Archive for the ‘Fourth Amendment’ Category

US Government for Kids: Fourth Amendment

History >> US Government The Fourth Amendment was part of the Bill of Rights that was added to the Constitution on December 15, 1791. It protects people from unlawful searches and seizures. This means that the police can't search you or your house without a warrant or probable cause.

From the Constitution

Here is the text of the Fourth Amendment from the Constitution:

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

Reasons for the Fourth Amendment

The Fourth Amendment came about because of the actions of British tax collectors before the Revolutionary War. They would use general warrants to enter and search any house they wanted without needing evidence of wrongdoing. The Founding Fathers wanted to protect people from this sort of invasion of privacy from the government.

What is "searches and seizures"?

A "search" under the Fourth Amendment is when a public employee (like a police officer) looks at something that is considered "private". It typically takes two things in order for something to be considered "private":

1) the citizen thought it was private and it would not be able to be viewed by the public (For example, something inside a house would be private, something on the driveway could be viewed by anyone).

2) these expectations of privacy are realistic (It wouldn't be realistic to expect something on your driveway to be private).

When someone is "seized" they are not free to leave (like being arrested and placed in jail). When something is "seized" it cannot be taken back (like the police taking your wallet and not giving it back).

Judges Warrant

In order to conduct a legal "search" or "seizure" the police must have a warrant written by a judge. To get this warrant they must present evidence to the judge that some criminal activity has taken place. This assures that the police can't enter a person's home or arrest a person without evidence that has been reviewed by a judge.

Probable Cause

The Fourth Amendment also states that there must be "probable cause." This means that there is enough evidence to show that a crime has likely been committed. The police must have this evidence before any arrest or search. Any evidence found during the search does not count as probable cause.

How does this work in public schools?

The requirements for search and seizure are slightly different in the public schools. The Supreme Court has said that school officials and police officers can search a student if they have "reasonable suspicion" that a crime has occurred. This is less of a requirement than "probable cause."

Some Searches Are Allowed

There are certain places and situations where people are searched or stopped without a warrant. Consider the airport where everyone who flies is searched. When you agree to fly, you give up some of your Fourth Amendment rights. Another example is a roadblock that tests for drunk drivers. When you drive on public roads you give up some of your Fourth Amendment rights. These searches are generally accepted by the citizens for their own safety and protection.

Interesting Facts about the Fourth Amendment

To learn more about the United States government:

Works Cited

History >> US Government

Go here to see the original:
US Government for Kids: Fourth Amendment

ACLU challenges warrant to search Facebook page of Dakota Access opponents – The Hill

The American Civil Liberties Union is moving to quash a police warrant granted to search data on a Facebook page of a group protesting the Dakota Access pipeline.

The American Civil Liberties Unionfiled a motion Wednesday to strike what it described as a far-reaching and unconstitutional request by the Whatcom County Sheriffs Department in Bellingham, Wash., to search the Facebook page of the Bellingham #NODAPL Coalition.

The coalition and other individuals across the country have engaged in protests against the Trump administrations plan to move forward on construction of the pipeline. The group is said to have been involved in a protest at Bellinghams U.S. Bank in early February.

According to the ACLU, the founder of the Facebook page received an email from Facebook on March 3 with a copy of the warrant issued to search the site. The message, cited by the ACLU in its filing, also indicated that a motion would need to be filed by March 8 to quash the warrant and that Facebook would otherwise respond to the legal process. The ACLU has posted a copy of the warrant on its website.

The motion argues that the warrant is unconstitutional because it permits a broad search of private electronic data protected by the First and Fourth Amendments.

The warrant at issue here is deeply problematic and runs afoul of constitutional protections.Political speech and the freedom to engage in political activity without being subjected to undue government scrutiny are at the heart of the First Amendment, La Rond Baker, staff attorney at the ACLU of Washington, said in a statement issued late Wednesday.

Further, the Fourth Amendment prohibits the government from performing broad fishing expeditions into private affairs. And seizing information from Facebook accounts simply because they are associated with protests of the government violates these core constitutional principles, Baker said.

The Whatcom County Sheriffs Department did not respond to a request for comment by press time.

The First Amendment protects political speech, the right to receive information, and the right to associate with others to engage in political speech and advocacy without state monitoring or interference. The warrant here intrudes on all of these rights and would chill both political speech and association at the heart of the First Amendment, the motion states.

The warrant also fails to meet the basic Fourth Amendment requirement that warrants be particularized, not least because it potentially extends to any member of the public, supportive or not, who interacted with the group."

This post was updated at 2:06 p.m.

More:
ACLU challenges warrant to search Facebook page of Dakota Access opponents - The Hill

Secret Court Orders Aren’t Blank Checks for General Electronic Searches – EFF

Imagine this: the government, for reasons you don't know, thinks you're a spy. You go on vacation and, while you're away, government agents secretly enter your home, search it, make copies of all your electronic devices, and leave. Those agents then turn those devices upside down, looking through decades worth of your files, photos, and online activity saved on your devices. They don't find any evidence that you're a spy, but they find something elseevidence of another, totally unrelated crime. You're arrested, charged, and ultimately convicted, yet you're never allowed to see what prompted the agents to think you were a spy in the first place.

Sounds like something from dystopian fiction, right? Yet it's exactly what happened to Keith Gartenlaub. In January 2014, the FBI secretly entered Gartenlaub's home while he and his wife were on vacation in China. Agents scoured the home, taking pictures, searching through boxes and books, andcriticallymaking wholesale copies of his hard drives.

Agents were authorized by the secret Foreign Intelligence Surveillance Court ("FISC") to search for evidence that Gartenlaub was spying for the Chinese government. Theres only one problem with that theory: the government has never publicly produced any evidence to support it. Nevertheless, Gartenlaub now sits in jail. Not for spying, but because the FBIs forensic search of his hard drives turned up roughly 100 files containing child pornography, buried among thousands of other files, saved on an external hard drive.

Gartenlaub was tried and convicted, and he appealed his conviction to the Ninth Circuit Court of Appeals. EFF (along with our friends at the ACLU) recently filed an amicus brief in support of his appeal.

There are plenty of troubling aspects to Gartenlaubs prosecution and conviction. For one, and unlike normal criminal prosecutions, neither Gartenlaub nor his lawyers have ever seen the affidavit and order issued by the FISC that authorized the search of his home. There are also legitimate concerns about the sufficiency of the evidence used to convict him.

But we got involved for a different reason: to weigh in on the Fourth Amendment implications of the FBIs searches of Gartenlaubs electronic devices. The unusual facts of this case gave us an unusually good opportunity to push for greater Fourth Amendment protections in all searches of electronic devices.

Heres why: when agents copied and searched Gartenlaubs devices, they were only authorized to search for national security-related information. But the prosecution that resulted from those searches and seizures had nothing to do with national security at all. So, either the FBI seized information that was outside of the warrant (which the Fourth Amendment prohibits); or it was relying on an exception to the warrant requirement, like plain viewan exception that allows law enforcement to seize immediately obvious contraband when the government is in a place to lawfully observe it.

Plain view makes sense in the physical world. If cops are executing a search warrant for a home to search for drugs, they shouldnt have to ignore the dead body lying in the living room. But the way plain view works in the digital contextespecially forensic computer searchesis not at all clear. How far can cops rummage around our computers for the evidence theyre authorized to look for? Does a warrant to search for evidence of drug dealing allow cops to open all the photos stored on our computer? Does an order authorizing a search for national security information let the government rifle through a digital porn collection? And where do we draw the line between a specific search, based on probable cause for specific information stored on a computerwhich the Fourth Amendment allows and a general search for evidence of criminal activitywhich the Fourth Amendment prohibits?

Our electronic devices contain decades' worth of personal information about us. And, in many ways, searches of our electronic devices can be more intrusive than searches of our homes: there is information stored on our phones, computers, and hard drives, about our interests, our political thoughts, our sexual orientations, or religious beliefs, that might never have been previously stored in our homesor, for that matter, anywhere at all. Because of the sensitivity of this data, we need clear restrictions on law enforcement searches of our electronic devices, so that every search doesn't turn into the type of general rummaging the Fourth Amendment was designed to prevent.

In our brief, we argued this case gave the Court a perfect opportunity to set a clear rule. We argued that the FBIs search of Gartenlaubs hard drives for evidence of regular, domestic crimes violated the Fourth Amendment, and we urged the Court to adopt a rule that would prohibit the FBI from using evidence that it obtained that was outside the scope of the initial search authorization. This would be a promising first step in limiting law enforcements electronic search powers and in protecting our right to privacy in the digital age.

Read more from the original source:
Secret Court Orders Aren't Blank Checks for General Electronic Searches - EFF

Federal Court Tells ATF It Can’t Just Help Itself To Cell Phone Data … – Techdirt

The good news is the Supreme Court's Riley decision forces law enforcement to obtain warrants before searching cell phones. The bad news, apparently, is everything else. To begin with, particularity remains a problem. As the Supreme Court pointed out in its decision, people's entire lives are contained in their cell phones. When searching for what's relevant to the suspected criminal activity, the government is pretty much free to dig through these "lives" to uncover what it needs to move forward with prosecution.

The lack of strict parameters (perhaps an impossibility given the nature of digital communications/data) leads to fishing expeditions operating under the cover of Fourth Amendment adherence. There's no way to prevent trolling for evidence of unrelated criminal activity. The only recourse is to challenge it after it happens. Sometimes the courts find the government has gone too far. Other times, courts say the evidence would have been "inevitably discovered" in the course of the search and prevent it from being suppressed.

Then there are decisions like the one reached by a federal court in South Dakota -- one that says just because one law enforcement agency deployed a warrant to image the contents of a cell phone doesn't mean other law enforcement agencies can take a look at it without obtaining a warrant of their own.

Volokh Conspiracy's Orin Kerr snagged the decision and added some brief analysis. A cell phone seized by local police was also apparently of interest to the federal Bureau of Alcohol, Tobacco and Firearms (ATF), which was running its own investigation on the same subject. The local cops were looking for counterfeiting evidence, while the ATF was interested in firearms-related evidence.

The locals obtained a warrant and imaged the phone's contents. In the course of its investigation, the ATF pulled up the suspect's file and noticed the recent arrest and seizure of the suspect's cell phone. The Huron (SD) police department helpfully informed the ATF that it had a copy of the cell phone's contents that the ATF could take a look at. The ATF accepted the offer, but did not perform the crucial step of obtaining a warrant. That misstep cost the ATF its evidence.

According to the government, all evidence seized -- even if unrelated to the investigation at hand -- should be accessible to any law enforcement agency without obtaining another warrant. Because teamwork. The court disagrees [PDF], pointing out that the government's asking the court to grant it an open-ended fishing license for all electronic devices seized with a warrant:

The government argues that this conclusion is impractical and is contrary to the nature of police investigations and collaborative law enforcement among different agencies. The governments position, however, overlooks the ultimate touchstone of the Fourth Amendment: reasonableness. Riley, 134 S. Ct. at 2482.

According to the government, law enforcement agencies can permanently save all unresponsive data collected from a cell phone after a search for future prosecutions on unrelated charges. If the governments argument is taken to its natural conclusion, then this opens the door to pretextual searches of a persons cell phone for evidence of other crimes. Under the governments view, law enforcement officers could get a warrant to search an individuals cell phone for minor infractions and then use the data to prosecute felony crimes. No limit would be placed on the governments use or retention of unresponsive cell phone data collected under a valid warrant.

The court also disagrees with the government's plain view defense. In order for the "plain view" exception to work, there has to be justification for the "view" itself. In this case, the ATF had no justification for viewing the contents of a cell phone seized by another agency for an unrelated investigation.

The government also argued that the exclusionary rule shouldn't be applied to the evidence it obtained without a warrant. The court again disagrees, pointing out that the government will suffer minimally from the exclusion of evidence it apparently wasn't planning to introduce anyway. In addition, a failure to enforce the exclusionary rule in cases like these would just result in more governmental fishing trips.

Here, the cost of applying the exclusionary rule is minimized because the evidence is peripheral in nature and not directly related to the firearms offense. The governments actions also suggest the evidence is not necessary for a conviction. Prior to Agent Fairs search of the iPhone data, the government was ready to proceed with trial on January 3, 2017. Minutes before voir dire, the parties addressed a late discovery issue, and the court granted a continuance. If the issue had not come before the court, the government would have tried its case, and the iPhone data would not have been used.

In contrast, the benefits of applying the exclusionary rule in this case are clear. If the exclusionary rule is not applied, law enforcement agencies will have carte blanche authority to obtain a warrant for all data on a cell phone, keep the unresponsive data forever, and then later use the data for criminal prosecutions on unrelated chargeserasing the protections specifically contemplated in Riley.

All well and good as far as it goes for upholding Fourth Amendment protections, but as Orin Kerr points out, the court seems to be balancing the government's losses against the plaintiff's rights before arriving at this conclusion.

As I have written before, I dont think it works to do this kind of case-by-case cost/benefit balancing when applying exclusionary rule precedents. But if the evidence isnt important, the government isnt going to file an appeal of the decision granting the motion to suppress. This decision is likely the end of the road in terms of judicial review of the Fourth Amendment issue.

They don't call the exclusionary rule a RULE for no reason. When rights are violated, exclusion is the proper remedy. Whether or not it damages the government's prosecution should be a distant secondary concern.

See the original post here:
Federal Court Tells ATF It Can't Just Help Itself To Cell Phone Data ... - Techdirt

EFF: Data Collected From Utility Smart Meters Should Be Protected By The Fourth Amendment – Techdirt

For years, electric utilities have increasingly embraced smart meters. Roughly 65 million of the devices have been installed in the United States over the last few years, with 57 million of them in consumer homes. The meters provide innumerable benefits to utility companies, often delivering an ocean of new remote access and monitoring tools to better manage the network and reduce meter reading truck rolls. The benefits to consumers (outside of accuracy) have been less notable, including interference with some home routers, as well as the fact that a number of models have been shown to be relatively easily hacked.

In addition to hackability, the sheer volume of data being gobbed up by utility companies tells an awful lot about you (when you wake, when you sleep, when you're home or away). This has, at times, sparked outrage from locals in places like Naperville, Illinois, where, since 2011, meter opponents have been fighting the intrusive nature of the devices:

"...Opponents say the meters provide so much information that everyone from cops to criminals to marketing departments can learn when people are home and what they do when they're there. Last year, the anti-meter movement fell just short of collecting enough signatures to place a question on the ballot asking residents to decide whether the devices should be removed. They also have a pending federal lawsuit against the city alleging that their constitutional right to due process has been violated."

That was 2013. In 2015, the city of Naperville was forced to settle with one smart meter opponent after she sued the city and four of its police officers for violating her constitutional rights. That same year, another man sued the city over what he claimed was an unwarranted search into his home. But last fall, a federal district court in Illinois declared that Americans can't reasonably expect any privacy in the data collected by these devices, and utility collection of it is completely beyond the protection of the Fourth Amendment.

That case is currently on appeal to the United States Court of Appeals for the Seventh Circuit. And the EFF and Privacy International have asked the Seventh Circuit if they can weigh in on the case. In a blog post, the EFF points out that the court's decision was based on a misunderstanding of how the technology actually works. Basically, the court assumed that these new meters work in exactly the same way as their older counterparts, ignoring the significantly-expanded data collected:

"The court was convinced that data collected from smart meters is no different from data collected from analog meters, in terms of what it reveals about whats going on inside the home. But thats simply not the case. Smart meters not only produce far more data than analog metersthose set at collecting data in 15-minute intervals produce 2,880 meter readings per month compared to just one monthly reading for analog metersbut the data is also far more intimate. A single monthly read of cumulative household energy use does not reveal how energy is being used throughout the course of a day. But smart meter data does. And its time granularity tells a story about what is going on inside the home for anyone who wishes to read it."

As we've seen with cellular location data, once companies collect this information, it's often sold to any number of third parties who may be using this data in ways that aren't always in your best interests. But as Tim Cushing has occassionally noted, getting companies to be forthcoming about what they're collecting and who they may be selling it to is sometimes difficult, with at least one company suing to thwart transparency efforts on the subject in Seattle. And as Glyn Moody has also noted, this collision between privacy rights and utility data collection on the smart meter front isn't just an American phenomenon.

Read this article:
EFF: Data Collected From Utility Smart Meters Should Be Protected By The Fourth Amendment - Techdirt