When a father consented to a search of his "son's account" on their jointly used computer, investigators exceeded the scope of consent when they searched the recycle bin, which included files from multiple users. Child porn found there is suppressed. wicourts.gov/ca/opinion/Dis…#N
The forensic tool used to search the computer grouped the deleted files from all accounts in the same place, the recycle bin, without indicating from which account a particular file had originated. Acc to the court, using the tool to search that was beyond the scope of consent.
This case touches on a question that I cover in my computer crime law casebook and discuss in my class: How do you apply consent principles to computer searches when people consent in regular-user-speak but forensic analysts think in forensic-tool-speak?
The court's answer, in effect, is that the agents need to follow the limits of regular-user-speak even if it's awkward to translate it.
Also, if there are computer forensics experts who can shed light on the details, that would be very helpful. This was a en case tool used to search a Windows 7 machine with two user profiles. When the court refers to "deleted files in the recycle bin," does that mean ...
that en case had created a combined set of files that included both files in the recycle bins of the various users and remainders of any deleted files from those recycle bins? Just the former?
• • •
Missing some Tweet in this thread? You can try to
force a refresh
The interview above was recorded in 1997, and none of it has ever been shown outside my family before. At some point I'm going to make a full length edited video of it to post on Youtube (it was 5+ hours long, so it needs to be shortened). But, for now, this excerpt.
Many, myself included, have expressed amusement (or horror) about how splintered and long the 5th Circuit's decision is. Perhaps worth noting that at least some of that may reflect the fact that it's a facial challenge.
Some background: Most constitutional arguments are "as applied" challenges, in which a person will claim the government did something unconstitutional. But some challenges are "facial" challenges, in which the challenge is to the statute itself.
With "as applied" challenges, there's usually an ultimate ruling: Is the action constitutional or unconstitutional? But facial challenges can be more complicated, because the challenger may challenge several different parts of the statute, on different rationals.
How does the 4th Amendment apply to the "U.S. Private Vaults" case, busting the Beverly Hills store where people could anonymously store guns and drugs (and anything else)?
First, the alleged facts. The store hosted safe deposit boxes at a strip mall. Their selling point was total privacy: You pay big $$$, and you can store anything there and no one will know. According to prosecutors, the business was trying to entice those engaged in crimes.
The store didn't want to know who its customers were. They just wanted the very large payments in exchange for privacy. I gather this is their website, and Youtube plug:
In dicta, magistrate judge concludes that govt use of a cell site simulator is a search requiring a warrant because it might be used to locate a phone in a place where there's an REP. (DDC, 3/25/21) (Faruqui, M.J)
First, why it's dicta: The issue arose when the government applied for a warrant, so no one was trying to conduct surveillance without a warrant. (Also, I don't tend to think Article III allows a merits ruling like this now, as how the 4A applies is not yet a ripe dispute.)
On the merits, the court's conclusion that a search occurs if a search might occur -- if a tool might be used to conduct a search -- seems wrong in light of United States v. Karo, which limited but did not overturn Knotts. scholar.google.com/scholar_case?c…
There's a lot that can be said about the CA6's Meriwether opinion, most of it way outside my expertise. But just one small thought about the para below. If the prof thinks that taking attendance is deeply wrong, wouldn't that make refusal ideological? opn.ca6.uscourts.gov/opinions.pdf/2…
Calling roll sends a message, that the school is in charge: A student's presence in class is critical, the school says, whether the student wants to be there or not. Many profs disagree w/this message, though. They think students should be allowed to attend or not as they wish.
If a professor thinks it is critical to learning that the environment be open, and not compelled, the professor may think it important to send the message that attendance is *not* required. They may not want to call roll for an ideological reason.
A bit about the federal law of enticement and so-called traveler cases, which may be of interest in light of the story below. nytimes.com/2021/03/30/us/…
Every state has age of consent laws, prohibiting sexual intercourse with a person under the age of consent. The age of consent varies by state, generally being 16, 17, or 18. See the chart here: aspe.hhs.gov/report/statuto…
Federal law makes certain interstate conduct done with intent to commit such crimes a federal crime. For example, 18 U.S.C. 2423 makes it a crime to transport a person under 18 in interstate commerce w/ intent to engage in an illegal sexual act. law.cornell.edu/uscode/text/18…