Archive for the ‘Fourth Amendment’ Category

U.S. Chamber Letter on H.R. 7701, the Wage Theft Prevention and Wage Recovery Act – uschamber.com

Dear Chairman Scott and Ranking Member Foxx:

The U.S. Chamber of Commerce opposes H.R. 7701, the Wage Theft Prevention and Wage Recovery Act, which would hinder employees from receiving their due compensation and inhibit the use of arbitration procedures that have been shown to be highly efficient and cost effective.

While sounding benign and well meaning, the provisions on requiring pay disclosures and paystubs are redundant with rights covered under state law. Adding federal requirements would add complexity and confusion without actually improving worker protections.

Similarly, increasing the financial consequences for violations makes a great headline, but the actual impact on low-wage workers will not be to their advantage. Employers faced with such massive damages and penalties will most likely choose to challenge the citations and allegations and pursue a litigation approach. Payment of back wages would be delayed by years. The plaintiff's bar will collect more fees, but low-wage workers may see scant returns or nothing at all. The proposed increases also are inflexible with no room for discretion based on the size of business or the type of violation.

The ultimate goal of this bill is to promote expensive class action litigation that does little to help businesses and employees by precluding the enforcement of predispute arbitration clauses. Such litigation serves principally to benefit the attorneys who file class action lawsuits. Arbitration is a fair, effective, and less expensive means of resolving disputes compared to going to court. Empirical studies demonstrate that employees in arbitration do just as well, or in many circumstances, considerably better, than in court. For example, recent studies have found that employees in arbitration prevail three times more often, win more money, and resolve their claims must faster than in litigation.[1] Studies have also shown that class action settlements frequently provide only a pittance or many times, nothing at all to class members while millions of dollars are paid to their attorneys.[2]

Finally, the bills Grant Program would deputize advocates to help conduct investigations. This would eradicate the long tradition of employers voluntarily cooperating with agency investigations, producing documents, and welcoming investigators into their worksites. If the Department of Labor brings along unions and advocates, employers would likely stop cooperating and insist on search warrants and document subpoenas, in accordance with the Fourth Amendment. Again, more complexity, longer investigations, and more litigation will harm low-wage workers by delaying payment of wages.

The Chamber urges the Committee not to approve the Wage Theft Prevention and Wage Recovery Act.

Sincerely,

Neil L. Bradley

Executive Vice President, Chief Policy Officer,

and Head of Strategic Advocacy

U.S. Chamber of Commerce

cc: Members of the House Committee on Education and Labor

[1] See Fairer, Faster, Better III: An Empirical Assessment of Consumer and Employment Arbitration (March 2022) available at https://instituteforlegalreform.com/research/update-an-empirical-assessment-of-consumer-employment-cases-in-arbitration-litigation/.

[2] See Do Class Actions Benefit Class Members? An Empirical Analysis of Class Actions (Dec. 11, 2013) available at https://www.mayerbrown.com/files/uploads/documents/pdfs/2013/december/doclassactionsbenefitclassmembers.pdf.

See more here:
U.S. Chamber Letter on H.R. 7701, the Wage Theft Prevention and Wage Recovery Act - uschamber.com

Tech Companies Oppose ‘Reverse Warrants,’ Say Surveillance Of User Location Data Should Be Limited To Tech Companies – Techdirt

from the maybe-don't-gather-all-this-data-in-the-first-place? dept

Googles market share and capacity to gather billions of data points has made it the most popular target for so-called warrants that seem to elude both particularity requirements and the Supreme Courts decision in the Carpenter case.

To be a reasonable search, law enforcement is supposed to be able to show the information it seeks can be found where they say it is and be relevant to the investigation. Reverse warrants warrants in which law enforcement seeks location data and other info from everyone in a certain area at a certain time only satisfy one of these requirements. If courts are persuaded the only thing that needs to be shown is the likelihood Google has this data, then the warrants are good.

If the warrants need to show the data sought pertains to criminal suspects, the warrants should obviously fail. Rather than showing probable cause to search for data related to suspects, reverse warrants turn everyone in the area into a potential suspect and allows law enforcement to work backwards from the data dump to identify people it feels might be involved in the crime being investigated.

Recently, a Virginia court blocked a reverse warrant served to Google in a robbery case, saying it was unconstitutionally vague. This decision remains an outlier, though, and use of reverse warrants continues to increase exponentially with each passing year.

In a legal brief filed in the case, Google said geofence requests jumped 1,500% from 2017 to 2018, and another 500% from 2018 to 2019. Google now reports that geofence warrants make up more than 25% of all the warrants Google receives in the U.S., the judge wrote in her ruling.

Some belated pushback has begun, courtesy of the state of New York. Theres more pushback on the way, this time via the companies targeted by geofence/reverse warrants and so-called keyword warrants, which demand information on internet users who have searched for certain terms. Google is the primary recipient of these warrants as well.

The Reform Government Surveillance group composed of a dozen tech companies, including Google, Apple, Twitter, and Meta has issued this statement in support of the New York bill.

Reform Government Surveillance supports the adoption of New York Assembly Bill A84A, theReverse Location Search Prohibition Act, which would prohibit the use of reverse location and reverse keyword searches.

This bill, if passed into law, would be the first of its kind to address the increasing use of law enforcement requests that, instead of relying on individual suspicion, request data pertaining to individuals who may have been in a specific vicinity or used a certain search term.

The EFF correctly points out the danger of these warrants, whose use has exploded over the last half-decade.

These reverse warrants have serious implications for civil liberties. Their increasingly common use means that anyone whose commute takes them goes by the scene of a crime might suddenly become vulnerable to suspicion, surveillance, and harassment by police. It means that an idle Google search for an address that corresponds to the scene of a robbery could make you a suspect. It also means that with one document, companies would be compelled to turn over identifying information on every phone that appeared in the vicinity of a protest,as happened in Kenosha, Wisconsin during a protest against police violence. And, as EFF has argued in amicus briefs, it violates the Fourth Amendment because it results in an overbroad fishing-expedition against unspecified targets, the majority of whom have no connection to any crime.

These are problematic. But so are the data-harvesting efforts of tech companies. Americans are generally leery of the always-on tracking and data collection these companies engage in. They become significantly more worried when they discover just how easily the government can access this massive amount of data.

Tech companies are right to oppose government surveillance overreach. But they also need to be a lot more honest with their users, informing them in plain English about whats being collected, when its being collected, how long its retained, and what the aggregate collection can reveal about their activities and social connections.

They also should do more to assure third party app developers arent abusing permissions to collect even more data government agencies can obtain without a warrant. And they should give users easy ways to opt out of collections and ensure users are well informed about potential usability downsides of opting out so they can grant truly informed consent to service providers.

Making noise about government surveillance doesnt excuse the bad habits of tech companies. While its good to see them stand up against government overreach, they should probably take this opportunity to engage in a bit of introspection to see if theyre not just making the situation worse by hoovering up every bit of data possible, putting it only a questionable piece of legal paperwork away from the governments all-seeing eyes.

Filed Under: 4th amendment, location data, privacy, reverse warrants, surveillanceCompanies: apple, google, meta, twitter

Read the rest here:
Tech Companies Oppose 'Reverse Warrants,' Say Surveillance Of User Location Data Should Be Limited To Tech Companies - Techdirt

May’s Notable Cases and Events in E-Discovery – Lexology

This Sidley Update addresses the following recent developments and court decisions involving e-discovery issues:

1. A ruling from the U.S. District Court for the Southern District of New York compelling one of the defendants to produce earlier in time emails from email threads and addressing how email threads may be handled on the parties privilege logs.

InIn re Actos Antitrust Litigation, No. 1:13-cv-09244 (RA) (SDA), --- F.R.D. ----, 2022 WL 949798 (S.D.N.Y. March 30, 2022), U.S. Magistrate Judge Stewart D. Aaron addressed a motion to compel one of the Defendants to produce earlier in time emails that were included in threaded emails defendants already produced.

In this antitrust class action alleging that Defendants prevented competitors from timely marketing a generic drug, the parties had entered into a protocol for the production of electronically stored information (ESI) in native format that required the parties to de-duplicate the ESI produced but did not address the production of only the most inclusive email threads.Id. at *1. In making its productions, the Defendant against whom the motion to compel was brought used email threading, by which a party reviews and produces the most-inclusive email in a thread. Plaintiffs objected to this format of production and sought to compel Defendant to produce earlier-in-time emails as well as the metadata associated with those emails.

Magistrate Judge Aaron began by noting that the parties dispute highlighted the importance of negotiating a comprehensive ESI protocol before data production is undertaken.Id. at *2. He explained that the parties ESI protocol did not expressly permit the use of email threading, nor do the Federal Rules of Civil Procedure or the local rules of the court contain any provisions regarding the use of email threading. Magistrate Judge Aaron also noted that the Sedona Principles encourage parties to have early discussions regarding procedural issues relating to the form of production and to enter into an agreed upon protocol governing the production of ESI and avoid downstream misunderstandings or disputes.Id. (quotingThe Sedona Principles, Third Edition: Best Practices, Recommendations & Principles for Addressing Electronic Document Production, 19 Sedona Conf. J. 1, Comment 3.c. (2018)).

Magistrate Judge Aaron stated that it is not uncommon for ESI protocols to address the use of email threading, and Plaintiff had pointed to prior litigation in which Defendant had agreed to an ESI protocol that addressed email threading.Id. at *3. But the parties did not address email threading in this case.

Magistrate Judge Aaron found that Defendants exclusion of lesser included emails from production resulted in the exclusion of the metadata associated with earlier emails in a chain and that this exclusion materially reduced Plaintiffs ability to search for all correspondence within a date range. In particular, he found that excluding lesser included emails resulted in the recipients of some such emails not being identified and that it resulted in the loss of information identifying who was blind copied on lesser included emails even though this information was among the metadata the parties agreed to produce. In this regard, Magistrate Judge Aaron noted that the parties could have included in the ESI protocol provisions for the production of metadata to resolve these issues, but Plaintiffs were not provided the opportunity to negotiate how email threading might be accomplished in an acceptable manner.

Ultimately, Magistrate Judge Aaron declined to impose email threading on Plaintiffs. Even though he recognized that production of earlier-in-time emails would cause some additional burden on Defendant, he found that any additional burden is not undue as Defendant agreed to the ESI protocol and likely already had reviewed many of the emails at issue. Accordingly, Magistrate Judge Aaron ordered Defendant to produce all responsive ESI to Plaintiffs, including earlier-in-time emails.

Magistrate Judge Aaron also provided guidance regarding a dispute between the parties regarding how email threads should be identified on privilege logs. He noted that the local rules of the court, specifically Local Civil Rule 26.2(c), provides that when asserting privilege on the same basis with respect to multiple documents, it is presumptively proper to provide the information required by this rule by group or category.Id. at *4. Magistrate Judge Aaron also quoted at length from the committee note to this local rule, including that [b]ecause the appropriate approach may differ depending on the size of the case, the volume of privileged documents, the use of electronic search techniques, and other factors, the purpose of Local Civil Rule 26.2(c) is to encourage the parties to explore methods appropriate to each case.

Based on these principles, Magistrate Judge Aaron concluded that categorical privilege logs are appropriate and that such a log is adequate if it provides information about the nature of the withheld documents sufficient to enable the receiving party to make an intelligent determination about the validity of the assertion of the privilege. He further noted that Plaintiffs proposal of permitting categorical logging of emails only where all emails involved the same participants and subject matter would not be appropriate, nor would Defendants proposal of only logging the threaded emails together.

2. An order from the U.S. District Court for the District of Kansas denying a motion to add plaintiffs outside counsel to plaintiffs list of document custodians for discovery purposes.

InOrchestrate HR, Inc. v. Blue Cross and Blue Shield of Kansas, Inc., No. 19-cv-4007-HLT-TJJ, 2022 WL 834066 (D. Kan. Mar. 21, 2022), U.S. Magistrate Judge Teresa J. James denied Defendants motion to add plaintiffs outside counsel to Plaintiffs list of document custodians for discovery purposes.

Defendants motion asked the court to revisit an earlier ruling that Plaintiffs outside counsel of record, Jose Portela, was not a proper custodian.Id. at *1. Defendant argued that documents produced by Plaintiffs and nonparties, as well as Defendants own documents, indicated that Portela was personally and significantly involved in specific elements of newly pleaded claims. Specifically, Defendant described business communications between Portela and third parties directly relating to issues falling within Defendants discovery requests. Portela asked the court to require Defendant to identify any of the communications counsel was describing that involved only Portela and not his employer because Plaintiffs would likely drop any claim based on those communications. Magistrate Judge James obliged, stating that Defendants motion would need to identify the specific communications that provide the support for Defendants request.

Laying out the legal standard, Magistrate Judge James emphasized the importance that discovery, in particular discovery of ESI, is proportional to the needs of the case. She stated that [t]he proportionality standard requires consideration of the importance of the issues at stake in the action, the amount in controversy, the parties relative access to relevant information, the parties resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit. Magistrate Judge James noted here that early in the litigation, the parties agreed to confer in good faith regarding the identities of ESI custodians in light of these challenges.

Magistrate Judge James then commented that relatively little legal authority existed regarding motions to compel the designation of an additional ESI custodian but thatThe Sedona Principles, Third Editionprovided four key principles that informed the analysis.Id. at *2. First, determining what is relevant and proportional under the circumstances for each matter often requires a highly fact specific inquiry. Second, absent agreement among the parties, the party who will be responding to discovery requests is entitled to select the custodians it deems most likely to possess responsive information and to search the files of those individuals. Third, unless the partys choice is manifestly unreasonable or the requesting party demonstrates that the resulting production is deficient, the court should not dictate the designation of ESI custodians. Fourth, the party seeking to compel the designation of a particular additional ESI custodian has the initial threshold burden of showing that the disputed custodian's ESI likely includes information relevant to the claims or defenses in the case. This is because the party responding to discovery requests is typically in the best position to know and identify those individuals within its organization likely to have information relevant to the case.

Magistrate Judge James noted that Defendants motion was based not on an exception to attorney client privilege but that Portela had access to, or was actively involved in, hundreds of relevant communications related to new claims in Plaintiffs complaint.Id. at *3. Magistrate Judge James rejected Defendants suggestion that the circumstances had significantly changed since its previous attempt to make Portela a custodian. Magistrate Judge James observed that Defendant failed to enumerate any such communication that involved solely Portela and Defendant and misquoted a paragraph in Plaintiffs complaint in its argument that there were hundreds of pertinent communications. She further observed that Plaintiffs added no new causes of action to the complaint and relied on no new exhibits or documents other than four documents produced by Defendant. Magistrate Judge James therefore concluded that the circumstances had not changed since the courts last ruling that Portela would not be a custodian.

Magistrate Judge James then examined Portelas alleged personal and significant involvement in the underlying subject matter of the case. She found Defendants assertion that there were more than 150 communications between Portela with no other Plaintiff representative as sender or recipient unmeaningful, given the length of time Portela had represented Plaintiffs.Id. at *3-*4. Additionally, none of the referenced 150 communications indicated significant involvement in the facts; many did not predate the litigation itself, and over half involved the scheduling of conference calls.

Magistrate Judge James also rejected Defendants argument that because Portela was not a named custodian, no searches between Portela and relevant entities had been conducted. To the contrary, Plaintiffs had produced over 600 documents with Portela as the custodian. Further, Defendant had made a number of exaggerated claims to support its argument; in one example, Defendant claimed that over the course of a year, Portela was in constant communication with Defendant regarding the submission of insurance claims, but the underlying emails Defendant referenced were all written over a two-week period. Magistrate Judge James also rejected Defendants argument that Portela was Plaintiffs primary representative, noting that the attachment to one of Plaintiffs exhibits indicated that the Kansas Department of Insurance had refused to disclose any information to Portela.Id. at *5. Magistrate Judge James then concluded that adding Portela to the list of record custodians would not be proportional to the needs of the case and that Defendant had not shown why Plaintiffs productions were deficient due to Portelas not having been a records custodian.

Magistrate Judge James noted that while the finding of lack of proportionality was sufficient reason to deny Defendants motion, the other factors supported denial as well. The second factor posits that the responding party is entitled to select its own custodians absent an agreement between the parties to the contrary. Because Plaintiffs must supplement or correct any of their initial disclosures if additional or corrective information arises that had not been disclosed during discovery, they would be obligated to conduct a search of Portelas emails if necessary, but otherwise were not under an obligation to do so. Under the third factor, a court should not dictate the designation of ESI custodians unless the partys choice is manifestly unreasonable or the requesting party demonstrates that the resulting production is deficient. Magistrate Judge James pointed to her prior analysis that Defendant had not done so. The fourth factor states that the party seeking to compel the designation of a particular ESI custodian has the initial threshold of showing that the disputed custodians ESI likely includes information relevant to claims or defenses in the case. Magistrate Judge similarly pointed to her prior analysis to dismiss this factor.

Magistrate Judge James then held that Defendant had not met its burden to demonstrate that Portela should be added to the Plaintiffs custodian list absent agreement of the parties and denied Defendants motion.Id. at *6.

3. A decision from the U.S. District Court for the Eastern District of New York denying a motion to compel a forensic examination of plaintiffs cell phone based on alleged alteration of metadata for certain video files from the cell phone that were produced by plaintiff during discovery.

InAminov v. Berkshire Hathaway Guard Insurance Companies, 21-CV-479-DG-SJB, 2022 WL 818944 (E.D.N.Y. Mar. 3, 2022), U.S. Magistrate Judge Sanket J. Bulsara denied a motion to compel Plaintiff to produce his cell phone for forensic examination based on alleged alteration of metadata for certain video files Plaintiff produced during discovery.

Magistrate Judge Bulsara began his analysis by noting that [f]orensic examinations of computers and cell phones are generally considered a drastic discovery measure because of their intrusive nature.Id. at *1. In this regard, Magistrate Judge Bulsara cited the Advisory Committees note to Rule 34(a) to the effect that [i]nspection or testing of certain types of electronically stored information or of a responding partys electronic information system may raise issues of confidentiality or privacy and that [c]ourts should guard against undue intrusiveness resulting from inspecting or testing such systems. He further noted that compelled forensic imaging is not appropriate in all cases and that courts must consider the significant interests implicated by forensic imaging before ordering such procedures.Id. (citingJohn B. v. Goetz, 531 F.3d 448, 460 (6th Cir. 2008)).

Magistrate Judge Bulsara stated that in situations where a party can show improper conduct on the part of the responding party, a forensic examination may be appropriate. For example, discrepancies or inconsistencies in the responding partys discovery responses may justify a partys request to allow an expert to create and examine a mirror image of a hard drive. Magistrate Judge Bulsara further noted that courts have ordered computer imaging when there is reason to believe that a litigant has tampered with the computer or hidden relevant materials that are the subject of court orders. However, he stated that there must be good cause to order computer imaging or similar forensic examinations when a party has already produced the electronic information sought in a native format.

Magistrate Judge Bulsara found that there was no such justification to order forensic imaging in this case.Id. at *2. First, he noted that the Defendants motion was based on misplaced and unsupported speculation that the metadata for the video at issue was altered. Defendants counsel had used a free online metadata tool to analyze the video file, but Defendant provided no information about the reliability of the online tool. Moreover, Defendants conclusions regarding the metadata were based on the less-than-unequivocal statement produced by the online tool that Metadata could have been changed or deleted in the past. Magistrate Judge Bulsara noted that this is hardly the kind of analysis or support that provides a reasonable basis either to conclude that there was alteration of metadata or to warrant forensic examinations.

Magistrate Judge Bulsara also found that the online tool used by the Defendant was not designed to show alteration of metadata but instead to determine whether metadata exists. He noted that the tools website described the tool as one that allows you to access the hidden ... meta data of your files. In other words, the online tool reveals metadata, and therefore at best it may have revealed that videos were produced without metadata. Magistrate Judge Bulsara further noted that the message that the metadata could have been changed or deleted appears automatically for every file that is analyzed by the tool, as a means of liability protection for the company operating the website, and that it was not specific to Plaintiffs video. According to Magistrate Judge Bulsara, [t]his is hardly the thing on which one should base a motion to compel.

Finally, Magistrate Judge Bulsara found that although Defendants counsel had spoken to a forensic consultant about the relevant video files, Defendants motion did not offer the consultants opinion about the website but referred to it only to support the idea that the original phone is necessary for metadata examination. Nor did the consultant opine that Plaintiffs files had missing or altered metadata. Ultimately, [s]ince there is no evidence of spoilation or alteration, there is no cause to require forensic examination of the cell phone on the speculation that additional metadata may exist or that the original metadata was altered.

4. An opinion from the U.S. District Court for the District of Connecticut denying a motion to suppress evidence from a cell phone where the warrant pursuant to which the cell phone had been seized broadly covered the entire contents of the cell phone and the government did not conclude the search of the cell phone until 47 days after the seizure.

InUnited States v. Harry, U.S. v. Harry, No. 3:21cr98 (JBA), 2022 WL 343963 (D. Conn, Feb 4, 2022), U.S. District Judge Janet Bond Arterton denied one of the Defendants motion to suppress evidence derived from a search of his cell phone executed by a warrant (as well as evidence gathered from a pole camera positioned by law enforcement outside of his place of business).

The Drug Enforcement Agency (DEA) intercepted communications between Defendant and the target of an investigation in 2020 and found that Defendant and the target communicated on numerous occasions in furtherance of the alleged drug trafficking conspiracy using a cell phone.Id. at *1. The government obtained a search warrant the day before Defendants arrest to seize and search the cell phone Defendant used to speak with the DEAs target.Id. at *2. The warrant attached a description of the cell phone, the times it might be seized, and the specific records and information on the cell phone to be searched. Upon Defendants arrest on June 9, 2021, the police confirmed that his cell phone was the one that was used to communicate with the target. The cell phone was put in airplane mode, and the DEA began its forensic search two days later. On or about July 19, an agent conducted a manual search of the data.

Defendant argued that the evidence obtained from his cell phone should be suppressed because the warrant lacked particularity in violation of the Fourth Amendment. According to the Defendant, the lack of particularity allowed law enforcement to search broad categories of information without temporal limitation, and law enforcement delayed the search for 47 days after the seizure before concluding its search. The government responded that the warrant was sufficiently particular because it specified the offenses for which there was probable cause, the warrant defined the place to be searched as Defendants cell phone , and it defined the types of information in connection with the suspected offenses sought from the cell phone. As for the lack of temporal restrictions, the government argued that this did not render a warrant invalid per se and the government was justified due to the scope of conduct under investigation. Finally, the government stated that the delay was not unreasonable as it was executed within the time constraints of Federal Rule of Criminal Procedure 41.

After explaining the general rule for particularity of warrants under the Fourth Amendment, Judge Arterton applied the rule in the context of electronic devices. She stated that courts must be attuned to the technological features unique to digital media as a whole and to those relevant in a particular case.Id. at *3 (quotingUnited States v. Ganias, 824 F.3d 199, 213 (2d Cir. 2016)). She further stated that a warrant may therefore be broad in that it authorizes the government to search an identified location or object for a wide range of potentially relevant material, without violating the particularity requirement.Id. (quotingUnited States v. Ulbricht, 858 F.3d 71, 102-03 (2d Cir. 2017)).

Judge Arterton concluded that the warrant, while broad, did not lack particularity in terms of the data to be searched, pointing to the attachments to the warrant as support. She stated that the first attachment clearly specified the property to be seized as well as the appropriate time and place such seizure may occur. The second attachment limited the warrant to searching data that might reveal evidence that Defendant violated the drug trafficking offenses for which he was a suspect and listed the categories of data that might have revealed this evidence. This included photographs and videos, encrypted communications, contact lists, and notes, records, ledgers, and any documents indicative of drug trafficking.

Defendant argued that the warrant was still defective because it used the phrase any and all data throughout as to his specific criminal offenses and thus impermissibly authorized agents to access locations within his cell phone beyond the scope [of] their stated probable cause. As an example, Defendant contested the search of photographs, digital notes, and ledgers on his cell phone because no information from the investigation suggested that Defendant had any such documents indicative of drug activity on his phone. CitingUnited States v. Zemlyansky, Defendant argued that the juxtaposition of a few specific locations in the same warrant authorizing a widespread general search for any and all data risked confusing the searching agent.

Judge Arterton was unpersuaded, distinguishing the instant search warrant from the one inZemlyansky.Id. at *4;see U.S. v. Zemlyansky, 945 F. Supp. 2d 438, 460 (S.D.N.Y. 2013). First, the warrant inZemlyanskydid not direct the search officers to seize evidence related to or concerning any particular crime or type of crime and allowed officers to seize any cell phone found at a certain place of business that the officers believed could have been associated with unspecified criminal suspects.Id. (citingZemlyansky, 945 F. Supp. 2d at 456-459). TheZemlyanskywarrant also authorized officers to conduct boundless, discretionary searches of any electronic device found at that location.Id. (citingZemlyansky, 945 F. Supp. 2d at 458-459). Judge Arterton stated that the warrant at issue had a narrower scope, limiting the search to specific criminal offenses stored on a single device.

Judge Arterton continued that the phrase any and all data did not confer unlimited discretion for officers to search for irrelevant data. She stated that law enforcement had probable cause that Defendant used his cell phone to engage in a drug conspiracy and therefore a reasonable basis to expect the cell phone to have incriminating evidence in many different forms. Judge Arterton further stated that it will often be impossible to identify in advance the words or phrases that will separate relevant files or documents before the search takes place, because officers cannot readily anticipate how a suspect will store information related to the charged crimes.Id. (citingUlbricht, 858 F.3d at 102). The warrant limited officers to searching only the records and information in the cell phone that constitute evidence and instrumentalities of violations of [distribution of controlled substances, use of a communication faculty, and money laundering]. In areas where a specific criminal statute was not referenced, the warrant still referred to particular criminal conduct, showing that the whole search was based on suspicion of criminal activity and the searches were only pertaining to that activity.

Judge Arterton found that the lack of a time period restricting the relevant data to be searched did not invalidate the warrant because [w]hile the lack of temporal limitations in a warrant is considered in evaluating a warrants particularity, it is not the sole factor.Id. (citingUnited States v. Wey, 256 F. Supp. 3d 355, 388 (S.D.N.Y. 2017)). She added that the complexity and duration of the alleged criminal activities may diminish the significance of temporal restrictions. Therefore, while a specific timeframe would have been beneficial, its absence did not invalidate the warrant.

Judge Arterton next rejected Defendants argument that the search was unreasonably delayed. Defendant cited to authority from the Second Circuit suggesting that a monthlong delay to apply for a warrant exceeded what was ordinarily reasonable.Id. at *5. While Defendant argued that the issue in that case was the delay in searching a cell phone that had been seized, Judge Arterton disagreed, pointing out that the issue was seizing property pending the issuance of a search warrant.Id. (citingU.S. v. Smith, 967 F.3d 198, 205 (2d Cir. 2020)). She stated that Defendants reading of authority was incorrect and did not contemplate delays in searching a cell phone seized pursuant to a valid warrant.

Judge Arterton instead cited the requirements under Federal Rule of Criminal Procedure 41 that law enforcement must execute a warrant within 14 days. Regarding ESI, that time period referred to the seizure or on-site copying of the media or information and not to any later off-site copying or review.Id. (citing Fed. R. Crim. P. 41(e)(2)(B)). Further citing the 2009 Advisory Committee Notes, Judge Arterton explained that the rules acknowledged the need for officers to seize or copy the entire storage medium and review it later to determine what electronically storied information falls within the scope of the warrant.Id. (citing Fed. R. Crim. P. 42(e)(2)(B) advisory committees notes to the 2009 amendment). She pointed out that the Advisory Committee also noted that practical reality meant that a substantial amount of time could be involved in the forensic imaging and review of information. Judge Arterton stated that the Governments Rule 41 violation should not be remedied by suppressing evidence unless (1) there was prejudice in the sense that the search might not have occurred or would not have been so abrasive if the Rule had been followed, or (2) there is evidence of intentional and deliberate disregard of a provision in the Rule.

Judge Arterton stated that the affidavit supporting the search warrant included information about the amount of time the search would take and noted that the initial search of the cell phone took place the same day it was seized.Id. at *5. The government conducted a more thorough search when it deemed it technically practicable. On this basis, Judge Arterton found the delay reasonable, but even if it was not reasonable, the Defendant had not demonstrated prejudice or that it was the result of intentional and deliberate disregard of a provision in the rule. Therefore, suppression was not appropriate.

More here:
May's Notable Cases and Events in E-Discovery - Lexology

175 mineral blocks auctioned since 2015-16: Government – The New Indian Express

By PTI

NEW DELHI: A total of 175 mineral blocks have been auctioned across nine states in the country since 2015-16.

During last month, 20 mineral blocks were auctioned, which included three iron ore, three limestone, three bauxite and 10 manganese mines, according to mines ministry.

"Since the amendment to MMDR Act, 1957, a total of 175 mineral blocks have been auctioned so far across 9 states," the ministry said in its major highlights for the month of April.

While 10 mines were auctioned in Madhya Pradesh, eight blocks were auctioned in Andhra Pradesh and two in Andhra Pradesh.

Twenty-three notices inviting tenders were issued in Chhattisgarh, Karnataka, Rajasthan and Maharashtra.

The government had earlier said that amendment in mineral auction rules will encourage competition that will ensure more participation in the sale of blocks.

The ministry of mines had earlier notified the Minerals (Evidence of Mineral Contents) Second Amendment Rules, 2021 and the Mineral (Auction) Fourth Amendment Rules, 2021 to amend the Minerals (Evidence of Mineral Contents) Rules, 2015 (MEMC Rules) and the Mineral (Auction) Rules, 2015 (Auction Rules), respectively.

See original here:
175 mineral blocks auctioned since 2015-16: Government - The New Indian Express

New York Times Columnist Gail Collins Proposes a ‘Simple Battle’ To ‘Get Rid of the Guns’ – Reason

If we are "sick of massacres," says the headline over Gail Collins' latest New York Timescolumn, we should "get rid of the guns." Which guns? Collins herself is not sure. Sometimes she seems to be talking about the rifles that politicians call "assault weapons." She refers a few times to "assault rifles" and mentions "the infamous semiautomatic AR-15." But she also talks about banning "semiautomatic rifles" and "semiautomatics" in general, which are much broader categories that include many other commonly used guns.

As long as they do not have military-style features such as a folding stock, a pistol grip, or a threaded barrel, semi-automatic rifles are not covered by state "assault weapon" laws. The bill aimed at reviving the federal ban that expired in 2004 explicitly exempts dozens of semi-automatic rifles by name, and it applies to handguns only if they have specified characteristics such as a threaded barrel, a second pistol grip, or a barrel shroud.

Collins does not seem to understand any of this, which is both surprising and typical. It is surprising because Collins has worked at theTimes since 1995, oversaw the paper's editorial page for six years, and has frequently written about gun control. It is typical because Collins has repeatedly demonstrated that she is unfamiliar with the firearms she wants to ban and unwilling to think through the practical consequences of the policies she favors, both of which are common failings among gun control enthusiasts.

After the 2011 mass shooting in Tucson, Arizona, Collins expressed amazementat the idea that Americans have "a right to bear Glocks." She drew a distinction between the Glock 19 used by the Tucson shooter and "a regular pistol, the kind most Americans think of when they think of the right to bear arms." Unlike a "regular pistol," she explained, a Glock 19 "is extremely easy to fire over and over, and it can carry a 30-bullet clip."

Although Collins claims a Glock 19 is not "a regular pistol," it is one of the most popular handguns in the United States. And contrary to what she seems to think, all semi-automatic pistols fire at the same rate, and they typically accept magazines of various sizes.

In 2012, Collins described "assault weapons" as "guns that allow you to shoot off 100 bullets in a couple of minutes"i.e., about one round per second. That description would cover any semi-automatic firearm with a detachable magazine, including "regular" pistols as well as many of the rifles specifically exempted from the proposed federal ban on "assault weapons."

Three years later, Collins averred that "assault weaponsseem to be the armament of choice for mass shootings." Not according to a recent National Institute of Justice report on public mass shootings from 1966 through 2019, which found that 77 percent of the perpetrators used handguns. In the same column, Collins asserted that "semiautomatic weapons are totally inappropriate for either hunting or home defense," which would come as a surprise to the millions of Americans who use them for those purposes.

Collins continues her confusion in her latest column. She says Congress could "toughen background check laws" or "limit the sale of semiautomatics to people with hunting licenses"a puzzling suggestion in light of Collins' insistence that "semiautomatic weapons" are "totally inappropriate" for hunting. But Collins thinks it would be better to "just get rid of them."

There are a few problems with that proposal. Given how Collins has defined the guns she wants to eliminate, her ban would apply to a host of firearms "in common use" for "lawful purposes," which the Supreme Court has said are covered by the Second Amendment. The forbidden firearms would include most handguns, which the Court described as "the quintessential self-defense weapon."

Maybe Collins, when she refers to "semiautomatics," actually means the guns covered by the proposed federal "assault weapon" ban. But just as she does not understand how that category is defined, she does not seem to realize that the bill would not "get rid of" those firearms. Like the expired 1994 ban, it would allow current owners to keep them.

There are sound pragmatic reasons for that grandfather clause. Based on production and import data from 1990 through 2016, the National Shooting Sports Foundation estimated that Americans owned more than 16 million guns that politicians would classify as "assault weapons." That number surely is even bigger now than it was six years ago. Even if legislators shared Collins' disregard for property rights, the Second Amendment, and the Fourth Amendment, any attempt to confiscate all those weapons would be a practical and political nightmare.

At the same time, the fact that maybe 20 million "assault weapons" would remain in circulation even if Congress renewed the ban means they would still be available to mass shooters who wanted them. And since the definition of "assault weapons" is based on functionally unimportant features (another point Collins overlooks), murderers would still have plenty of equally lethal alternatives even if all those guns disappeared tomorrow.

Unfazed by these considerations, Collins thinks it is obvious that Congress should ban "semiautomatics," "semiautomatic rifles," "assault rifles," or whatever. The important thing, she says, is to "think positive" and fight "a simple battle."

Collins does concede that "getting rid of assault rifles won't solve the gun problem as long as people in many states are allowed to own pistols and carry them when they stroll about the town." In reality, "getting rid of assault rifles"whatever Collins thinks they are and however that would be accomplishedcannot reasonably be expected to have any meaningful impact on "the gun problem."

Leaving aside all the other problems with that plan, it would not affect the firearms that murderers (including mass shooters) overwhelmingly prefer. In 2019, according to the FBI's numbers, handguns accounted for more than 90 percent of the weapons used in gun homicides where the type of firearm was specified. Just 5 percent of those guns were rifles, only a subset of which would qualify as "assault weapons."

Since Collins is dismayed by the fact that Americans are "allowed to own pistols"(even the "regular" kind), it is not hard to imagine what she thinks the next step should be. A handgun ban would be not just flagrantly unconstitutional and politically impossible but also utterly impractical. In a country where civilians own more than 400 million firearms, with handguns being the most common kind, the idea is nothing but a fantasy.

The same could be said of pretty much everything that Collins says about gun control. She routinely substitutes emotion for logic, offers anecdotes instead of evidence, and makes wildly wrong factual assertions that could be corrected by a quick Google search. The fact that her astonishing sloppiness and magical thinking pass for policy analysis in a leading newspaper speaks volumes about the state of the gun control debate.

See more here:
New York Times Columnist Gail Collins Proposes a 'Simple Battle' To 'Get Rid of the Guns' - Reason