•  
  •  
 

Abstract

This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.

References

Adams, Devin M. "The 2016 Amendments to Criminal Rule 41: National Search Warrants to Seize Cyberspace, Particularly Speaking." University of Richmond Law Review 51, no. 3 (March 2017): 727-72.

Altman, Roy K. "The Case for Incident-to-Arrest Searches of Cell Phones." Criminal Justice 29, no. 1 (Spring 2014): 28-29.

Anderson, Jose Felipe. "Privacy, Technology and the Fourth Amendment: The Future and the Shock." Widener Commonwealth Law Review 29, no. 1 (2020): 43-68.

Aucoin, Kaleigh E. "The Spider's Parlor: Government Malware on the Dark Web." Hastings Law Journal 69, no. 5 (June 2018): 1433-69.

Barrett, Lindsey. "Carpenter's Consumers." Washburn Law Journal 59, no. 1 (Winter 2020): 53-86.

Becker, Keith, and Ben Fitzpatrick. "In Search of Shadows: Investigating and Prosecuting Crime on the Dark Web." United States Attorney's Bulletin 66, no. 1 (January 2018): 41-47.

Bell, Charles M. "Surveillance Technology and Graymail in Domestic Criminal Prosecutions." Georgetown Journal of Law & Public Policy 16, no. 2 (Summer 2018): 537-58.

Belonick, Paul. "Transparency Is the New Privacy: Blockchain's Challenge for the Fourth Amendment." Stanford Technology Law Review 23, no. 1 (Winter 2020): 114-81.

Black, Nicole. "SCOTUS Holds Privacy Expectation for Geolocation Data." Michigan Lawyer's Weekly, August 27, 2018.

Bloch-Wehba, Hannah. "Transparency after Carpenter." Washburn Law Journal 59, no. 1 (Winter 2020): 23-34.

Bohannon, Gina R. "Cell Phones and the Border Search Exception: Circuits Split over the Line between Sovereignty and Privacy." Maryland Law Review 78, no. 3 (2019): 563-603.

"The Border Search Muddle." Harvard Law Review 132, no. 8 (June 2019): 2278-2299

Brannon, Melody J. "Carpenter v. United States: Building a Property-Based Fourth Amendment Approach to Digital Data." Criminal Justice 33, no. 3 (Fall 2018): 20-26.

Brief in Amici Curiae Electronic Frontier Foundation, American Civil Liberties Union, and American Civil Liberties Union of New Jersey, State of New Jersey v. Andrew Roberts (2019), Docket No. A-0291-17T4

Byrne, Richard E., II. "NIT vs. TOR: A Struggle for the Right to Internet Anonymity." University of Baltimore Law Review 47, no. 3 (Summer 2018): 413-38.

Caldwell, Leslie R. "Ensuring Tech-Savvy Criminals Do Not Have Immunity from Investigation." DoJ - Office of Public Affairs (blog). Entry posted November 21, 2016. Accessed September 8, 2020. https://www.justice.gov/archives/opa/blog/ensuring-tech-savvy-criminals-do-not-have-immunity-investigation.

———. "Rule 41 Changes Ensure a Judge May Consider Warrants for Certain Remote Searches." Cyber Crime (blog). Entry posted June 20, 2016. Accessed August 31, 2020. https://www.justice.gov/archives/opa/blog/rule-41-changes-ensure-judge-may-consider-warrants-certain-remote-searches.

Capra, Daniel. "Authenticating Digital Evidence." Baylor Law Review 69, no. 1 (2017): 1-55.

Carpenter v. United States, 138 S. Ct. 2206 (June 22, 2018).

Chase, Aaron. "Secure the Smartphone, Secure the Future: Biometrics, Boyd, a Warrant Denial and the Fourth and Fifth Amendments." Hastings Race and Poverty Law Journal 17, no. 2 (Summer 2020): 577-604.

Clarifying Lawful Overseas Use of Data Act, H.R. 4943, 115th Cong., 2d Sess. (as referred to House Committee, Feb. 6, 2018).

Clarke, Kamari Maxine, and Sara Kendall. "The Beauty Is That It Speaks for Itself: Geo-spatial Materials as Evidentiary Matters." Law Text Culture 23 (2019): 91-118.

Cohen, Aloni, and Sunoo Park. "Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries." Harvard Journal of Law & Technology 32, no. 1 (Fall 2018): 169-234.

Commonwealth v. Gelfgatt, 468 Mass. 512, 11 N.E.3d 605 (2014)

Commonwealth v. Baust, 89 Va. Cir. 267 (Cir. Ct. 2014)

Cope, Sophia, Adam Schwartz, and Saira Hussain. "Federal Judge Issues Historic Opinion for Digital Privacy at the Border." Electronic Frontier Foundation. Last modified November 15, 2019. Accessed July 31, 2020. https://www.eff.org/deeplinks/2019/11/federal-judge-issues-historic-opinion-digital-privacy-border.

Cushing, Tim. "Another Florida Appeals Court Says Compelled Passcode Production Violates the Fifth Amendment." Techdirt (blog). Entry posted September 4, 2020. Accessed September 8, 2020. https://www.techdirt.com/articles/20181028/19163640931/florida-appeals-court-says-producing-passwords-is-testimonial-protected-fifth-amendment.shtml.

———. "Feds Also Using 'Reverse Warrants' to Gather Location/Identifying Info on Thousands of Non-Suspects." Techdirt (blog). Accessed 2018. https://www.techdirt.com/articles/20181027/08301740920/feds-also-using-reverse-warrants-to-gather-location-identifying-info-thousands-non-suspects.shtml.

———. "Judge Says FBI's NIT Warrant Invalid, Points out FBI Agent Knew It Was Invalid When He Requested It." Techdirt (blog). Entry posted April 7, 2017. Accessed September 8, 2020. https://www.techdirt.com/articles/20170331/16305737053/judge-says-fbis-nit-warrant-invalid-points-out-fbi-agent-knew-it-was-invalid-when-he-request%E2%80%A6.

———. "Secret Service Latest to Use Data Brokers to Dodge Warrant Requirements for Cell Site Location Data." Techdirt (blog). Entry posted August 24, 2020. Accessed September 8, 2020. https://www.techdirt.com/articles/20200820/13395145155/secret-service-latest-to-use-data-brokers-to-dodge-warrant-requirements-cell-site-location-data.shtml.

Daskal, Jennifer. "Rule 41 Has Been Updated: What's Needed Next." Just Security (blog). Entry posted December 5, 2016. Accessed October 7, 2020. https://www.justsecurity.org/35136/rule-41-updated-needed/.

DeLorimer, Andrea. "Flying in the Face of Suspicionless Cell Phone Searches: Fourth Circuit Grants Airline Passengers Heightened Protection from Searches by Customs Officers." Journal of Air Law and Commerce 84, no. 1 (2019): 127-34.

de Zayas, Daniel. "Carpenter v. United States and the Emerging Expectation of Privacy in Data Comprehensiveness Applied to Browsing History." American University Law Review 68, no. 6 (August 2019): 2209-56.

Dixon, Judge Herbert B., Jr. "Technology and the Courts: A Futurist View." Judges' Journal 52, no. 3 (July 2013): Online. Accessed September 9, 2020. https://www.americanbar.org/groups/judicial/publications/judges_journal/2013/summer/technology_and_the_courts_a_futurist_view/.

———. "The Wonderful and Scary Internet of Things." Judges' Journal 56, no. 3 (Summer 2017): 36-39.

Dougherty, Taylor. "A Constitutional Case of Heartburn." Campbell Law Observer (blog). Entry posted February 27, 2017. Accessed September 23, 2020. http://campbelllawobserver.com/a-constitutional-case-of-heartburn/.

Editors. "Criminal Procedure - Fourth Amendment - Ninth Circuit Limits the Scope of Warrantless Cell Phone Searches at the Border - United States v. Cano, 934 F.3d 1002 (9th Cir. 2019)." Harvard Law Review 133, no. 8 (June 2020): 2635-42.

Electronic Frontier Foundation. "Federal Court Rules Suspicion less Searches of Travelers' Phones and Laptops Unconstitutional." News release. November 12, 2019. Accessed July 31, 2020. https://www.eff.org/press/releases/federal-court-rules-suspicionless-searches-travelers-phones-and-laptops.

———. "The Playpen Cases: Frequently Asked Questions." Electronic Frontier Foundation. Last modified November 18, 2019. Accessed October 7, 2020. https://www.eff.org/pages/playpen-cases-frequently-asked-questions.

———. "With Rule 41, Little-Known Committee Proposes to Grant New Hacking Powers to the Government." Electronic Frontier Foundation. Last modified April 30, 2016. Accessed August 31, 2020. https://www.eff.org/deeplinks/2016/04/rule-41-little-known-committee-proposes-grant-new-hacking-powers-government.

Elm, Donna Lee. "Geofence Warrants: Challenging Digital Dragnets." Criminal Justice 35, no. 2 (Summer 2020): 7-13.

Engle, Nicholas. "Computer Crimes." American Criminal Law Review 57, no. 3 (Summer 2020): 459-512.

EPIC Staff. "EPIC - State v. Andrews." Electronic Privacy Information Center. Last modified August 10, 2020. Accessed August 17, 2020. https://epic.org/amicus/fifth-amendment/andrews/.

Federal Bureau of Investigation. "'Playpen' Creator Sentenced to 30 Years." FBI – News and Features. Last modified May 15, 2017. Accessed November 9, 2020. https://www.fbi.gov/news/stories/playpen-creator-sentenced-to-30-years.

Federal Rules of Criminal Procedure, C.F.R. (2018). Accessed October 1, 2020. https://www.uscourts.gov/sites/default/files/criminal-rules-procedure-dec2017_0.pdf.

Federal Rules of Criminal Procedure, 41 C.F.R. § Search and Seizure (2016).

Federal Rules of Evidence, 902 C.F.R. § Evidence That Is Self-Authenticating (2016).

Foster, Michael A. Catch Me If You Scan: Constitutionality of Compelled Decryption Divides the Courts. Issue brief no. LSB10416. Washington, DC: Congressional Research Service, 2020.

G.A.Q.L. v. State, 43 Fla. L. Weekly 2389 (Dist. Ct. App. 2018)

Gallini, Brian. "Alex Levin & the Fourth Amendment's Exclusionary Rule." Faculty Lounge (blog). Entry posted October 28, 2019. Accessed September 8, 2020. https://www.thefacultylounge.org/2019/10/alex-levin-the-fourth-amendments-exclusionary-rule.html.

Garcha, Rupinder K. "Nits a No-Go: Disclosing Exploits and Technological Vulnerabilities in Criminal Cases." New York University Law Review 93, no. 4 (October 2018): 822-63.

Gomez, Ashley N. "Over the Border, under What Law: The Circuit Split over Searches of Electronic Devices on the Border." Arizona State Law Journal 52, no. 1 (Spring 2020): 279-310.

Gray, David. "A Right to Go Dark." SMU Law Review 72, no. 4 (Fall 2019): 621-88.

Grimm, Paul W., Daniel J. Capra, and Gregory P. Joseph. "Authenticating Digital Evidence." Baylor Law Review 69, no. 1 (Winter 2017): 1-55.

Grosdidier, Pierre. "Using Your Mind?: The Fragmented Case law over Gaining Access to Password-Protected Devices." Texas Bar Journal 83, no. 2 (February 2020): 92.

Hannon, Michael J. "Increasingly Important Requirement: Authentication of Digital Evidence." Journal of the Missouri Bar 70 (November/December 2014): 314-23.

Hegarty, R. C., D. J. Lamb, and A. Attwood. "Digital Evidence Challenges in the Internet of Things." Proceedings of the Ninth International Workshop on Digital Forensics and Incident Analysis, May 2015, 163-72.

Hennessey, Susan. The Elephant in the Room: Addressing Child Exploitation and Going Dark. Aegis Paper Series 1701. Stanford, CA: Hoover Institution, 2017.

Horne, Rachel Beavers. "A Ride on Horseback Is Materially Indistinguishable from a Flight to the Moon: Analogizing Searches of Digital Data at the Border." Houston Law Review 57, no. 1 (Fall 2019): 203-26.

Hill, Gerald, and Kathleen Hill. "Probable Cause." The People's Law Dictionary. Last modified 2020. Accessed October 19, 2020. https://dictionary.law.com/Default.aspx?selected=1618.

Illman, Erin Jane. "Data Privacy Laws Targeting Biometric and Geolocation Technologies." The Business Lawyer 73, no. 191 (Winter 2017-2018): 2-6.

Katz v. United States, 389 S. Ct. 347 (Dec. 18, 1967).

Kerr, Orin. "The Fifth Amendment Limits on Forced Decryption and Applying the 'Foregone Conclusion' Doctrine." Washington Post (Washington, DC), June 7, 2016, online edition, The Volokh Conspiracy. Accessed September 25, 2020. https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/06/07/the-fifth-amendment-limits-on-forced-decryption-and-applying-the-foregone-conclusion-doctrine/.

Kerr, Orin S. "Compelled Decryption and the Privilege against Self-Incrimination." Texas Law Review 97, no. 4 (March 2019): 767-800.

Kerr, Orin S., and Bruce Schneier. "Encryption Workarounds." Georgetown Law Journal 106, no. 4 (April 2018): 989-1020.

Kirkham, Thomas J. "Rejecting Historical Cell Site Location Information as Unreliable under Daubert and Rule 702." University of Toledo Law Review 50, no. 2 (Winter 2019): 361-94.

Krause, Jason. "IT'S LOCATION, LOCATION ...: Some Consider Geolocation Technology a Way to Settle Internet Disputes." ABA Journal 91, no. 18 (January 2005).

Lanterman, Mark. "Digital Evidence: New Authentication Standards Coming." Bench & Bar of Minnesota 74 (August 2017): 12-13.

Lerner, Zack. "A Warrant to Hack: An Analysis of the Proposed Amendments to Rule 41 of the Federal Ruled of Criminal Procedure." Yale Journal of Law and Technology 18 (2016): 26-29.

Levy, Michael L., and John M. Haried. "Practical Considerations When Using New Evidence Rule 902(13) to Self-Authenticate Electronically Generated Evidence in Criminal Cases." DOJ Journal of Federal Law and Practice 67, no. 1 (February 2019): 81-96.

Lewis, James A., Denise E. Zheng, and William A. Carter. The Effect of Encryption on Lawful Access to Communications and Data. Washington, DC: Center for Strategic & International Studies, 2017.

Locascio, Louis. "Give Us Your Cell Phone Password and Constitutional Rights, Please." New Jersey Law Journal 226, no. 38 (September 21, 2020): 43. Accessed September 23, 2020. https://www.law.com/njlawjournal/2020/09/18/give-us-your-cell-phone-password-and-constitutional-rights-please/.

Lynch, Jennifer. "Courts Grapple with a Sea Change in Fourth Amendment Law after Carpenter v US: Year in Review 2019." Electronic Frontier Foundation. Last modified December 29, 2019. Accessed July 31, 2020. https://www.eff.org/deeplinks/2019/12/courts-grapple-sea-change-fourth-amendment-law-after-carpenter-v-us-year-review.

———. "EFF Files Amicus Brief Arguing Geofence Warrants Violate the Fourth Amendment." Electronic Frontier Foundation. Last modified July 2, 2020. Accessed July 31, 2020. https://www.eff.org/deeplinks/2020/07/eff-files-amicus-brief-arguing-geofence-warrants-violate-fourth-amendment.

Mak, Aaron. "Close Enough." Electronic Frontier Foundation. Last modified February 19, 2019. Accessed July 31, 2020. https://slate.com/technology/2019/02/reverse-location-search-warrants-google-police.html.

McAleenan, Kevin. Border Search of Electronic Devices. Publication no. 3340-049A. Washington, DC: U.S. Customs and Border Protection, 2018.

McCarthy, Justin. "One in Five U.S. Adults Use Health Apps,Wearable Trackers." News release. December 11, 2019. Accessed September 16, 2020. https://news.gallup.com/poll/269096/one-five-adults-health-apps-wearable-trackers.aspx.

McDonald, Laura W., David Tait, Karen Gelb, Meredith Rossner, and Blake M. McKimmie. "Digital Evidence in the Jury Room: The Impact of Mobile Technology on the Jury." Current Issues in Criminal Justice 27, no. 2 (November 2015): 179-94.

Meade, Chloe. "The Border Search Exception in the Modern Era: An Exploration of Tensions between Congress, the Supreme Court, and the Circuits." Boston University Journal of Science and Technology Law 26, no. 1 (2020): 189-222.

Mercke, Bryan. "Dicing the Onion: An Analysis of Trans-Jurisdictional Warrants regarding Anonymous Cyber Crimes." University of Louisville Law Review 56, no. 3 (2018): 437-62.

Metz, Howard. "Your Device Is Disabled: How and Why Compulsion of Biometrics to Unlock Devices Should Be Protected by the Fifth Amendment Privilege." Valparaiso University Law Review 53, no. 2 (Winter 2019): 427-66.

Meyers, Roslyn. "Synopsis of 'Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors.'" Family and Intimate Partner Violence Quarterly 2, no. 4 (Spring 2010): 361-67.

Mitchell, Joe, and Shawn Webb. "Is Big Brother Watching Us: The Evolving State of the Law on Cell Phone, Digital Evidence, and Privacy." Hennepin Lawyer 88, no. 1 (January/February 2019): 14-17.

Mizrahi, Sarit K. "The Dangers of Sharing Cloud Storage." Tulane Journal of International and Comparative Law 25, no. 2 (Spring 2017): 303-53.

Moccia, Steven. "Bits, Bytes, and Constitutional Rights: Navigating Digital Data and the Fourth Amendment." Fordham Urban Law Journal 46, no. 1 (February 2019): 162-216.

Morgan, Brendan. "Ensuring Admissibility of Mobile Evidence in Court." Federal Lawyer 62 (March 2015): 66-69.

NALCD. Compelled Decryption Primer. Washington, DC: National Association of Criminal Defense Lawyers, 2019.

Napier, Haley. "Carpenter v. United States: The Stored Communications Act Is Not a Permissible Mechanism to Obtain Data from Smart Home Devices." University of Dayton Law Review 45, no. 1 (Winter 2020): 163-88.

Nelson, Sharon, and John Simek. "Finding Wyatt Earp: Your Digital Forensics Expert." Res Gestae 60 (June 2017): 19-22.

Ng, Alfred. "Geofence Warrants: How Police Can Use Protesters' Phones against Them." CNet. Last modified June 16, 2020. Accessed August 17, 2020. https://www.cnet.com/news/geofence-warrants-how-police-can-use-protesters-phones-against-them/.

Novak, Martin. "Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration." Journal of Digital Forensics, Security and Law 14, no. 4 (April 2020): 1-41. Accessed September 16, 2020. http://commons.erau.edu/jdfsl/vol14/iss4/3.

O'Dorisio, Roderick. "'You've Got Mail!' Decoding the Bits and Bytes of Fourth Amendment Computer Searches after Ackerman." Denver Law Review 94, no. 4 (2017): 651-80.

O'Grady, Sean. "All Watched over by Machines of Loving Grace: Border Searches of Electronic Devices in the Digital Age." Fordham Law Review 87, no. 5 (April 2019): 2255-84.

Ohm, Paul. "The Investigative Dynamics of the Use of Malware by Law Enforcement." William & Mary Bill of Rights Journal 26, no. 2 (December 2017): 303-36.

Owsley, Brian L. "Network Investigative Source Code and Due Process." Digital Evidence and Electronic Signature Law Review 14 (2017): 39-46.

Parmley, Suzette. "'Private Enclave'? Supreme Court Deciding Whether Cellphone Passcodes Are Protected." New Jersey Law Journal Online (January 22, 2020). Accessed August 17, 2020.

———. "Why Cellphone Passwords, per Divided NJ High Court, Are Not 'Contents of One's Mind.'" New Jersey Law Journal Online (August 11, 2020). Accessed August 17, 2020. https://www.law.com/njlawjournal/2020/08/11/why-cellphone-passwords-per-divided-nj-high-court-are-not-contents-of-ones-mind/.

Pew Research Center. "Mobile Fact Sheet." Internet and Technology. Last modified June 22, 2019. Accessed September 25, 2020. https://www.pewresearch.org/internet/fact-sheet/mobile/.

Plus Media Solutions. "Challenging Government Hacking: What's at Stake." US Official News (London, UK), November 2, 2017.

Priester, Benjamin J. "A Warrant Requirement Resurgence: The Fourth Amendment in the Roberts Court." St. John's Law Review 93, no. 1 (2019): 89-140.

Protecting Data at the Border, S. 1606, 116th Cong., 1st Sess. (as referred to Senate Committee, May 22, 2019).

The Protecting Data at the Border Act, S. 1606, 116th Cong., 1st Sess. (May 22, 2019).

Rangaviz, David Rassoul. "Compelled Decryption & State Constitutional Protection against Self-Incrimination." American Criminal Law Review 57, no. 1 (Winter 2020): 157-206.

Rauschecker, Markus. "Rule 41 Amendments Provide for a Drastic Expansion of Government Authority to Conduct Computer Searches and Should Not Have Been Adopted by the Supreme Court." Maryland Law Review 76, no. 4 (2017): 1085-101.

Reitinger, Nathan. "Faces and Fingers: Authentication." Journal of High Technology Law 20, no. 1 (2020): 61-81.

Russell, Zoe. "First They Came for the Child Pornographers: The FBI's International Search Warrant to Hack the Dark Web." St. Mary's Law Journal 49, no. 1 (2017): 269-316.

"Senate Geolocation Bills Aim to Clarify Legal Framework on Tracking." Washington Internet Daily 12, no. 116 (June 16, 2011).

Seo v. State, 109 N.E.3d 418 (Ind. Ct. App. 2018)

Silbert, Sarah. "All the Things You Can Track with Wearables." Lifewire, July 8, 2019. Accessed September 16, 2020. https://www.lifewire.com/what-wearables-can-track-4121040.

Simchi-Levi, Yuval. "Search Warrants in the Digital Age." Hofstra Law Review 47, no. 3 (Spring 2019): 995-1010.

Sobel, Nathaniel. "Do Geo-Fence Warrants Violate the Fourth Amendment." Law Fare (blog). Entry posted February 24, 2020. Accessed July 31, 2020. https://www.lawfareblog.com/do-geofence-warrants-violate-fourth-amendment.

———. "The Massachusetts High Court Rules That State Can Compel Password Decryption in Commonwealth v. Jones." Law Fare (blog). Entry posted April 24, 2019. Accessed July 31, 2020. https://www.lawfareblog.com/massachusetts-high-court-rules-state-can-compel-password-decryption-commonwealth-v-jones.

Soder, Michael. "A Constitutional Limbo: Searches of Electronic Devices at the International Border." University of Cincinnati Law Review 88, no. 1 (2019): 239-72.

State v. Andrews, 2020 N.J. LEXIS 898 (Aug 10, 2020)

State v. Diamond, 905 N.W.2d 870; (Jan 17, 2018)

State v. Compton, No. CR2016-12-1826 (Ohio Ct. C.P. Butler Cty. May 5, 2017)

State v. George Steven Burch, Brown County District Court, 2016CF001309 (Aug 19, 2018)

Statista. "Number of Smartphone Users from 2016 to 2021." Statista. Last modified November 2020. Accessed November 19, 2020. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/.

Statista. "Wearables." Statista. Last modified September 2020. Accessed November 9, 2020. https://www.statista.com/outlook/319/109/wearables/united-states#market-users.

Tapp, Katherine E. "Smart Devices Won't Be Smart until Society Demands an Expectation of Privacy." University of Louisville Law Review 56, no. 1 (2017): 83-112.

Tashea, Jason. "Warranted Searches: Changes in Rule 41 Could Expand the Government's Investigative Net." ABA Journal 103, no. 6 (June 2017): 16-18.

Thomas, Ashley. "No Place to Hide: Private Implications of Geolocation Tracking and Geofencing." SciTech Lawyer 16, no. 2 (Winter 2020): 20-23.

Thomson Reuters. "Reasonable Suspicion." FindLaw Legal Dictionary. Last modified 2020. Accessed October 19, 2020. https://dictionary.findlaw.com/definition/reasonable-suspicion.html.

Thompson, Richard M., II, and Chris Jaikaran. Encryption: Selected Legal Issues. Issue brief no. R44407. Washington, DC: Congressional Research Service, 2016.

Turner, Ash. "Number Of Smartphone & Mobile Phone Users Worldwide." Bank My Cell (blog). Entry posted November 2020. Accessed November 19, 2020. https://www.bankmycell.com/blog/how-many-phones-are-in-the-world.

United States v. Carpenter, 819 F.3d 880 (6th Cir. Apr. 13, 2013).

United States v. Cotterman, 709 F.3d 952 (9th Cir. Mar. 8, 2013).

United States v. Doe (In re Grand Jury Subpoena Duces Tecum), 670 F.3d 1335 (11th Cir. Feb. 23, 2012).

United States v. Kolsuz, 890 F.3d 133 (4th Cir. May 9, 2018).

United States v. Levin, 874 F.3d 316 (1st Cir. Oct. 27, 2017).

United States v. Touset, 890 F.3d 1227 (11th Cir. May 23, 2018).

U.S. Customs and Border Patrol. "On a Typical Day in Fiscal Year 2019." U.S. Customs and Border Protection Agency. Last modified April 15, 2020. Accessed November 19, 2020. https://www.cbp.gov/newsroom/stats/typical-day-fy2019.

Valentino-DeVries, Jennifer. "Tracking Phones, Google Is a Dragnet for the Police." New York Times (New York, NY), April 13, 2019, interactive edition.

van der Meulen, Rob. "Gartner Says 8.4 Billion Connected 'Things' Will Be in Use in 2017, up 31 Percent from 2016." News release. February 7, 2017. Accessed September 16, 2020. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016.

Vogles, Emily A. "About One-in-five Americans Use a Smart Watch or Fitness Tracker." Factank (blog). Entry posted January 9, 2020. Accessed September 16, 2020. https://www.pewresearch.org/fact-tank/2020/01/09/about-one-in-five-americans-use-a-smart-watch-or-fitness-tracker/.

Warren Communications News. "Senate Geolocation Bills Aim to Clarify Legal Framework on Tracking." Washington Internet Daily 12, no. 116 (June 16, 2011): 1-2.

Weaver, Nicholas. "The End of the NIT." Lawfare (blog). Entry posted December 5, 2016. Accessed August 28, 2020. https://www.lawfareblog.com/end-nit.

Weidman, Maureen. "Jurisdiction, the Internet, and the Good Faith Exception: Controversy over the Government's Use of Network Investigative Techniques." Dickinson Law Review 122, no. 3 (Spring 2018): 967-96.

Widenhouse, Kurt C. "Playpen, the NIT, and Rule 41(b): Electronic Searches for Those Who Do Not Wish to Be Found." Journal of Business and Technology Law 13, no. 1 (2017): 143-69.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.