Archive for the ‘Fourth Amendment’ Category

The new Justice Department directive is garbage. Call your representative. – Washington Examiner

Congress must put an end to the Justice Department's flagrant disregard for the Fourth Amendment.

Attorney General Jeff Sessions signed an order this week making it easier for law enforcement officials to seize property from persons who have not even been charged with a crime.

"President Trump has directed this Department of Justice to reduce crime in this country, and we will use every lawful tool that we have to do that. We will continue to encourage civil asset forfeiture whenever appropriate in order to hit organized crime in the wallet," Attorney Jeff Sessions said Wednesday.

He added, "With this new policy, the American people can be confident knowing that we are taking action to defund criminals and at the same time protecting the rights of law-abiding people."

CBS News' Paula Reid explains how the newly announced DOJ policy, which marks a reverse of Obama-era restrictions, could help law enforcement officials get around state-level legislation meant to curb civil asset forfeiture:

24 states have passed laws limiting the practice, but local law enforcement can get around those restrictions by giving seized assets to the federal government instead of returning them to their owners. This practice is called "adoption" and it's been used to seize almost $1 billion in assets over the last decade.

It's bad enough that this entire practice is a clear violation of our Fourth Amendment right to be secure in our "persons, houses, papers, and effects, against unreasonable searches and seizures." But reversing previous civil asset forfeiture restrictions so that law enforcement agencies can skirt state laws goes far beyond bad.

If you're a conservative and you believe in personal property rights and the virtue of limited government, there's no defending a policy wherein law enforcement officials can work around local and state ordinances to seize an individual's property based entirely on suspicion.

That's some primo, grade-A garbage alright.

Congress has the power to rein in this Justice Department. Call your representative.

Originally posted here:
The new Justice Department directive is garbage. Call your representative. - Washington Examiner

Judge clears way for bloggers to sue Terrebonne sheriff – Houma Courier

Jennifer and Wayne Anderson of Houma sued Sheriff Jerry Larpenter after he searched their home and seized the family's computers and cellphones a year ago.

NEW ORLEANS -- A U.S. District Court judge cleared the way for a Terrebonne Parish blogger and her husband to sue Sheriff Jerry Larpenter for violations of her civil rights.

Jennifer and Wayne Anderson sued Larpenter after he searched their home and seized the family's computers and cellphones a year ago.

Larpenter ordered one of his detectives to secure a search warrant under the guise of a criminal defamation investigation into Jennifer Anderson's blog, "ExposeDAT."

Louisiana's criminal defamation statute was declared unconstitutional by the state Supreme Court decades ago as it pertains to elected officials.

Larpenter said he initiated the investigation after Houma insurance company owner Tony Alford filed a criminal complaint about ExposeDAT. The blog questioned the close ties between Alford, Larpenter and Terrebonne Parish President Gordon Dove.

At the time of the search and seizure, Anderson's true identity was not publicly known. She created ExposeDAT using the pseudonym John Turner.

While the judge who issued the search warrant found probable cause for the search, Louisiana's 5th Circuit Court of Appeal found it unconstitutional.

The Andersons filed a civil rights lawsuit in federal court against Larpenter, alleging the sheriff violated Jennifer's First Amendment right to free speech and Fourth Amendment protection against unlawful search and seizure and for malicious prosecution.

In a ruling filed Wednesday, U.S. District Judge Lance Africk denied Larpenter's motion to throw out the case in its entirety, allowing the constitutional claims to proceed.

But the judge dismissed the malicious-prosecution claim because Anderson was never formally prosecuted.

"Given the longstanding and robust constitutional protections afforded speech involving public officials (and speech involving public funds), it can be argued based on these allegations that Sheriff Larpenter acted with at least deliberate indifference to the risk that his actions would violate the Andersons constitutional rights," Africk wrote.

Larpenter has argued Anderson's blog targeted Tony Alford in his capacity as a businessman, not in his role as a member of Terrebonne Parish Levee Board. But like the state court, Africk found Alford is a public official and therefore Anderson's speech would be protected.

"Jennifer Andersons speech falls squarely within the four corners of the First Amendment," Africk wrote.

Wayne Anderson is a Houma Police officer. The day of the search he was placed on indefinite administrative leave. He then had medical problems that forced him off duty until last week.

The resulting scandal caused Jennifer Anderson to lose her job as well.

The order says Larpenter has argued there was no damage done to the Andersons because they got their phones and their computers back without them being searched.

But Judge Africk indicates in his order that the damage caused by sheriff's actions go beyond the alleged trampling of the Andersons' constitutional rights.

"That message if you speak ill of the sheriff of your parish, then the sheriff will direct his law enforcement resources toward forcibly entering your home and taking your belongings under the guise of a criminal investigation is inseparable from the injury and would certainly chill anyone ... from engaging in similar constitutionally protected speech in the future," Africk wrote.

View post:
Judge clears way for bloggers to sue Terrebonne sheriff - Houma Courier

How the Government Can Collect Your Personal Information Without a Warrant – TeenVogue.com

Earlier this year, President Trump took to Twitter to accuse President Obama of wiretapping Trump Tower, and followed up those claims by requesting an investigation. Former FBI director James Comey later testified that he had "no information" to support Trumps wiretapping claims but not long after, Trump doubled down on his attacks, accusing Susan Rice, former national security adviser to Obama, of illegally seeking and sharing intelligence information about Trumps associates. Though Rice did request to unmask some names in a classified foreign intelligence report that turned out to include Trump campaign and transition team members, she denies any wrongdoing, and theres no evidence that it was done for political reasons (versus legitimate intelligence purposes). Still, the whole saga does raise questions about how the American government can gather personal information about its citizens. There is a good point buried in all that, Neema Singh Guliani, ACLU legislative counsel, tells Teen Vogue . One of the things that is not inaccurate is that it is very easy for the government to get data about Americans.

And once the government has that information, Singh Guliani says, they can use it in various aways against individual Americans like singling out protestors , enforcing immigration laws , and prosecuting domestic crimes without revealing to those Americans how they got the information to begin with. Technically, under the Fourth Amendment , American citizens and resident non-citizens are protected against unreasonable searches and seizures including surveillance without warrants. So then how does the government get around that? Here are the basics on some of the key ways.

Via National Security Surveillance Authorities A few years ago, former NSA contractor Edward Snowden revealed documents detailing the NSAs extensive global surveillance program. And among the millions of communications intercepted by the U.S. government targeting foreigners for national security purposes, The Washington Post later found , nearly half of what they looked at included information marked as that of American citizens or residents. And thats currently allowed, under Section 702 of the Foreign Intelligence Surveillance Act (FISA), which allows the government to target communications of non-U.S. persons outside the U.S. without a court order or warrant (though it does require the approval of a FISA court). Though Section 702 cant legally be used to target Americans, it doesnt entirely prevent incidental collection of Americans' communications. For example, if the government is intercepting a foreign phone call and someone in the U.S. is on the other end of it, thats allowable because the American wasnt the one being targeted, according to the ACLU.

Similarly, Executive Order 12333 allows the government to gather communications and data abroad sans warrant, which it can then share with other government agencies and if Americans information is incidentally caught in the crosshairs, thats OK, too. But it gets hairy when you consider that the government could hold onto that incidental information and potentially use it for purposes, like those stated above, that have nothing to do with national security. I think the average person thinks incidental means accidental, Singh Guliani says. Well, thats actually not true at all. What it actually means is the government fully knows its going to collect the information of Americans and has procedures that allow the government to actually use that information once they collect it. The government is justifying meeting low standards, like not getting an individualized court warrant in some cases because the people theyre surveilling are overseas, when really they know theyre going to collect information about people in the U.S. and they fully intend to use that information.

Theres a chance some of this could change in the very near future, though: Section 702 is set to expire this year, and Congress will have to decide whether or not to reauthorize it. That said, though both President Trump and Vice President Pence have spoken out against government surveillance in the wake of Trumps wiretapping accusations, Trump seemed to oppose surveillance reform while on the campaign trail, as have both attorney general Jeff Sessions and CIA director Mike Pompeo .

At the borders So, those Fourth Amendment rights we mentioned earlier? They dont provide so much protection at the borders of the country. The border search exception means that border officials can search anyone entering the country, including U.S. citizens, without a warrant or even probable cause. Though the Electronic Frontier Foundation (EFF) notes that the exception only applies to routine searches (like of luggage) that dont impact a person's "dignity and privacy," officials argue that digital devices are fair game at the border. The government has taken the position [that they] can search your stuff at the border, Singh Guliani says. That mightve made sense when all you carried was a suitcase, but if youve got your laptop and your phone, thats the equivalent of two truckloads worth of paper.

The issue gets even hairier when you consider that other government agencies outside of U.S. Customs and Border Protection (CBP), which do require warrants to search your devices, can then access the information obtained in the border exception searches and potentially use it for other law enforcement agendas and gathering intelligence, rather than to enforce customs and immigration laws. (The ACLU does offer some tips to protect your information, like storing your sensitive data securely in the cloud and keeping it off of the devices youre traveling with.) Singh Guliani says there have been claims that CBP deliberately conducted searches on behalf of other agencies and that CBP "uses their border authority, even though actually the reason theyre stopping that person is because another federal agency just wants to get around the warrant requirement, she says. You have this idea that government agencies are deliberately taking advantage of these loopholes.

While American citizens cant be denied entry into the country for refusing to unlock or provide passwords for their devices, that refusal could ultimately mean your device will get seized for weeks (or longer), or you could be detained longer than you otherwise would. If youre not a U.S. citizen, [its] much more complicated, because they can technically deny you entry into the country, so you can be turned around and sent back, Singh Guliani says.

Via electronic communications and devices Even aside from the border exception, the government could theoretically collect information on citizens through electronic devices, largely because the laws that would prevent it are too outdated. Our laws havent been updated to reflect new technologies, Singh Guliani says. So the laws that govern when the government can get your location information from your phone were written before [everyone had cell phones].

Because of that, theres a lot of gray area involved in what information the government can legally collect. For example, last year Singh Guliani testified before the House Committee on Oversight and Government Reform that the Department of Justice's position was that it was OK to collect cell site location information without a warrant and keep it for as long as seven months. And there are a lot of new issues around [for example] when you talk to your Alexa , what standards do they have to meet [to gather that information]?

And then theres the issue of the recent repeal of new FCC rules that would have prevented Internet service providers from seeing and selling consumers browser behavior without explicit consent. Although those measures technically only affect private Internet behavior, Paul Ohm, the faculty director of the Georgetown Center on Privacy and Technology wrote in a Washington Post op-ed that they could inspire the FBI to request information on personal Internet behavior from ISPs, knowing that the providers have the access. And the outdated laws, as they stand, dont specifically prohibit that. (That said, per the op-ed, the FBI would still need a court order to make an ISP hand over website visit and app-use histories and a warrant to get information on content viewed.)

The Email Privacy Act bill, which is pending in the Senate, would address some of these issues and require law enforcement to obtain warrants before accessing electronic content, which could be a major win for privacy advocates.

In the meantime, Singh Guliani says, the best things concerned consumers can do are call their members of Congress and urge the representatives to pass surveillance reforms like the Email Privacy Act, as well as others that come down the pipe; take measures to protect your information; and find out as much as you can (by reading privacy policies or even asking) about how your information is being collected, stored, and shared by ISPs and other Internet services. Not only that, but I also think that consumers should target companies for their advocacy, she says. They should be going to Gmail and Facebook and saying, Look, we want you to be more vocal on surveillance reform. We want you to say that its important...and we want you in the interim to purge our information [and] promise not to turn over information about immigration status to the federal government unless youre served with a court order. These are things that companies can do and that consumers can pressure companies to do.

Related: Senate Votes for Internet Providers to Sell Browsing Data Without Customer Permission

Read more:
How the Government Can Collect Your Personal Information Without a Warrant - TeenVogue.com

Sessions to step up drug-war seizures – Politico

U.S. Attorney General Jeff Sessions on June 29, 2017 in Washington, DC. (Win McNamee/Getty)

Attorney General Jeff Sessions' methodical dismantling of the Obama administration's criminal justice policies is rolling forward Wednesday as the Justice Department announces plans to step up efforts to seize property and money suspected of being used in crime or obtained through illegal activity.

Sessions will encourage a return to broader use of a controversial type of asset forfeiture where local officials pull the feds into an investigation in order to ease the process of seizing assets from criminal suspects. Critics complain that the practice reverses the typical presumptions in the legal process by allowing law enforcement to take property without proving a crime occurred.

Story Continued Below

In many cases, suspects never challenge the seizure, but are also never convicted or even charged.

Sessions told a district attorneys conference in Minneapolis Monday: With care and professionalism, we plan to develop policies to increase forfeitures. No criminal should be allowed to keep the proceeds of their crime. Adoptive forfeitures are appropriate as is sharing with our partners."

Sign up for POLITICO Playbook and get the latest news, every morning in your inbox.

By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time.

Former Attorney General Eric Holder essentially abandoned the forfeiture practice in 2015, amid complaints that it was prone to abuse and encouraged police and sheriff's departments to carry out seizures in order to win more funds to buy equipment and vehicles. Holder allowed a heavily restricted version of the program to resume last year.

The new effort appears intent on returning the forfeiture program to its former glory, although officials emphasized that Sessions is implementing new safeguards that will make it more difficult to conduct seizures of less than $10,000 and will require more information from local officials about the basis for a seizure when no criminal charges were filed.

While other high-profile aspects of the Obama's administration's criminal justice reform drivesuch as shorter sentences for drug convictsreceived a mixed reception on Capitol Hill, the effort to limit asset forfeiture enjoyed enthusiastic support from an ideologically diverse group of lawmakers. The practice has long been a bugaboo for libertarian and conservative activists who view it as a short-cut around the Constitution's requirement that guilt be proven beyond a reasonable doubt.

Indeed, some Republican lawmakers were among the first to express alarm in advance of Sessions announcement. Rep. Darrell Issa of California noted that many states have taken steps to rein in such seizures, often requiring that they be linked to a criminal conviction, but the federal move amounts to an end-run around those efforts.

This is a troubling decision for the due process protections afforded to us under the Fourth Amendment as well as the growing consensus weve seen nationwide on this issue, Issa said. Ramping up adoptive forfeitures would circumvent much of the progress state legislatures have made to curb forfeiture abuse and expand a loophole thats become a central point of contention nationwide. Criminals shouldnt be able to keep the proceeds of their crime, but innocent Americans shouldnt lose their right to due process, or their private property rights, in order to make that happen."

Get breaking news when it happens in your inbox.

By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time.

While the issue has led to an unusual alliance between liberal Democrats and some staunch conservatives, the forfeiture practice has the enthusiastic backing of many local law enforcement officials, who see it as a vital lifeline for cash-strapped agencies. Those arguments have also found a receptive audience among some in Congress, particularly with those such as Sen. Jeanne Shaheen (D-N.H.) and former Sen. Kelly Ayotte (R-N.H.) who have been pressing for a more aggressive response to the opioid epidemic.

While forfeiture can take place in any kind of criminal investigation, the vast majority of the money and property seized through federal programs has stemmed from drug investigations and Sessions has said he is particularly eager to wield the tool against drug traffickers.

Missing out on the latest scoops? Sign up for POLITICO Playbook and get the latest news, every morning in your inbox.

Read this article:
Sessions to step up drug-war seizures - Politico

DOJ Tells Court There No Need To Establish A Warrant Requirement For Stingray Devices – Techdirt

The DOJ is in court arguing the use of Stingray devices by the FBI and local cops shouldn't require a warrant. The government's lawyers are fighting a suppression motion by Purvis Ellis, charged with racketeering and the attempted murder of a police officer.

The events of the case happened in 2013, two years before the DOJ instructed federal agents to seek warrants when deploying Stingrays. For this investigation, the Oakland PD used a pen register order, as was the style at the time. (And perhaps still is. Despite the DOJ's internal instructions, warrant requirements are all but nonexistent when it comes to local law enforcement agencies' use of cell tower spoofers.)

As Cyrus Farivar points out, the PD's Stingray couldn't locate Ellis, so it brought in the FBI. All without warrants and all without informing the defense about the additional Stingray deployment.

Ellis was located in an East Oakland apartment several hours after a January 2013 shooting with the help of two stingrays. Prosecutors initially insisted that only one stingray was used, but, as was revealed last summer, that turned out not to be the case. The Oakland Police Department's own stingray was seemingly insufficient, so officers then called in the FBI, both times without a warrant.

The defendant is arguing the multiple warrantless Stingray deployments violated the Fourth Amendment. Considering the devices coax a location signal out of phones by aping cell towers, this differentiates Stingrays from more passive collections -- like the pen register the government didn't actually use.

The government, quite obviously, is arguing otherwise. It points out in its opposition motion [PDF] that it has all the warrant exceptions on its side:

Four gang members ambushed a young man in broad daylight, shooting him through the forehead from close range. The next day, those same men jumped, pistol-whipped and shot a police officer investigating the prior days shooting. The suspects then fled, armed with their own arsenal, as well as with the guns they had just stolen from the officer. Police surrounded the apartment complex where the men were thought to be hiding. Finding them quickly was essential. By shooting two people in a 27-hour period, the suspects including the defendant Purvis Ellis had just demonstrated an ability and willingness to kill others. So, when officers used a cell site simulator (CSS) to find Ellis, they were entirely justified by the exigent circumstances presented, rightly believing him to be armed and dangerous.

The defendants motion to suppress is meritless. The courts have not definitively decided whether use of a CSS constitutes a search triggering Fourth Amendment protections. But it largely does not matter here, since exigent circumstances amply supported a warrantless use of the device.

[...]

Other exceptions to the warrant requirement also cut against suppressing evidence. For instance, the officers acted in good faith reliance on established law the pen register statute, Supreme Court precedent, even the FBI policy at the time. Those laws and policies, combined with the dearth of binding case law on the CSS, all justified using the device without a warrant. In addition, the officers would have inevitably discovered everything they ultimately did, even had they never used the CSS. After all, they had the building surrounded by dozens of officers and SWAT team members hours before the CSS was even deployed.

It's a long list of counterarguments, most of which have some validity in this particular case. (That, of course, doesn't stop the government from using the same arguments in cases where its assertions of good faith, exigency, etc. are far more questionable. But that's how lawyering works on both sides.)

It appears the government would rather the court didn't make a determination as to whether Stingray deployments are Fourth Amendment searches. The government lets the court know what it doesn't need to do to resolve this issue in the DOJ's favor:

Whether use of a cell site simulator constitutes a search for Fourth Amendment purposes is not necessarily a question this Court needs to answer, since even if it were a search, it was amply justified under the circumstances. That said, the law supports concluding that the device in this case did not affect a search.

The following argument, however, is particularly disingenuous. The defendant argued the warrant was invalid because officers didn't let the judge know they'd be deploying a Stingray device when it got its pen register order approved. The DOJ says this shouldn't matter, as it can find very little pre-2013 evidence suggesting these devices were mentioned in previous court documents.

Since the CSS technology was still relatively new in 2013, there were simply no binding cases to direct agents and officers to disregard Smith v. Maryland and get a warrant. According to the governments research, only a few federal pre-2013 cases referenced cell site simulator, digital analyzer, triggerfish, or stingray in a relevant context. (The government found no such cases in California courts.)

Well, of course this search came up empty. For years, the FBI swore law enforcement agencies to secrecy if they acquired Stingrays, telling them to dismiss cases rather than have defendants, judges, or even some prosecutors discuss the tech in open court. The lack of DOJ search results means the NDAs the FBI forced everyone to sign worked.

By no means was CSS technology "relatively new" in 2013. Documentation of Stingray devices can be found dating back to 2006 and use of pre-Stingray "digital analyzers" dates back more than 20 years. There wasn't much courtroom discussion because the FBI actively prevented it from happening. And the DOJ knows this, as its "research" likely turned up things like this 2012 NDA on DOJ letterhead telling a New York sheriff's office to STFU about its new toy.

With no discussion, there are no binding cases. That's how the FBI wanted it. And it pays off years down the road by making it easier for the DOJ to prevail in a suppression argument without setting precedent it may find inhibiting another half-decade down the road.

See original here:
DOJ Tells Court There No Need To Establish A Warrant Requirement For Stingray Devices - Techdirt