Posted on 01/18/2014 2:36:24 AM PST by BuckeyeTexan
WASHINGTON (Reuters) - The U.S. Supreme Court agreed on Friday to decide whether police can search an arrested criminal suspect's cell phone without a warrant in two cases that showcase how the courts are wrestling to keep up with rapid technological advances.
Taking up cases from California and Massachusetts arising from criminal prosecutions that used evidence obtained without a warrant, the high court will wade into how to apply older court precedent, which allows police to search items carried by a defendant at the time of arrest, to cell phones.
(Excerpt) Read more at ca.news.yahoo.com ...
I’d like to see a 48 hour GPS trail that Trayvon used up until his death. I’ll bet it placed him inside of some neighborhood homes. But we’ll never know because Attorney Crump had it erased.
IIRC, Trayvon Martin’s cell phone was double encrypted. It took 6 months to break the encryption on it...but they did. And then the judge ruled it couldn’t be used due to authentication issues.
The right to privacy applies only to the murder of the unborn, apparently.
You have the right to remain SILENT! Never, ever forget that.
Sometime after that, someone at the states attorneys office shipped Trayvon’s phone to a law enforcement agency in California for analysis. The agency was “seemingly able” to access the internal memory. The state refuses to give the defense any information as to who at the states attorneys office decided to do this, the name of the agency it was sent to, the identity of the analyst who obtained the data, or the results obtained.
After the unnamed agency returned the phone, during the first week of January, 2013, the state sent it to Cellebrite in New Jersey for analysis. Cellebrite also was able to access the internal memory, and the state provided the defense with the results on January 18. The defense says Cellebrite obtained an “enormous” amount of information from the internal memory. But, guess what's missing? All data for Feburary 26, the day/evening of the shooting.
That's an excerpt from the Talk Left blog. So, it was even more cunning than Crump’s shenanigans.
Not true. A hacker retrieved it and got a worse sentence than the actual rapist.
Probably. I don't know why they bother. That particular phrase has pretty much destroyed the 4th amendment already.
You must be thinking of a different case. In this case no hackers retrieved anything; therefore, nobody was prosecuted except the two rapists. Five others have recently been indicted by the grand jury regarding an elleged cover-up though.
If this is the Steubenville rape then its the right one...if not then its a different one.
Yes, the Steubenville case. No hackers hacked anything. Some tech savvy activists pulled youtube vids that the kids posted then deleted, but there is nothing illegal about that. When you put something on the Internet it’s always there. Our tech administrator is alleged to have tried to delete info off of our school computers and will go to trial soon for that.
See Arizona v. Gant (2009).
The court limited the regularly abused “search incident to arrest” which was originally carved out as an exception to the warrant requirement to prevent the destruction of evidence or officer safety.
But the cops were arresting people for minor traffic violations or outstanding warrants for failure to pay tickets, etc. then searching everything in the car while the person is handcuffed in the back seat of the police car.
Scalia griped about the abuse of search incident (since the cops expanded it to situations where the rationale for the rule wasn’t implicated) since the late 80s. He was exactly right, and finally got a 5-4 majority in the above referenced case.
Now the facts must implicate the original basis for search incident to arrest, or the search must be an offense related search.
So, if one is arrested for running a stop sign and placed in the back of the patrol car, the cops can’t search everything in the car pursuant to the arrest.
It’s hard to imagine many stops where the contents of the phone should be subject to a warrantless search.
Either way, if I thought they might confiscate my phone I would probably go to settings and reset (erase) my phone.
I could always restore it later at home- that is if they gave me the phone back.
I would take this article with a grain of salt. First, the rapists have not had 1/3 of their sentences reduced. Richmond was just released, which is exactly one year. Mays has another year left, and if anything could serve more time. So that part of the article is incorrect. Second, Steubenville considers these two martyrs for going to jail. As far as the community is concerned, it is the victim’s fault and they were just boys being boys. In fact, after the verdict two additional students were arrested for using social media to harass and threaten the victim. If somebody had been arrested for releasing this info, it would have been celebrated throughout the city. It was not. We’ve never heard of this guy. Third, BCI admitted that nothing was hacked and that the released info was already posted by those involved and then taken down. You know Twitchy’s slogan: The Internet is forever.
Again, the only info released to the public was info posted on the Internet and then deleted or texts made public by those involved before arrests and warrants. None of this is illegal.
I would like to add that I will ask the detectives about this guy at church today. I’d like more info because if it’s true that he was arrested it’s very creepy we’ve never heard of it.
Thanks. My question may be moot. My wife works with internet security and she told me there is software that can crack a 4 digit pin in under a minute.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.