digital equivalent of its owner s home, capable of holding a universe of private information. United States v. Mitchell, 565 F.3d 1347, 1352 (11th Cir. 2009). Because of the immense privacy interests at stake within a home, some courts have refused to extend the private search exception to private residences. See United States v. Allen, 106 F.3d 695, (6th Cir. 1997). Though homes are a uniquely protected space under the Fourth Amendment, the privacy concerns present within a home and within a computer are incredibly similar; as discussed above, the Supreme Court has expressed concern that electronic storage devices may indeed hold even more private information than a home. Riley, 134 S. Ct. at An unbridled search of either would inevitably lead to the discovery of massive amounts of private, personal information. Therefore, because the private search exception does not apply to homes due to high privacy interests, and because electronic storage devices have equally grave privacy interests, the private search exception should not apply to electronic storage devices. 9

14 Because the contents of Capine s computer have such a significant privacy interest at least as similar to that of a private home the private search exception should not apply to Officer Miller s search. Because there was no warrant to search the computer, and because no other exceptions to the Fourth Amendment apply, Officer Miller s search violated the Fourth Amendment, and the evidence illegally obtained through it should be suppressed. B. Even if a container framework is applied, the computer files should be considered containers, and are not reached by the private search exception. 1. As containers, the files that were not opened during the private search maintained their reasonable expectations of privacy. The Supreme Court has long recognized that containers are subject to protection from warrantless government searches under the Fourth Amendment. See, e.g., Smith v. Ohio, 494 U.S. 541, 543 (1990) (per curiam) (brown paper grocery bag); United States v. Place, 462 U.S. 696, (1983) (luggage); Ex parte Jackson, 96 U.S. 727, 733 (1877) (letters and packages). Indeed, the Supreme Court has noted that the Fourth Amendment is invoked when a defendant has a reasonable expectation of privacy in the contents of a container, and provides protection to the owner of every container that conceals its contents from plain view. Illinois v. Andreas, 463 U.S. 765, 771 (1983); United States v. Ross, 456 U.S. 798, (1982). If basic container analysis was applied to electronic storage devices, each individual computer file, and not their resident folder or drive, must be viewed as a container. Individual files have massive privacy interests; a single one might contain photographs, videos, contact lists, diaries, or numerous other types of personal, protected information all of which enjoy a constitutionally protected reasonable expectation of 10

15 privacy. See Mitchell, 565 F.3d at As noted by the Supreme Court, electronic storage devices such as cell phones, with their tremendous capacities for personal data storage, hold for many Americans the privacies of life. Riley, 134 S. Ct. at Just as cell phones are afforded extensive Fourth Amendment protections, so too should individual computer files, which can, and often do, host these same kinds of significant information. This reasoning is reinforced by United States v. Knoll, in which the Second Circuit stated that computer files were containers that enjoyed a reasonable expectation of privacy. United States v. Knoll, 16 F.3d 1313, 1320 (2d Cir. 1994). Though the lower court here held that computer folders, and not individual computer files, should be considered containers, this argument is misplaced. As discussed above, the privacy concerns inherent in individual files suggests that it is these that should be considered containers. But beyond that, multiple federal circuits have suggested that computers and their folders are not containers under the Fourth Amendment. In United States v. Lichtenberger, the Sixth Circuit noted that laptop computers and physical containers were not alike because of the vast amount of diverse data a computer can hold. Lichtenberger, 786 F.3d at In United States v. Carey, the Tenth Circuit explained that analogizing computers to closed containers would oversimplify a complex area of Fourth Amendment doctrines and ignore the realities of massive modern data storage, because of the great quantity and variety of information that computers contain. Carey, 172 F.3d at Though neither case specifically mentions computer folders, folders potentially contain the same great quantity and variety of information that computers do. If a computer itself is analogized to a library, its folders are merely bookshelves; all significant information rests within the library s individual 11

16 books the computer files. To provide adequate constitutional protections, the container framework would thus have to be applied to the most basic piece of private information available; not the computer or the folder, but the individual file. Here, Capine s unsearched.pdf and.xlxs files were unconstitutionally searched by law enforcement in violation of the Fourth Amendment. The individual files are containers that were not viewed in Sundon s private search; thus, their reasonable expectations of privacy were never frustrated. As such, Officer Miller should have first obtained a search warrant before viewing Capine s private files. Therefore, because Capine s unsearched files were searched by Officer Miller without a warrant or exception to the warrant requirement, Capine s previously unopened files should be suppressed. 2. The decision of United States v. Runyan is incorrect and should not be applied. Even if it were applied, Officer Miller did not have the substantial certainty that Runyan requires. Though the Fifth Circuit held in United States v. Runyan that individual containers not searched by a private party may still be searched by police who are following up on a private search, this assertion is incorrect for numerous reasons. The rule introduced in Runyan is that police do not exceed the scope of a prior private search by opening a nearby, unsearched container if they are substantially certain that the container contains more evidence of the crime at hand. United States v. Runyan, 275 F.3d 449, 463 (5th Cir. 2001). This substantial certainty deprives the container of any reasonable expectation of privacy. Id. Thus, an argument may be made that Officer Miller was substantially certain of the contents of the files not searched by Sundon because she had found evidence of drug sales in the three.xlsx files she did search, because the files were in the same transaction history folder, and because the files were similar in size 12

17 and naming conventions. Because of this, one could contend that none of the files retained their reasonable expectation of privacy, and the government search of those files was legal. The Runyan holding, however, ignores both the decades of protection afforded to unopened containers by the courts, as well as the modern realities of electronic data storage. As discussed by the Sixth Circuit in United States v. Lichtenberger, the expansive nature of computer storage makes it nearly impossible for a police officer to believe with any certainty that evidence of a crime will be found within an unopened computer file; the odds are just as likely that there will be constitutionally protected, private information within that is unrelated to the crime at hand. Lichtenberger, 786 F.3d at Any searches of unopened electronic containers would thus put their owners at great risk of the government discovering this constitutionally protected information. Because of its subversion of traditional container protections, as well as its disregard for the privacy interests inherent within computer files, the Runyan holding should thus not be applied to the case at bar. Even if the Court were to apply Runyan in this regard, Officer Miller could not have had substantial certainty that evidence of the same crime could be found in Capine s unsearched files. From the outset, Sundon never searched the remaining 29 files, forcing Officer Miller to completely speculate about their contents. (R. at 3). The mere fact that the unsearched files were found in the same folder as the privately searched ones does not establish with substantial certainty that all the files in question contained evidence of illicit drug sales. See Runyan, 275 F.3d at 464. Indeed, half of the searched files contained no evidence of drug sales whatsoever. (R. at 3). Furthermore, the contents of 13

18 the files are not overtly obvious, even based on the context of the search. See United States v. Oliver, 630 F.3d 397, 408 (5th Cir 2011). The paired naming convention and similar sizes of the.xlsx and.pdf files does not establish with substantial certainty that the files contained evidence of illicit drug sales; their document names mention nothing of drugs or drug transactions, and indeed are apparently just named after people. (R. at 2). Finally, a hunch that files with similar names and sizes might contain evidence of drug sales is not enough to defeat the massive, constitutionally protected privacy interests that computer files have. It was just as likely that the files contained sensitive personal information, as they were to contain incriminating evidence. Officer Miller did not, and could not, have the substantial certainty required by Runyan that more evidence of illicit drug sales was contained in the computer files he searched without a warrant. Because there could be no substantial certainty that Capine s unopened files would contain evidence of drug transactions, those files retained their expectations of privacy under the rule of Runyan, and the private search exception does not apply. Consequently, because the government search was not supported by a warrant or a valid exception to the warrant requirement, the product of the illegal search must be suppressed. C. Even if the computer folders were considered containers, the private search exception does not apply. 1. The contents of the transaction history folder maintained a reasonable expectation of privacy following the private search. When a container is searched by a private party, any items within the container that are discovered by the searching party lose their expectation of privacy. Jacobsen, 466 U.S. 109 at As such, a government search of a container previously searched 14

19 by a private party is reasonable if it does not reveal anything that the private search has not discovered. Id. at Additionally, when law enforcement has virtual certainty that a container holds multiple units of one item, a search of that container is legal when all that is found inside is indeed that same item. See id. at 121. As discussed above, the Jacobsen Court thus determined that the multiple bags of cocaine within a privately searched package had already lost their expectation of privacy when the package was researched by law enforcement, who were virtually certain that the container held nothing but cocaine and revealed nothing that they were not already made aware of. Id. The Eighth Circuit has since applied the Jacobsen holding to the issue of undiscovered items within privately searched containers in United States v. Rouse. In Rouse, an airline employee privately searched a suspicious bag and found numerous identification cards and social security cards. United States v. Rouse, 148 F.3d 1040, 1041 (8th Cir. 1998). When law enforcement searched the bag later, they additionally found a laminating machine and material for laminating cards, which the airline employee had not discovered. Id. Utilizing the rule of Jacobsen in their discussion, the Eighth Circuit held that because the laminating machine and materials were undiscovered in the private search and unknown to the police, they retained their expectation of privacy. Id. As such, the suppression of the undiscovered materials within the previously searched container was ordered. Id. Similarly, the Sixth Circuit applied the Jacobsen holding specifically to laptop computers in United States v. Lichtenberger. There, a defendant s live-in girlfriend privately searched his laptop computer and discovered numerous illegal images of child pornography, but did not open all the files. Lichtenberger, 786 F.3d at 480. When the 15

20 laptop was later searched by police, they viewed a random assortment of all the pictures not necessarily just those the private searcher had viewed. Id. at The Sixth Circuit held that, in order for the officer s search to be constitutional, he needed virtual certainty that the inspection of the laptop and its contents would not tell him anything more than he had already been told by the private searcher. Id. at 488. But because the officer could not be virtually certain that his review was limited only to the photographs from the private party s earlier search, Jacobsen s virtual certainty requirement was not satisfied. Id. Additionally, the court held that, because of the expansive nature of modern data storage, the searching officer had no virtual certainty that the files would contain images of child pornography, and not constitutionally protected material. Id. at 489. The image files, labelled in a non-obvious numeric fashion, could have contained private personal photographs unrelated to the crime alleged, or even snippets of other personal documents. Id. Here, the contents of Capine s transaction history folder did not lose their reasonable expectation of privacy due to Sundon s private search. Unlike the tube of cocaine searched in Jacobsen, Capine s computer does not contain just one item; indeed, the transaction history folder contained 29 distinct, separate documents that Sundon had not searched. (R. at 3). Furthermore, like in Lichtenberger, Officer Miller could not be virtually certain that the unsearched files in Capine s transaction history folder contained evidence of drug sales. Just because the files were labelled with paired names and had similar sizes does provide virtual certainty that the files contained evidence of a crime, and did not contain highly sensitive personal information instead. Indeed, the.pdf documents none of which were searched in the private search did not even contain 16

21 evidence of the same type of crime. (R. at 3). As such, the files in the transaction history folder that were not subject to Sundon s private search should be treated like the laminating machine and materials in Rouse. Because they were passed over in the private search, the unsearched documents retained their reasonable expectation of privacy, and the private search exception does not apply. Because the unsearched contents of Capine s transaction history folder did not lose their reasonable expectation of privacy during the private search, and because Officer Miller did not have a warrant or valid exception to the warrant requirement, the files not already compromised during the private search should be suppressed. 2. The opening of one file within a folder does not necessitate that all files within that folder lose their expectation of privacy. Though the Fifth Circuit has held in United States v. Runyan that privately opened containers may be freely searched, this assertion is misplaced. There, the court held that, once a closed container is opened in a private search, it completely loses all reasonable expectation of privacy, and its entire contents even those items not discovered by the private party can be scoured by police with complete impunity. Runyan, 275 F.3d at Additionally, the court suggested that restricting police access to a privately searched container would over-deter police, who would not be able to adequately carry out searches, due to their fear that anything found might be suppressed. Id. at 465. Thus, it could be argued that because Capine s transaction history folder was accessed by a private party, Officer Miller had a complete right to search every file found inside. But this argument completely ignores the overwhelming privacy concerns that are at stake in this case. As discussed above, the modern reality of computer data storage is that personal information is stored all throughout a computer s hard drive and folders, 17

22 and is incredibly easy to find. Even illegal materials are often intermingled and hidden amongst legal, private material. See Carey, 172 F.3d at As such, a searching officer could rarely conclude with absolute certainty that a search of a computer will not contain some sort of protected, private information. Lichtenberger, 786 F.3d at With such serious, constitutionally protected privacy concerns at stake, it is unconscionable to think that even a brief search of a computer hard drive or folder would allow police unfettered access to the personal documents and data that are likely held within. Additionally, restricting government access to a briefly opened container would not over-deter police from adequately performing their duties. We must, as a society, be able to trust that police are capable of determining which materials they are allowed to search without a warrant. The exceptions to the warrant requirement are already limited in scope and applicability, meaning that police have to get a warrant to conduct a search more often than not. Maintaining the limited nature of this exception as it is applied to computer folders, therefore, will have little, if any, effect on the everyday investigatory practices of the police as a whole. Furthermore, with such serious Fourth Amendment concerns at stake, it is not unreasonable to expect police to simply get a warrant when they are unsure of whether they can search computer files without one, especially when there is no exigent circumstance that requires immediate action. Because Capine had a reasonable expectation of privacy within her computer files, and because it is not unreasonable to assume that Officer Miller simply could have secured a warrant to search those files not viewed by Sundon, Runyan s open container rule should not apply. The files not subject to the private search should thus be supressed. II. THE CFAA SHOULD BE INTERPRETED NARROWLY, IMMUNIZING CAPINE FROM LIABILITY. 18

23 A. Two interpretations of authorization within the CFAA have developed. 18 U.S.C. section 1030 (a)(2)(c), part of the Computer Fraud and Abuse Act ( CFAA ), imposes criminal liability on anyone who intentionally accesses a protected computer without authorization, or in excess of authorized access, and thereby obtains information from that computer. 18 U.S.C (2008). The CFAA defines the term protected computer as a computer which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States Id. 1030(e)(2). The CFAA defines exceeds authorized access as accessing a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter. Id. 1030(e)(6). Congress s use of the phrase affecting intestate or foreign commerce signals their intent that the CFAA should reach to the greatest length that the Commerce Clause will allow. United States v. Chesney, 86 F.3d 564, 571 (6th Cir. 1996). Given this, as well as the ubiquity of computers throughout modern commerce, the term protected computer, and consequently section 1030(a)(2)(C), covers nearly every computer in use throughout the United States. United States v. Mitra, 405 F.3d 492, 496 (7th Cir. 2005). Although the CFAA provides a definition for exceeds authorized access, it does not give a definition for the key term authorization. Since a conviction based on section 1030(a)(2)(C) requires proof that one has accessed a computer without authorization or in excess of authorization, the lack of a definition for authorization has led courts to draw different conclusions regarding the proper interpretation for the term. Circuit courts have developed two interpretations of the term authorization within the CFAA. United States v. Nosal, 676 F.3d 854, (9th Cir. 2012). The narrow interpretation of authorization limits the word to its plain meaning. LVRC 19

24 Holdings LLC v. Brekka, 581 F.3d 1127 (9th Cir. 2009). By its plain meaning, authorization refers to the existence of permission from an authority figure to do or access something. Id. Therefore, CFAA violations are based solely on whether one had permission to access information from a protected computer, not how one uses that information after they access it. Id. The broad interpretation of authorization, however, holds that the use or misuse of information obtained from a protected computer is directly connected to the authorization status of the individual who accessed the computer. Nosal, 676 F.3d at 857. Under this interpretation, an individual can be convicted of violating the CFAA if it is determined that their use of information obtained from a computer would not have been authorized by the owner of the computer. Id. This interpretation leads to the application of the CFAA in many different contexts. See United States v. John, 597 F.3d 263, 271 (5th Cir. 2010) (information accessed in perpetration of a crime); EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 581 (1st Cir. 2001) (information accessed in violation of an employment agreement); United States v. Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010) (information accessed in violation of employer s internal policy); Int'l Airport Centers, L.L.C. v. Citrin, 440 F.3d 418, (7th Cir. 2006) (information accessed in violation of duty of loyalty to employer). B. The plain language of the CFAA favors a narrow interpretation of authorization. The starting point with any question of statutory interpretation is the statute s plain language. Consumer Prod. Safety Comm'n v. GTE Sylvania, Inc., 447 U.S. 102, 108 (1980). A fundamental rule of statutory construction is that unless a word is otherwise 20

25 defined within a statute, words will be understood as holding their common, contemporary meaning. Perrin v. United States, 444 U.S. 37, 42 (1979). The plain language of the CFAA holds that a violation of the statute occurs when one intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information contained on a protected computer. 18 U.S.C. 1030(a)(2)(C) (2008). Therefore, a conviction based on section 1030(a)(2)(C) requires proof of three things: that an individual intentionally accessed a computer, that access was without authorization or in excess of authorization, and that information was taken in the course of that access. The CFAA does not give a specific definition of the words access or authorization, indicating that Congress intended for the words to carry their common meaning. Perrin, 444 U.S. at 42. Authorize means to, give official permission for or approval ; authorization is defined as, the action or fact of authorizing or being authorized. Oxford Dictionaries (Feb. 7, 2016), htttp:// definition/american_ english/authorize. Access, in the computer context, means to, obtain, examine, or retrieve. Oxford Dictionaries (Feb. 7, 2016), oxforddictionaries.com/us/definition/american_english/access. As these contemporary definitions show, to access something with authorization is to obtain or examine it with official permission. Therefore, the difference between accessing something with authorization and accessing something without authorization is whether one had been given permission to access it from an authority figure. How one uses information they have been given permission to access, therefore, is of no concern to one evaluating a potential section 1030(a)(2)(C) violation. 21

26 Additionally, there is no indication anywhere else within section 1030(a)(2)(C) that how one uses information after they obtain it has any bearing on a potential CFAA violation. Beyond intentionality and lack of authorization, a section 1030(a)(2)(C) conviction only requires that information from a computer be taken. 18 U.S.C. 1030(a)(2)(C) (2008). Section 1030(a)(2)(C) is not concerned with how information is used once it is taken because a violation of the Act is established once it is shown that information was in fact taken. Therefore, any use, no matter it pernicious nature, of information after it is taken is meaningless for section 1030(a)(2)(C). One may argue that when an authority figure explicitly limits the way one may use a computer they have been given authorization to access, any violation of those limitations would be considered accessing the computer in excess of authorization. As the CFAA s legislative history shows, however, this argument fails. Congressional committee reports concerning the CFAA indicate that its main purpose was to combat the actions of hackers, and not, for example, employees who violate internal company policies. H.R. REP. NO , at 21 (1984); S. REP. NO , at 7 (1986). Similarly, Congressional reports concerning the CFAA stated that they understood exceeding authorized access as a situation where someone who is authorized to use a limited number of computers within an organization accesses computers for which they were not given authorization. Id. at 8. These reports show that the CFAA is concerned with individuals, like hackers, who access computers without any authorization, not employees who use their authorized access in a way their employers prohibit. Moreover, as stated above, the CFAA s plain language shows that the statute is solely concerned with whether or not one had 22

27 authorization to access the computer in the first place, not how one uses that access. In this way, one can violate a company policy concerning use of a computer and still be innocent of any CFAA violation; they involve two completely separate inquiries. An argument that a computer accessed with the intention of perpetrating a crime would automatically be considered exceeding authorized access because one cannot be legally authorized to commit a crime would similarly fail. This is because, as stated above, a section 1030(a)(2)(C) violation consists of intentionally taking information from a computer you are not authorized to access, not using information in any unauthorized way. Therefore, the severity of the intentions involved with taking information from a protected computer makes no difference. In sum, the absence of a specific definition of authorization within the CFAA indicates that Congress intended for the word to carry its common, contemporary meaning. The common meaning of authorization is the existence of permission from an authority figure to do something. Oxford Dictionaries (Feb. 7, 2016), oxforddictionaries.com/us/definition/american_ english/authorization. Furthermore, the CFAA does not contain any language that would suggest that how one uses information has any bearing on an authorization issue. All that is needed to prove that one has violated section 1030(a)(2)(C) is a showing that someone intentionally accessed a computer and took information from it, any subsequent use of the information taken is meaningless. Therefore, the narrow interpretation of authorization that does not incorporate the idea of misuse within its definition is the proper interpretation according to the plain language of the statute. C. The rule of lenity dictates that the narrow interpretation should be adopted. 23

28 According to the rule of lenity, when an ambiguity exists between two alternative readings of what conduct Congress has made a crime, a court must choose the less harsh alternative and require Congress to adopt clear language before the harsher alternative is accepted. United States v. Bass, 404 U.S. 336, 347 (1971). An ambiguity within a statute exists where a court, after extinguishing all available aids of statutory construction, can do nothing more than guess at Congress s intended meaning. Muscarello v. United States, 524 U.S. 125, 138 (1998). Relevant to an inquiry of ambiguity are the purpose and history of the statute. Abramski v. United States, 134 S. Ct. 2259, 2267 (2014). Here, if it is determined that the plain language of section 1030(a)(2)(C) is not enough to adopt a narrow interpretation, an ambiguity may exist in regards to how authorization should be interpreted. But before determining whether an ambiguity exists, the statute s history and development should be examined. The CFAA, in its original form, only applied to situations involving governmentowned computers with three government interests in mind: national security, the protection of personal financial records, and the protection of government property. Orin S. Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 MINN. L. REV.1561, 1564 (2010). Since then, the CFAA has been amended numerous times between 1986 and Among these amendments was the introduction and subsequent modification of the term protected computer. 18 U.S.C. 1030(e)(2) (2008). As stated above, the modern definition of protected computer enables the CFAA to be applicable to nearly every computer within the United States. Mitra, 405 F.3d at 496. Given the tremendous expansion of the CFAA from covering solely government computers to covering nearly every computer in the United States, it could be fair to think 24

29 that a similar expansion for authorization is appropriate. Numerous congressional committee reports, however, do not signal for such an expansion. For example, two reports concerning the CFAA from 1984 and 1996 state that the intent of the law is to proscribe the unauthorized use of a computer, not the unauthorized use of information gained from a computer. S. REP. NO at 6-7 (1996); H.R. REP. No at 20 (1984). The 1996 report goes on to analogize the prohibitions in the CFAA to theft in that laws covering theft are solely concerned with the act of taking something that you did not have permission to take, and how one uses an object after it is taken is of no consequence. S. REP. NO , at 7-8 (1996). These Congressional reports suggest that a narrow interpretation of authorization is proper. In addition, as explained above, the plain language of the statute suggests that the narrow interpretation of authorization is the proper one. The weight of the evidence, therefore, seems to favor a narrow interpretation. As explained above, the rule of lenity holds that when an ambiguity exists within a criminal statute regarding what behavior Congress has criminalized, courts must side with the less harsh interpretation. Here, the weight of the evidence suggests that a narrow interpretation of authorization is proper. But, even if one were to assume that this evidence is not enough, it cannot be said that there is enough evidence in favor of a broad interpretation to make it proper. Therefore, at best the evidence favors a narrow interpretation, and at worst an ambiguity still exists regarding the proper interpretation. Since the CFAA is a criminal statute, such an ambiguity would invoke the rule of lenity, which would lead to the adoption of the less harsh of the two alternatives. 25

No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent.

No IN THE SUPREME COURT OF THE UNITED STATES ALBERTA CAPINE, Petitioner. UNITED STATES, Respondent. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES 2016 ALBERTA CAPINE, Petitioner. v. UNITED STATES, Respondent. On Argument to the United States Supreme Court from Judgment Entered by the Twelfth

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 10-1011 In the Supreme Court of the United States ALBERTA CAPINE v. Petitioner, UNITED STATES OF AMERICA Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE TWELFTH CIRCUIT

More information

Supreme Court of the United States

Supreme Court of the United States Case No. 10-1011 IN THE Supreme Court of the United States April Term, 2016 ALBERTA CAPINE, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals

More information

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES

VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES VIRTUAL CERTAINTY IN A DIGITAL WORLD: THE SIXTH CIRCUIT S APPLICATION OF THE PRIVATE SEARCH DOCTRINE TO DIGITAL STORAGE DEVICES IN UNITED STATES v. LICHTENBERGER Abstract: In 2015 in United States v. Lichtenberger,

More information

Digitizing the Private Search Doctrine: Is a Computer a Container?

Digitizing the Private Search Doctrine: Is a Computer a Container? Digitizing the Private Search Doctrine: Is a Computer a Container? by TAYLOR J. PFINGST* Introduction The digital era has ushered in a new age, where the technology of today is almost instantaneously surpassed

More information

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding CELL PHONE SEARCHES IN SCHOOLS: THE NEW FRONTIER ANDREA KLIKA I. Introduction In the age of smart phones, what once was a simple device to make phone calls has become a personal computer that stores a

More information

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant.

CASE NO. 1D James T. Miller, and Laura Nezami, Jacksonville, for Appellant. IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA JEFFREY SCOTT FAWDRY, v. Appellant, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED CASE NO.

More information

By Jane Lynch and Jared Wagner

By Jane Lynch and Jared Wagner Can police obtain cell-site location information without a warrant? - The crossroads of the Fourth Amendment, privacy, and technology; addressing whether a new test is required to determine the constitutionality

More information

United States District Court

United States District Court Case:0-cr-00-JSW Document Filed0/0/0 Page of NOT FOR CITATION IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA UNITED STATES OF AMERICA, 0 Plaintiff, No. CR 0-00 JSW v. ANDREW

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellant, FOR PUBLICATION November 6, 2014 9:00 a.m. v No. 310416 Kent Circuit Court MAXIMILIAN PAUL GINGRICH, LC No. 11-007145-FH

More information

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents.

No IN THE SUPREME COURT OF THE UNITED STATES. ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondents. No. 10-1011 IN THE SUPREME COURT OF THE UNITED STATES ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondents. On Writ of Certiorari to the United States Court of Appeals for the Fourteenth

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

IN THE SUPREME COURT OF THE STATE OF NEW MEXICO

IN THE SUPREME COURT OF THE STATE OF NEW MEXICO IN THE SUPREME COURT OF THE STATE OF NEW MEXICO Opinion Number: 2010-NMSC-046 Filing Date: October 19, 2010 Docket No. 31,656 STATE OF NEW MEXICO, v. Plaintiff-Respondent, ERICA RIVERA, Defendant-Petitioner.

More information

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Defending Freedom on the Electronic Frontier eff.org Know Your Rights Your computer, phone, and other digital devices hold vast amounts of personal

More information

Briefing from Carpenter v. United States

Briefing from Carpenter v. United States Written Material for Inside Oral Argument Briefing from Carpenter v. United States The mock oral argument will be based Carpenter v. United States, which is pending before the Supreme Court of the United

More information

Petitioner, Respondent.

Petitioner, Respondent. No. 16-6761 IN THE SUPREME COURT OF THE UNITED STATES FRANK CAIRA, Petitioner, vs. UNITED STATES OF AMERICA, Respondent. PETITIONER S REPLY BRIEF HANNAH VALDEZ GARST Law Offices of Hannah Garst 121 S.

More information

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District No. 13-132 IN THE DAVID LEON RILEY, v. Petitioner, STATE OF CALIFORNIA, Respondent. On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District REPLY BRIEF FOR PETITIONER Patrick

More information

Supreme Court of The United States

Supreme Court of The United States TEAM 2 DOCKET NO. 10-1011 IN THE Supreme Court of The United States ELIZABETH JENNINGS, PETITIONER, V. UNITED STATE OF AMERICA, RESPONDENT. ON WRIT OF CERTIORARI FROM THE UNITED STATES COURT OF APPEALS,

More information

No. 1D On appeal from the Circuit Court for Clay County. John H. Skinner, Judge. September 14, 2018

No. 1D On appeal from the Circuit Court for Clay County. John H. Skinner, Judge. September 14, 2018 FIRST DISTRICT COURT OF APPEAL STATE OF FLORIDA No. 1D17-5118 THOMAS GERALD DUKE, Appellant, v. STATE OF FLORIDA, Appellee. On appeal from the Circuit Court for Clay County. John H. Skinner, Judge. September

More information

Testimony of Orin S. Kerr Professor, George Washington University Law School

Testimony of Orin S. Kerr Professor, George Washington University Law School Testimony of Orin S. Kerr Professor, George Washington University Law School United States House of Representatives Committee on the Judiciary Subcommittee on the Crime, Terrorism, and Homeland Security

More information

SUPREME COURT OF THE UNITED STATES OF AMERICA

SUPREME COURT OF THE UNITED STATES OF AMERICA DOCKET NO. 2015-11 OCTOBER TERM 2015 SUPREME COURT OF THE UNITED STATES OF AMERICA ALBERT GREENE, Petitioner V. UNITED STATES OF AMERICA, Respondent ON PETITION FOR WRIT OF CERTIORARI TO THE UNITED STATES

More information

PLAIN VIEW. Priscilla M. Grantham

PLAIN VIEW. Priscilla M. Grantham PLAIN VIEW Priscilla M. Grantham GENERAL PRINCIPLES: If in the course of a lawful search, police see items that are incriminating or have evidentiary value, under the plain view doctrine they may be able

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2013-08 Appellant ) ) v. ) ) ORDER Technical Sergeant (E-6) ) SAMUEL A. WICKS, ) USAF, ) Appellee ) Special Panel

More information

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States,

In The SUPREME COURT OF THE UNITED STATES. October Term, Docket No Albert Greene, United States, P21. In The SUPREME COURT OF THE UNITED STATES October Term, 2015 Docket No. 2015-11 Albert Greene, v. United States, Petitioner, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS

More information

NOS ; IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE,

NOS ; IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE, Case: 14-10037, 08/26/2016, ID: 10102467, DktEntry: 73, Page 1 of 27 NOS. 14-10037; 14-10275 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, V. PLAINTIFF-APPELLEE,

More information

S11G0644. HAWKINS v. THE STATE. This Court granted certiorari to the Court of Appeals to consider whether

S11G0644. HAWKINS v. THE STATE. This Court granted certiorari to the Court of Appeals to consider whether In the Supreme Court of Georgia Decided: March 23, 2012 S11G0644. HAWKINS v. THE STATE. HINES, Justice. This Court granted certiorari to the Court of Appeals to consider whether that Court properly determined

More information

Case 6:13-cr EFM Document 102 Filed 10/30/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Case 6:13-cr EFM Document 102 Filed 10/30/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 6:13-cr-10176-EFM Document 102 Filed 10/30/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS UNITED STATES OF AMERICA, Plaintiff, vs. Case No. 13-10176-01-EFM WALTER ACKERMAN,

More information

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception?

The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or Narrow Exception? Catholic University Law Review Volume 66 Issue 2 Winter 2016 Article 9 3-23-2017 The Private Search Doctrine and the Evolution of Fourth Amendment Jurisprudence in the Face of New Technology: A Broad or

More information

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent.

Case No In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, UNITED STATES OF AMERICA, Respondent. Case No. 10-1011 In the SUPREME COURT OF THE UNITED STATES SPRING TERM, 2018 ELIZABETH JENNINGS, Petitioner, v. UNITED STATES OF AMERICA, Respondent. BRIEF FOR PETITIONER Team 15 Counsel for the Petitioner

More information

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS

UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS UNITED STATES AIR FORCE COURT OF CRIMINAL APPEALS U N I T E D S T A T E S, ) Misc. Dkt. No. 2009-15 Appellant ) ) v. ) ) ORDER Airman First Class (E-3) ) ADAM G. COTE, ) USAF, ) Appellee ) Special Panel

More information

Supreme Court of the United States

Supreme Court of the United States No. 16-066 IN THE Supreme Court of the United States MARVIN SKRELLY Petitioner, v. UNITED STATES OF AMERICA Respondent. On Petition for Writ of Certiorari to the United States Court of Appeals for the

More information

MINNESOTA v. DICKERSON 113 S.Ct (1993) United States Supreme Court

MINNESOTA v. DICKERSON 113 S.Ct (1993) United States Supreme Court Washington and Lee Journal of Civil Rights and Social Justice Volume 1 Issue 1 Article 19 Spring 4-1-1995 MINNESOTA v. DICKERSON 113 S.Ct. 2130 (1993) United States Supreme Court Follow this and additional

More information

UNITED STATES OF AMERICA, PETITIONER DAVID NOSAL, RESPONDENT. No BRIEF FOR PETITIONER

UNITED STATES OF AMERICA, PETITIONER DAVID NOSAL, RESPONDENT. No BRIEF FOR PETITIONER No. 10-10038 UNITED STATES OF AMERICA, PETITIONER v. DAVID NOSAL, RESPONDENT ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BRIEF FOR PETITIONER JESSICA L. DIAZ Attorney

More information

STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT STATE OF LOUISIANA VERSUS. Judgment Rendered June

STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT STATE OF LOUISIANA VERSUS. Judgment Rendered June STATE OF LOUISIANA COURT OF APPEAL FIRST CIRCUIT NO 2007 KA 2009 STATE OF LOUISIANA VERSUS ll n MATTHEW G L CONWAY Judgment Rendered June 6 2008 Appealed from the 18th Judicial District Court In and for

More information

UNITED STATES DISTRICT COURT DISTRICT OF MAINE. UNITED STATES OF AMERICA ) ) v. ) Criminal Number: P-H ) DUCAN FANFAN )

UNITED STATES DISTRICT COURT DISTRICT OF MAINE. UNITED STATES OF AMERICA ) ) v. ) Criminal Number: P-H ) DUCAN FANFAN ) UNITED STATES DISTRICT COURT DISTRICT OF MAINE UNITED STATES OF AMERICA ) ) v. ) Criminal Number: 03-47-P-H ) DUCAN FANFAN ) GOVERNMENT'S REPLY SENTENCING MEMORANDUM NOW COMES the United States of America,

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 16-3970 UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DAJUAN KEY, Defendant-Appellant. Appeal from the United States District Court

More information

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION

NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. STATE OF NEW JERSEY, Plaintiff-Appellant, v. ADAM MALKIN, Defendant-Respondent.

More information

Case 5:16-cr XR Document 52 Filed 08/30/17 Page 1 of 10

Case 5:16-cr XR Document 52 Filed 08/30/17 Page 1 of 10 Case 5:16-cr-00008-XR Document 52 Filed 08/30/17 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS SAN ANTONIO DIVISION UNITED STATES OF AMERICA, v. ZACHARY AUSTIN HALGREN,

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 16-1105 In the Supreme Court of the United States Power Ventures, Inc. and Steven Vachani, Petitioners, v. Facebook, Inc., Respondent. On Petition for a Writ of Certiorari to the United States Court

More information

traditional exceptions to warrant requirement

traditional exceptions to warrant requirement traditional exceptions to warrant requirement National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org materials 1. powerpoints 2.

More information

Supreme Court of The United States

Supreme Court of The United States No. 10-1011 In The Supreme Court of The United States ELIZABETH JENNINGS Petitioner, v. UNITED STATES OF AMERICA Respondent. ON PETITION FOR A WRIT OF CERTIORARI TO THE SUPREME COURT OF THE UNITED STATES

More information

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION

THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION THE ABANDONMENT DOCTRINE AND UNITED STATES V. SPARKS I. INTRODUCTION Many of us 1 have experienced that sinking feeling before: the moment you realize that your cell phone is missing. First, it is the

More information

IN THE SUPREME COURT OF THE STATE OF OREGON

IN THE SUPREME COURT OF THE STATE OF OREGON IN THE SUPREME COURT OF THE STATE OF OREGON STATE OF OREGON, Plaintiff-Respondent, Respondent on Review, v. CARYN ALINE NASCIMENTO, aka Caryn Aline Demars, Jefferson County Circuit Court Case No. 09FE0092

More information

In the Supreme Court of the United States

In the Supreme Court of the United States No. 13-212 In the Supreme Court of the United States UNITED STATES OF AMERICA, PETITIONER v. BRIMA WURIE ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT

More information

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8

Case 1:16-cr WHP Document 125 Filed 07/18/17 Page 1 of 8 Case 1:16-cr-00169-WHP Document 125 Filed 07/18/17 Page 1 of 8 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ------------------------------------------------------------X UNITED STATES OF

More information

Supreme Court of the United States

Supreme Court of the United States No. IN THE Supreme Court of the United States ARMANDO GARCIA v. Petitioner, THE UNITED STATES OF AMERICA, Respondent. On Petition For Writ Of Certiorari To The United States Court of Appeals (7th Cir.)

More information

Case 2:16-mj JS Document 53 Filed 03/10/17 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

Case 2:16-mj JS Document 53 Filed 03/10/17 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA Case 2:16-mj-00960-JS Document 53 Filed 03/10/17 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA In re Search Warrant No. 16-960-M-1 : Magistrate No. 16-960-M-1

More information

1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO. 2 Opinion Number: 3 Filing Date: June 2, NO. S-1-SC STATE OF NEW MEXICO,

1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO. 2 Opinion Number: 3 Filing Date: June 2, NO. S-1-SC STATE OF NEW MEXICO, 1 IN THE SUPREME COURT OF THE STATE OF NEW MEXICO 2 Opinion Number: 3 Filing Date: June 2, 2016 4 NO. S-1-SC-35255 5 STATE OF NEW MEXICO, 6 Plaintiff-Petitioner, 7 v. 8 ROBERT GEORGE TUFTS, 9 Defendant-Respondent.

More information

STATE OF KANSAS v. ANTHONY A. ALLEN. No. 74,639 SUPREME COURT OF KANSAS. 260 Kan. 107 (1996)

STATE OF KANSAS v. ANTHONY A. ALLEN. No. 74,639 SUPREME COURT OF KANSAS. 260 Kan. 107 (1996) STATE OF KANSAS v. ANTHONY A. ALLEN No. 74,639 SUPREME COURT OF KANSAS 260 Kan. 107 (1996) LARSON, J.: In this first impression case, we are presented with the question of whether a person's telephonic

More information

Calif. Privacy Act Will Increase Data Breach Liability

Calif. Privacy Act Will Increase Data Breach Liability Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Calif. Privacy Act Will Increase Data Breach

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

Scenarios for discussion*

Scenarios for discussion* Project Cybercrime@Octopus Conference Article 15 safeguards and criminal justice access to data 19 20 June 2014, Council of Europe, Strasbourg, France for discussion* www.coe.int/cybercrime *These typical

More information

1 IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO. 2 Opinion Number: 3 Filing Date: June 06, NO. 33,666 5 STATE OF NEW MEXICO,

1 IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO. 2 Opinion Number: 3 Filing Date: June 06, NO. 33,666 5 STATE OF NEW MEXICO, 1 IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO 2 Opinion Number: 3 Filing Date: June 06, 2016 4 NO. 33,666 5 STATE OF NEW MEXICO, 6 Plaintiff-Appellee, 7 v. 8 WESLEY DAVIS, 9 Defendant-Appellant.

More information

Task 3: Read a part of the Supreme Court s opinion in New Jersey v. T.L.O.

Task 3: Read a part of the Supreme Court s opinion in New Jersey v. T.L.O. The Bill of Rights: The Fourth Amendment Task 1: 1. Read the text of the Fourth Amendment. The Fourth Amendment of the U.S. Constitution provides, "the right of the people to be secure in their persons,

More information

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON. v. CASE NO.: 15:16-CR CHR-ESW

UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON. v. CASE NO.: 15:16-CR CHR-ESW UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF STETSON TEAM 1631D UNITED STATES OF AMERICA, v. CASE NO.: 15:16-CR-02342-CHR-ESW CHARLIE WYATT, Defendant. DEFENDANT S MEMORANDUM IN SUPPORT OF

More information

Stanford Law Review Online

Stanford Law Review Online Stanford Law Review Online Volume 69 March 2017 ESSAY Judge Gorsuch and the Fourth Amendment Sophie J. Hart* & Dennis M. Martin** Introduction Before Justice Scalia, pragmatic balancing tests dominated

More information

CRIMINAL LAW AND PROCEDURE: AN UPDATE

CRIMINAL LAW AND PROCEDURE: AN UPDATE CRIMINAL LAW AND PROCEDURE: AN UPDATE OVERVIEW Fourth Amendment Sixth Amendment Confrontation Clause 1 Death Penalty Death Penalty: Kansas Cases Lethal Injection Kansas Cases Pleas and waivers Self-defense

More information

United States Court of Appeals

United States Court of Appeals In the United States Court of Appeals For the Seventh Circuit No. 14 1003 UNITED STATES OF AMERICA, Plaintiff Appellee, v. FRANK CAIRA, Defendant Appellant. Appeal from the United States District Court

More information

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION Case 3:15-cv-05448-EDL Document 26 Filed 11/24/15 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION : : RICKY R. FRANKLIN, : : Plaintiff, : : v. : CIVIL

More information

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL.

CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. CRIMINAL PROCEDURE SEARCH INCIDENT TO ARREST WARRANTLESS COLLECTION OF DIGITAL INFORMATION FROM CELL PHONES DEEMED UNCONSTITUTIONAL. Riley v. California, 134 S. Ct. 2473 (2014). 1 STEWART JAMES ALVIS In

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, Plaintiff-Appellee, UNPUBLISHED January 24, 2012 v No. 301049 Emmet Circuit Court MICHAEL JAMES KRUSELL, LC No. 10-003236-FH Defendant-Appellant.

More information

NOTE. Unpacking Digital Containers: Extending Riley s Reasoning to Digital Files and Subfolders. Michael Mestitz*

NOTE. Unpacking Digital Containers: Extending Riley s Reasoning to Digital Files and Subfolders. Michael Mestitz* Stanford Law Review Volume 69 January 2017 NOTE Unpacking Digital Containers: Extending Riley s Reasoning to Digital Files and Subfolders Michael Mestitz* Abstract. The Supreme Court s recent decision

More information

S17G1691. CAFFEE v. THE STATE. We granted certiorari to consider whether the warrantless search of

S17G1691. CAFFEE v. THE STATE. We granted certiorari to consider whether the warrantless search of In the Supreme Court of Georgia Decided: May 7, 2018 S17G1691. CAFFEE v. THE STATE. PETERSON, Justice. We granted certiorari to consider whether the warrantless search of Richard Caffee resulting in the

More information

IN THE DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FIFTH DISTRICT JULY TERM v. Case No. 5D

IN THE DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FIFTH DISTRICT JULY TERM v. Case No. 5D IN THE DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FIFTH DISTRICT JULY TERM 2013 WILLIAM ANDREW PRICE, NOT FINAL UNTIL TIME EXPIRES TO FILE MOTION FOR REHEARING AND DISPOSITION THEREOF IF FILED Appellant,

More information

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 No. 15 of 2017 Second Session Eleventh Parliament Republic of Trinidad and Tobago HOUSE OF REPRESENTATIVES BILL

More information

UNITED STATES COURT OF APPEALS FOR THE TENTH CIRCUIT ORDER AND JUDGMENT * Joseph Eddy Benoit appeals the district court s amended judgment sentencing

UNITED STATES COURT OF APPEALS FOR THE TENTH CIRCUIT ORDER AND JUDGMENT * Joseph Eddy Benoit appeals the district court s amended judgment sentencing UNITED STATES OF AMERICA, FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Tenth Circuit Plaintiff - Appellee, FOR THE TENTH CIRCUIT March 13, 2015 Elisabeth A. Shumaker Clerk of Court

More information

THE FEDERAL CORNER. Tim (The Magician) Henry Gets an Unbelievable Result In a Child Pornography Case You Won t Believe It!

THE FEDERAL CORNER. Tim (The Magician) Henry Gets an Unbelievable Result In a Child Pornography Case You Won t Believe It! THE FEDERAL CORNER Tim (The Magician) Henry Gets an Unbelievable Result In a Child Pornography Case You Won t Believe It! Buck Files Jason Wayne Irving was a Kansas registered sex offender who had child

More information

NOT FINAL UNTIL TIME EXPIRES TO FILE REHEARING MOTION AND, IF FILED, DETERMINED

NOT FINAL UNTIL TIME EXPIRES TO FILE REHEARING MOTION AND, IF FILED, DETERMINED NOT FINAL UNTIL TIME EXPIRES TO FILE REHEARING MOTION AND, IF FILED, DETERMINED IN THE DISTRICT COURT OF APPEAL OF FLORIDA SECOND DISTRICT JASON JAMES WALKER, DOC #H18351, Appellant, v. Case No. 2D16-5577

More information

In the Supreme Court of the United States

In the Supreme Court of the United States NO. 16-263 In the Supreme Court of the United States STAVROS M. GANIAS, v. UNITED STATES, Petitioner, Respondent. On Petition for Writ of Certiorari to the United States Court of Appeals for the Second

More information

Follow this and additional works at:

Follow this and additional works at: 2006 Decisions Opinions of the United States Court of Appeals for the Third Circuit 8-3-2006 USA v. King Precedential or Non-Precedential: Non-Precedential Docket No. 05-1839 Follow this and additional

More information

From the Attorneys at the Legacy Counsel James Publishing

From the Attorneys at the Legacy Counsel   James Publishing Was That Police Search and Seizure Action Legal? From the Attorneys at the Legacy Counsel www.legacycounselfirm.com James Publishing Contents I. Introduction... 4 II. The Ground Rules... 6 A. The Police

More information

IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT. No Non-Argument Calendar. D.C. Docket No. 8:16-cr EAK-MAP-1.

IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT. No Non-Argument Calendar. D.C. Docket No. 8:16-cr EAK-MAP-1. USA v. Iseal Dixon Doc. 11010182652 Case: 17-12946 Date Filed: 07/06/2018 Page: 1 of 8 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT No. 17-12946 Non-Argument Calendar

More information

New Jersey v. T.L.O. 469 U.S. 325 United States Supreme Court January 15, JUSTICE WHITE delivered the opinion of the Court.

New Jersey v. T.L.O. 469 U.S. 325 United States Supreme Court January 15, JUSTICE WHITE delivered the opinion of the Court. New Jersey v. T.L.O. 469 U.S. 325 United States Supreme Court January 15, 1985 JUSTICE WHITE delivered the opinion of the Court. We granted certiorari in this case to examine the appropriateness of the

More information

OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE

OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE Criminal Cases Decided Between September 1, 2010 and March 31, 2011 and Granted Review for

More information

No IN THE SUPREME COURT OF THE UNITED STATES JOHN LEE HANEY, PETITIONER UNITED STATES OF AMERICA

No IN THE SUPREME COURT OF THE UNITED STATES JOHN LEE HANEY, PETITIONER UNITED STATES OF AMERICA No. 01-8272 IN THE SUPREME COURT OF THE UNITED STATES JOHN LEE HANEY, PETITIONER v. UNITED STATES OF AMERICA ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE TENTH CIRCUIT

More information

No IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, DAVID NOSAL,

No IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, DAVID NOSAL, Case: 10-10038 10/22/2010 Page: 1 of 37 ID: 7519986 DktEntry: 27 No. 10-10038 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant, v. DAVID NOSAL,

More information

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT USA v. Christine Estrada Case: 15-10915 Document: 00513930959 Page: 1 Date Filed: 03/29/2017Doc. 503930959 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT UNITED STATES OF AMERICA, United States

More information

Ch. 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights

Ch. 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights Name: Date: Period: Ch 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights Notes Ch 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights 1 Objectives about Civil Liberties GOVT11 The student

More information

Computer Search and Seizure

Computer Search and Seizure Computer Search and Seizure National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org Funding! This project is supported by grants

More information

SUPREME COURT OF THE UNITED STATES

SUPREME COURT OF THE UNITED STATES Cite as: 556 U. S. (2009) 1 NOTICE: This opinion is subject to formal revision before publication in the preliminary print of the United States Reports. Readers are requested to notify the Reporter of

More information

TYSON KENNETH CURLEY OPINION BY v. Record No ELIZABETH A. McCLANAHAN July 26, 2018 COMMONWEALTH OF VIRGINIA

TYSON KENNETH CURLEY OPINION BY v. Record No ELIZABETH A. McCLANAHAN July 26, 2018 COMMONWEALTH OF VIRGINIA PRESENT: All the Justices TYSON KENNETH CURLEY OPINION BY v. Record No. 170732 ELIZABETH A. McCLANAHAN July 26, 2018 COMMONWEALTH OF VIRGINIA FROM THE COURT OF APPEALS OF VIRGINIA Tyson Kenneth Curley

More information

2018 PA Super 183 : : : : : : : : :

2018 PA Super 183 : : : : : : : : : 2018 PA Super 183 COMMONWEALTH OF PENNSYLVANIA Appellant v. TAREEK ALQUAN HEMINGWAY IN THE SUPERIOR COURT OF PENNSYLVANIA No. 684 WDA 2017 Appeal from the Order March 31, 2017 In the Court of Common Pleas

More information

United States Court of Appeals

United States Court of Appeals United States of America, v. Antoine Jones, Case: 08-3034 Document: 1278562 Filed: 11/19/2010 Page: 1 Appellee Appellant ------------------------------ Consolidated with 08-3030 1:05-cr-00386-ESH-1 Filed

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

Present: Kinser, C.J., Lemons, Goodwyn, Millette, and Mims, JJ., and Russell and Lacy, S.JJ.

Present: Kinser, C.J., Lemons, Goodwyn, Millette, and Mims, JJ., and Russell and Lacy, S.JJ. Present: Kinser, C.J., Lemons, Goodwyn, Millette, and Mims, JJ., and Russell and Lacy, S.JJ. D ANGELO BROOKS v. Record No. 091047 OPINION BY JUSTICE WILLIAM C. MIMS June 9, 2011 COMMONWEALTH OF VIRGINIA

More information

Follow this and additional works at:

Follow this and additional works at: 2003 Decisions Opinions of the United States Court of Appeals for the Third Circuit 2-19-2003 USA v. Mercedes Precedential or Non-Precedential: Non-Precedential Docket 00-2563 Follow this and additional

More information

NOT DESIGNATED FOR PUBLICATION. No. 119,013 IN THE COURT OF APPEALS OF THE STATE OF KANSAS. STATE OF KANSAS, Appellee,

NOT DESIGNATED FOR PUBLICATION. No. 119,013 IN THE COURT OF APPEALS OF THE STATE OF KANSAS. STATE OF KANSAS, Appellee, NOT DESIGNATED FOR PUBLICATION No. 119,013 IN THE COURT OF APPEALS OF THE STATE OF KANSAS STATE OF KANSAS, Appellee, v. SHANNON MARIE BOGART, Appellant. MEMORANDUM OPINION Affirmed. Appeal from Shawnee

More information

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE Assigned on Briefs July 21, 2010

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE Assigned on Briefs July 21, 2010 IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE Assigned on Briefs July 21, 2010 STATE OF TENNESSEE v. KEVIN M. FRIERSON Direct Appeal from the Criminal Court for Davidson County No. 2007-C-2329

More information

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE March 29, 2011 Session

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE March 29, 2011 Session IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE March 29, 2011 Session STATE OF TENNESSEE v. JAMES DAVID MOATS Direct Appeal from the Criminal Court for McMinn County No. 09048 Carroll L. Ross,

More information

No IN THE SUPREME COURT OF THE UNITED STATES. JAMES T. OLIVER, Petitioner, STATE OF CLINTONIA, Respondent,

No IN THE SUPREME COURT OF THE UNITED STATES. JAMES T. OLIVER, Petitioner, STATE OF CLINTONIA, Respondent, No. 17-795 IN THE SUPREME COURT OF THE UNITED STATES JAMES T. OLIVER, Petitioner, v. STATE OF CLINTONIA, Respondent, On Writ of Certiorari To The Supreme Court of Clintonia For the Fifteenth Judicial Circuit

More information

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT T.T., a child, Appellant, v. STATE OF FLORIDA, Appellee. No. 4D18-442 [August 29, 2018] Appeal from the Circuit Court for the Seventeenth

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, RAYMOND WONG, No. 02-10070 Plaintiff-Appellee, D.C. No. v. CR-00-40069-CW Defendant-Appellant. OPINION Appeal

More information

When Is A Felony Not A Felony?: A New Approach to Challenging Recidivist-Based Charges and Sentencing Enhancements

When Is A Felony Not A Felony?: A New Approach to Challenging Recidivist-Based Charges and Sentencing Enhancements When Is A Felony Not A Felony?: A New Approach to Challenging Recidivist-Based Charges and Sentencing Enhancements Alan DuBois Senior Appellate Attorney Federal Public Defender-Eastern District of North

More information

OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE

OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE Criminal Cases Decided Between April 1, 2010 and August 31, 2010 and Granted Review for the

More information

MEMORANDUM FOR BASIC LEGAL RESEARCH & WRITING I. QUESTIONS PRESENTED. A. Will Mr. Smeek prevail on a motion to suppress the 300 grams of hail seized

MEMORANDUM FOR BASIC LEGAL RESEARCH & WRITING I. QUESTIONS PRESENTED. A. Will Mr. Smeek prevail on a motion to suppress the 300 grams of hail seized MEMORANDUM FOR BASIC LEGAL RESEARCH & WRITING TO: MR. CONGIARDO FROM: AMANDA SCOTT SUBJECT: RE: PEOPLE V. JOSHUA SMEEK DATE: DECEMBER 10, 2015 I. QUESTIONS PRESENTED A. Will Mr. Smeek prevail on a motion

More information

"New Jersey Supreme Court Issues Latest 'Investigatory Stop' Ruling"

New Jersey Supreme Court Issues Latest 'Investigatory Stop' Ruling "New Jersey Supreme Court Issues Latest 'Investigatory Stop' Ruling" On December 13, 2012, the Supreme Court of New Jersey determined whether the investigatory stop of Don C. Shaw was constitutional under

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN NORTHERN DIVISION. Petitioner, Case No BC v. Honorable David M.

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN NORTHERN DIVISION. Petitioner, Case No BC v. Honorable David M. UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN NORTHERN DIVISION ERIC VIDEAU, Petitioner, Case No. 01-10353-BC v. Honorable David M. Lawson ROBERT KAPTURE, Respondent. / OPINION AND ORDER DENYING

More information

A. Privilege Against Self-Incrimination Issue

A. Privilege Against Self-Incrimination Issue In the wake of the passage of the state law pertaining to so-called red light traffic cameras, [See Acts 2008, Public Chapter 962, effective July 1, 2008, codified at Tenn. Code Ann. 55-8-198 (Supp. 2009)],

More information

Chapter 1: Computer Forensics and Investigations as a Profession

Chapter 1: Computer Forensics and Investigations as a Profession Chapter 1: Computer Forensics and Investigations as a Profession Download Full Test Bank for guide to computer forensics and investigations 5th edition at https://getbooksolutions.com/download/test-bank-for-guide-to-computer-forensics-andinvestigations-5th-edition

More information

IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO

IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO Certiorari Denied, December 11, 2009, No. 32,057 IN THE COURT OF APPEALS OF THE STATE OF NEW MEXICO Opinion Number: 2010-NMCA-006 Filing Date: October 30, 2009 Docket No. 27,733 STATE OF NEW MEXICO, v.

More information