Archive for the ‘Fourth Amendment’ Category

Court Tells Child Sexual Abuse Investigators That The Private Search Warrant Exception Only Works When There’s A Private Search – Techdirt

from the thus-answering-the-question-'when-is-a-search-not-a-search' dept

Private searches that uncover contraband can be handed off to law enforcement without the Fourth Amendment getting too involved. Restrictions apply, of course. For instance, a tech repairing a computer may come across illicit images and give that information to law enforcement, which can use what was observed in the search as the basis for a search warrant.

What law enforcement can't do is ask private individuals to perform searches for it and then use the results of those searches to perform warrantless searches of their own. A Ninth Circuit Appeals Court case [PDF] points out another thing law enforcement can't do: assume (or pretend) a private search has already taken place in order to excuse its own Fourth Amendment violation. (h/t Rianna Pfefferkorn)

Automated scanning of email attachments led to a series of events that culminated in an unlawful search. Here's the court's description of this case's origination:

The events giving rise to Luke Wilsons conviction and this appeal were triggered when Google, as required by federal law, reported to the National Center for Missing and Exploited Children (NCMEC) that Wilson had uploaded four images of apparent child pornography to his email account as email attachments. No one at Google had opened or viewed Wilsons email attachments; its report was based on an automated assessment that the images Wilson uploaded were the same as images other Google employees had earlier viewed and classified as child pornography. Someone at NCMEC then, also without opening or viewing them, sent Wilsons email attachments to the San Diego Internet Crimes Against Children Task Force (ICAC), where an officer ultimately viewed the email attachments without a warrant. The officer then applied for warrants to search both Wilsons email account and Wilsons home, describing the attachments in detail in the application.

You can see where things went wrong: the warrantless search engaged in by the officer to view images neither of the other parties had actually opened or inspected. Apparently, Fourth Amendment violations are standard practice at the San Diego ICAC.

NCMEC then forwarded the CyberTip to the San Diego Internet Crimes Against Children Task Force (ICAC). Agent Thompson, a member of the San Diego ICAC, received the report. He followed San Diego ICAC procedure, which at the time called for inspecting the images without a warrant whether or not a Google employee had reviewed them.

A footnote attached to this paragraph states the new "standard procedure" is to obtain a warrant before opening a CyberTip "when the provider has not viewed the images." The court notes it is "not clear from the record" that this is standard practice at other ICAC offices, or whether they've also been instructed to obtain warrants first from now on. So, more challenges are likely on the way.

The lower court refused to suppress the evidence obtained from Wilson's email account and home, deciding the private search that had never actually occurred was a private search, salvaging the warrantless search that immediately followed the forwarding of the tip by NMCEC.

The Appeals Court disagrees.

First, the government search exceeded the scope of the antecedent private search because it allowed the government to learn new, critical information that it used first to obtain a warrant and then to prosecute Wilson. Second, the government search also expanded the scope of the antecedent private search because the government agent viewed Wilsons email attachments even though no Google employeeor other personhad done so, thereby exceeding any earlier privacy intrusion. Moreover, on the limited evidentiary record, the government has not established that what a Google employee previously viewed were exact duplicates of Wilsons images. And, even if they were duplicates, such viewing of others digital communications would not have violated Wilsons expectation of privacy in his images, as Fourth Amendment rights are personal.

Matching hashes is not enough. And that's all Google and NMCEC had when they forwarded the tip down the line to law enforcement. Just because both entities retain hashes (NMCEC retains images as well) that matched the hashes of the attachment doesn't mean there's no subjective expectation of privacy in one's own email account. A strong probability that the files were child porn is the perfect basis for a warrant request. Unfortunately, the officer decided to engage in a search without one.

Wilson did not have an expectation of privacy in other individuals files, even if their files were identical to his files. The corollary of this principle must also be true: Wilson did have an expectation of privacy in his files, even if others had identical files. If, for example, police officers search someone elses house and find documents evidencing wrongdoing along with notes indicating that I have identical documents in my house, they cannot, without a warrant or some distinct exception to the warrant requirement, seize my copies. I would retain a personal expectation of privacy in them, and in my connection to them, even if law enforcement had a strong basis for anticipating what my copies would contain. A violation of a third partys privacy has no bearing on my reasonable expectation of privacy in my own documents. The government does not argue otherwise.

All of the evidence is suppressed, since it all relies on the initial lawless search. The ICAC in San Diego has, belatedly, put a warrant requirement in place. It won't salvage this conviction, which has been reversed. And it may result in similar suppressions and reversals if the same search-first procedure was used in other child porn cases. But it's always easier to bypass the warrant and get to the searching. After all, not every court will see the facts the same way, as is evidenced by the lower court's refusal to suppress the evidence. But it's now crystal clear in the Ninth Circuit: get a warrant.

Thank you for reading this Techdirt post. With so many things competing for everyones attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise and every little bit helps. Thank you.

The Techdirt Team

Filed Under: 4th amendment, child sexual abuse materials, scanning, warrant

Read more:
Court Tells Child Sexual Abuse Investigators That The Private Search Warrant Exception Only Works When There's A Private Search - Techdirt

Napolitano: On Jan. 6, what did the FBI know? – The Winchester Star

The New York Times recently reported that the FBI had an undercover informant amid the mob that entered the U.S. Capitol on Jan. 6 who had related to them his knowledge of the demonstrators' plans beforehand and his observations of events in the building in real time. The informant was a genuine member of the Proud Boys, one of the groups the feds are trying to charge with conspiracy to overthrow the government.

According to the Times, the informant told the FBI in advance that there was no plan by his colleagues to disrupt the government. He also reported violence and destruction in the Capitol to his FBI handler as it was happening, and the FBI did nothing timely to stop it.

The presence of the informant as a de facto federal agent at the scene before, during and after the commission of what the government considers to be serious felonies raises serious constitutional questions about the FBI's behavior. The feds have not revealed the existence or identity of this informant; rather, the Times' reporters found out about him and found another person to corroborate what they learned that he did.

Can the government insert a person into a group under criminal investigation -- or "flip" a person who is already in the group -- and use him for surveillance without a search warrant? And, when they do this, must prosecutors tell defense attorneys about their informant, particularly if his knowledge and observations are inconsistent with the government's version of events?

Here is the backstory.

The Fourth Amendment to the Constitution was written to protect the quintessentially American right to be left alone. It was enacted in the aftermath of egregious violations of colonial privacy by British soldiers and agents.

The typical violation of privacy came in the form of British soldiers knocking on the door of a colonial home -- or breaking it down -- bearing a general warrant. A general warrant, issued by a secret court in London or by colonial courts here whose judges were loyal to the king, permitted the bearer to search wherever he wished and seize whatever he found.

The Fourth Amendment was ratified to force the government to focus its searches on evidence of crimes for which the government had probable cause, and to protect the privacy and security of "persons, houses, papers, and effects" by requiring search warrants before the government could invade any of them.

The warrants must be issued by a neutral judge, must be based on probable cause of crime sworn to under oath, and must specifically describe the place to be searched and the person or things to be seized.

In the early 1960s, the Supreme Court realized that the use of electronic surveillance was just as much a search as a physical search, and it required search warrants for the government to be able to use at trial whatever it learned from the surveillance. This is universally accepted today as the contemporary understanding of the Fourth Amendment. Yet, it applies only to searches by government agents or their use of evidence obtained from electronic surveillance. It does not pertain to informants.

Stated differently, the feds and the states need search warrants to bug your bedroom, your office or your cellphone, but they do not need a search warrant to threaten, bribe or employ your neighbor or colleague or brother-in-law to engage you in a conversation about personal behavior and then report the contents of that conversation to them.

The government's argument is that you have waived your right to privacy by trusting the person to whom you were speaking, and that waiver obviates the need for a search warrant.

But the use of an informant can be as invasive as the use of a wiretap. Because the informant is usually capable of getting in the face of the person being surveilled, his presence is a direct violation of the Fourth Amendment's protection of "persons." Since the informant can often prod the person to say what he might not say if unprodded, the use of informants is arguably more invasive of privacy and hence more violative of the Fourth Amendment than a wiretap silently recording a conversation.

Now back to Jan. 6 at the Capitol. The Department of Justice requires approval by FBI management before an agent can engage an informant. Thus, senior FBI personnel knew that a trusted member of the Proud Boys trusted by the Proud Boys and by the FBI had advised one of their agents that the group had no plans for violence or disruption of a governmental function. We also know that senior FBI personnel knew that personal injury and property damage were happening at the Capitol and they did nothing to stop it.

The Times reporters promised anonymity to their sources. But their identity is now of paramount importance to some of the folks whom the FBI has arrested and whom federal prosecutors have charged with felonies. If the feds have an eyewitness who works for them -- even though his presence at the scene was unconstitutional -- and whose testimony contradicts the prosecutors' narrative, the feds have a moral and legal obligation to reveal all this to defense counsel.

Who knows what the FBI knew of Jan. 6 ahead of time and did nothing or why it conveniently looked the other way during the events in the Capitol? We do know that every FBI agent and federal prosecutor has taken an oath to uphold the Constitution, whether convenient or not.

The Fourth Amendment is the framers' value judgement that the privacy of all persons is a greater moral good than the government's convenience. It is an intentional obstacle to law enforcement to keep it respectful of our rights. Why do we hire the FBI to protect our safety but permit it to invade our liberty?

Judge Andrew Napolitano's column is syndicated by Creators.

View post:
Napolitano: On Jan. 6, what did the FBI know? - The Winchester Star

Belligerent Boss of an NYPD Union Resigns After His Home Is Raided by FBI – New York Magazine

Photo: Lev Radin/Pacific Press/LightRocket via Getty Images

Ed Mullins, the controversial head of one of the largest cop unions in New York City and a bitter foe of police reform, resigned from his position as Sergeants Benevolent Association president following early-morning FBI raids on his office and home on Tuesday.

Federal agents hit the Manhattan headquarters of the Sergeants Benevolent Association and Mullinss home on Long Island, according to the New York Post, in what the FBI said was part of an ongoing investigation that the Post said involves accusations of mail and wire fraud. Agents seized computer gear from his residence, per the Post, and were seen carting off boxes of documents from SBA headquarters. The SBA did not respond to a request for comment.

The SBA is the second-largest of the citys five police unions, which represent the citys nearly 35,000 officers, including Mullins, who is a sergeant. He was elected president of the SBA in 2002 and has been a thorn in the side of four commissioners, Bill Bratton, the police commissioner under both Bill de Blasio and Rudy Giuliani, told New York last year. On Tuesday night, the SBA announced that Mullins had resigned upon request by the unions executive board:

The New York Daily News reports that Mullins officially filed for retirement Wednesday after turning in his gun and badge. Sgt. Vincent Vallelong, previously the SBAs vice president, will now take over as president.

Mullins has frequently made offensive comments on race and crime, once comparing an arrested NFL player to a wild animal. Many of these comments came from the official SBA Twitter account, which Mullins controls, and included calling Representative Richie Torres a first class whore and Dr. Oxiris Barbot, then the citys health commissioner, a bitch.In another, the Civilian Complaint Review Board is called a disgrace for a tweet reminding New Yorkers about their Fourth Amendment rights, which protect them from unlawful search and seizure. Last year, the SBA account posted the arrest report on Chiara de Blasio, the mayors daughter, which included personal information such as her birth date and home address.

Earlier this year, the CCRB recommended three misconduct charges against Mullins: two counts of offensive language for the comments against Torres and Barbot and one count of abuse of authority for the arrest report. Last month, Mullins was put on trial in a departmental hearing on the charges.

Daily news about the politics, business, and technology shaping our world.

See the rest here:
Belligerent Boss of an NYPD Union Resigns After His Home Is Raided by FBI - New York Magazine

US Government orders Google to TRACK users who search certain terms sparking fears innocent people will b… – The Sun

PRIVACY experts are concerned the US government is overreaching by secretly issuing warrants for Google to turn over a person's search terms.

Federal investigators are pursuing so-called "keyword warrants" and getting Google to provide information based on anyone who searched a victim's name or their address during a particular year, according to a court document that was mistakenly unsealed in September.

1

The revelation came in a 2019 federal case in Wisconsin where investigators pursuing men they suspected were trafficking and sexually abusing a minor who had gone missing.

The investigators approached Google to supply information on anyone who used their search engine to type in the victims name, two spellings of her mothers name and her address over 16 days that year, according to Forbes.

Authorities being able to access peoples searches is concerning to privacy experts who fear they could breach of Fourth Amendment protections from unreasonable searches.

Trawling through Googles search history database enables police to identify people merely based on what they might have been thinking about, for whatever reason, at some point in the past, surveillance and cybersecurity counsel at the American Civil Liberties Union Jennifer Granick told Forbes.

Google didnt deny the searches and claimed they were fairly supportive of both law enforcement and protected individual rights.

Exclusive

Revealed

As with all law enforcement requests, we have a rigorous process that is designed to protect the privacy of our users while supporting the important work of law enforcement, a Google spokesperson said.

While the Silicon Valley tech giant responds to thousands of warrant orders every year, the governments keyboard warrants are a new and potentially controversial pursuit.

The document was also unredacted, meaning the accidental unsealing published the kidnapping victims name, her Facebook profile, her phone number and address - a potential breach of a minors privacy, according to Forbes.

Aside from the Wisconsin sex abuse case, which has since been sealed, Forbes was able to find at least one other instance where a keyword warrant was sought.

That case occurred in the Northern District of California in December 2020, but unlike the Wisconsin case, the document was sealed.

That order is listed in the docket as: Application by the United States for a Search Warrant for Google Accounts Associated with Six Search Terms and Four Search Dates, according to Forbes.

Following the publication of Googles keyboard warrants article, Jennifer Lynch, surveillance litigation director at the Electronic Frontier Foundation (EFF), detailed three other Google keyword warrants.

She found they involved an investigation into serial Austin bombings in 2018, which resulted in the deaths of two people.

Also, Google is not the only company serving up such information to law enforcment agencies.

Both Yahoo and Microsoft appear to have supplied the similar search data in two cases, Forbes reported.

Just last month, Google was under pressure to explain is method of providing location data to law enforcement in an attempt to catch criminals.

Authorities were able to seek a geofence warrant' that puts Google on the clock to hand over a persons data.

Google reported it fielded 11,554 geofence location warrants from law enforcement last year.

It said 8,396 had been requested in 2019.

Police in Gainesville, Florida turned to Google to Google supply intel about a man called Zachary McCoy after they determined his routine bike ride had him passing through a crime scene.

McCoy was received an alarming email from Google in January 2020 informing him that the police had requested his user data.

He had seven days to go to court if he wanted to block the release of his Google data.

He learned that the case involved a burglary that had happened at a home on his bike route that particular day in 2019.

Police had obtained McCoy's Google location data at the time through a geofence warrant.

The connection between his location and the site of the crime meant the police wanted to access more data about McCoy.

We pay for your stories!

Do you have a story for The US Sun team?

Go here to read the rest:
US Government orders Google to TRACK users who search certain terms sparking fears innocent people will b... - The Sun

Jury sides with man shot by officer in 2013, awards him more than $2.4 million – 9News.com KUSA

Michael Valdez filed a lawsuit in 2015 after he was shot twice in 2013 following a police chase.

DENVER A Denver jury awarded more than $2.4 million to a man who was shot by a Denver Police (DPD)officer in 2013, court records show.

According to the verdict form, the jury said Sgt. Robert Motyka should pay $131,000 in damages and that the city and county of Denver should pay $2.4 million. That decision was made on Sept. 23 in connection with a civil lawsuit filed by Michael Valdez in 2015.

The jury found Denver liable for a failure to train and found that Motyka used excessive force which violated Valdezs Fourth Amendment rights.

That lawsuit named Motyka, four other officers, and the city of Denver as defendants.

>The video above contains a report from the day of the shooting in 2013.

On Jan. 16, 2013, Valdez was at a store when an acquaintance named John Montoya, offered him a ride home in his red Dodge pick-up, which offer Valdez accepted, according to the lawsuit.

Valdez sat in the middle of the cab section of the truck. Two other men were located by the passenger window of the truck and in the bed of the truck; a female passenger was seated with Valdez in the middle of the cab section.

According to the lawsuit, Valdez did not know that Montoya and his vehicle were wanted by DPD for an incident earlier that morning. At some point during the ride DPD officers began chasing the truck, the lawsuit says.

At least one of the vehicle's occupants fired shots at bystanders and officers during the chase, according to prior 9NEWS reporting. Motyka was hit in the shoulder and wounded, Montoya was fatally shot by officers.

Ultimately the pick-up truck crashed into a tree near the intersection of West 39th and Osage streets in Denver, the suit says and Montoya and several passengers got out.

Valdez initially stayed inside, the lawsuit says, but eventually exited with his hands up the lawsuit says.

While on the ground with his face in the grass and his hands extended overhead, Valdez was shot by officers, the lawsuit says. He was hit once in his back and once to his fourth finger as he tried to shield his head from gunshots, the lawsuit says.

In addition, the lawsuit says, police pursued charges against Valdez which were ultimately dismissed by the District Attorney.

9NEWS has reached out to the city attorney's office but has not yet heard back, but a spokesperson told our partners at the Denver Gazette that they're reviewing the case to determine next steps.

SUGGESTED VIDEOS:Latest from 9NEWS

Visit link:
Jury sides with man shot by officer in 2013, awards him more than $2.4 million - 9News.com KUSA