References
Ahu TM. Drone regulations and the Fourth Amendment rights: the interaction of state drone statutes and the reasonable expectation of privacy. 48 Colum. J. L. & Soc. Probs. 2015, Winter:265.
Alhogbani, A. (2014). Going dark: Scratching the surface of government surveillance. 23 CommLaw Conspectus 469.
Apple Legal Process Guidelines (2015). https://www.apple.com/privacy/docs/legal-process-guidelines-us.pdf, p. 9.
Apple Government Information Requests (2015). https://www.apple.com/privacy/government-information-requests/
Arizona v. Gant, 556 U.S. 332 (2009).
Atwood JR. The encryption problem: Why the courts and technology are creating a mess for law enforcement. 34 St. Louis U. Pub. L. Rev; 2015: .
Bitcoin fallacy led to Silk Road founder’s conviction. (2015, Feb. 5). CNN. http://money.cnn.com/2015/02/05/technology/security/bitcoin-silk-road/
California v. Ciraolo, 476 U.S. 207 (1986).
Chimel v. California, 395 U.S. 752 (1969).
Cupp v. Murphy, 412 U.S. 291 (1973).
del Carmen RV. Criminal procedure: law and practice. 9th ed Belmont, CA: Wadsworth; 2014.
Dow Chemical Co. v. United States, 476 U.S. 227 (1986).
Electronic Communications Privacy Act, 2015, 18 U.S.C. §§ 2701-2011.
FAA Modernization and Reform Act, 49 U.S.C. §§331–335 (2012).
Fed. R. Crim. Pro. 41.
Florida v. Jardines, 569 U.S. 1 (2013).
Florida v. Riley, 488 U.S. 455 (1989).
Galizio GJ. A digital albatross: Navigating the legal framework of domestic police drone technology versus privacy rights in Massachusetts and beyond. 20 Suffolk J. Trial & App. Adv. 2014:117.
Gierlack, K., Williams, S., LaTourrette, T., Anderson, J. M., Mayer, L. A., & Zmud, J. (2014). License plate readers for law enforcement: Opportunities and Obstacles. RAND Corporation. http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR467/RAND_RR467.pdf.
Hansen, M. (2015, Aug. 24). Police increasingly using stingray cell phone tracking technology to solve routine crimes. ABA Journal Tech Monthly. http://www.abajournal.com/news/article/police_increasingly_using_stingray_cellphone_tracking_technology_to_solve_r/
Illinois v. Andreas, 463 U.S. 765. (1983).
In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335. (11th Cir. 2012).
In re Grand Jury Subpoena to Sebastien Boucher, 2009 U.S. Dist. LEXIS 13006 (D. Vt. Feb. 19, 2009).
In re The Decryption of a Seized Data Storage System, Order Granting Ex Parte Request for Reconsideration of the United State’s Application Under the All Writs Act, No. 13-M-449 (E.D. Wisc. May 21, 2013).
Katz v. United States, 389 U.S. 347 (1967).
Kerr OS. Computer crime law. 3d ed St. Paul, MN: West Publishing; 2013.
Kerr, O. (2014a, Sept. 19). Apple’s Dangerous Game, The Volokh Conspiracy https://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/
Kerr, O. (2014b, Sept. 22), Apple’s Dangerous Game, part 2 The Strongest Counterargument, The Volokh Conspiracy https://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/
Kerr, O. (2014c, Sept. 22) Apple’s Dangerous Game, part 3 Where do you draw the line, and what’s the privacy tradeoff? https://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-3-where-do-you-draw-the-line-and-whats-the-privacy-tradeoff/
Koerner, M. R. (2015). Drones and the Fourth Amendment: Redefining expectations of privacy. 64 Duke L.J. 1129.
LaFave WR, Israel JH, King NJ, Kerr OS. Principles of criminal procedure: Investigation. 2d ed St. Paul, MN: West Publishing; 2009.
Larkin JED. Compelled Production of Encrypted Data, 14 Vand. J. Ent. & Tech. L. 2012:253.
Li V. Law enforcement’s latest highway tech speeds up info-gathering, but critics say it violates privacy. 100 ABA Journal. 2014, Oct:1.
Mapp v. Ohio, 367 U.S. 643 (1961).
Martin J. Lost on the Silk Road: Online drug distribution and the ‘cryptomarket.’. 14 Criminology & Criminal Justice. 2014;3:351–367.
Massachusetts v. Gelfgatt, 11 N.E. 3d 605 (MA, 2014).
McNeal G. Drones and aerial surveillance: Considerations for legislators. Center for Technology Innovation at Brookings. 2014, November.
Mincey v. Arizona, 437 U.S. 385 (1978).
Morrison CM. Note and Comment: Dr. Panopticon, or, how I learned to stop worrying and love the drone. 27 J. Civ. Rts. & Econ. Dev. 2015:747.
Neil, M. (2015, Sept. 4). DOJ says using stingrays to intercept cellphone calls requires warrant, unless exception applies. ABA Journal Tech Monthly, http://www.abajournal.com/news/article/doj_says_warrant_needed_to_use_stingrays_to_intercept_cellphone_calls_unles/?utm_source=maestro&utm_medium=email&utm_campaign=tech_monthly.
New Mexico v. Davis, 321 P.3d 955 (2014).
New York v. Davila, 27 Misc.3d 921; 901 N.Y.S.2d 787 (2010).
North Dakota v. Brossart, 32-2011-CR-00049, 00071 (Nelson County, N.D., August 1, 2012). https://www.nacdl.org/uploadedFiles/files/news_and_the_champion/DDIC/Brossart%20Order.pdf.
North Dakota v. Brossart, 858 N.W. 2d 275 (2015).
NPR Staff (May 25, 2014). ”Going Dark: The Internet Behind The Internet”. Retrieved 5 October 2015.
Oliver v. United States, 466 U.S. 170 (1984).
Olivito J. Beyond the Fourth Amendment: Limiting drone surveillance through the Constitutional right to informational privacy. 74 Ohio St. L. J. 2013;(4):670.
Pen Register Statute, 2015 18 U.S.C. §§ 3121-3127.
People v. Gall, 30 P.3d 145 (Colo. 2001) (en banc).
Peppet SR. Regulating the Internet of Things: First steps toward managing discrimination, privacy, security, and consent. 93 Texas L. Rev. 2014:85.
Rakas v. Illinois, 439 U.S. 129 (1978).
Riley v. California, 573 U.S. ___, 134 S. Ct. 2473 (2014).
Robbins v. California, 453 U.S. 420 (1981).
Rodriguez v. Georgia, 295 Ga. 362; 761 S.E.2d 19 (2014).
Silverthorne Lumber Co. v. United States, 251 U.S. 385 (1920).
Simon R. Wall Street Journal, Eastern edition. 2015, April 16: .
Smith v. Maryland, 442 U.S. 735 (1979).
Thompson II RM. Drones in domestic surveillance operations: Fourth Amendment implications and legislative responses. Congressional Research Service. 2013, April 3.
U.S. Constitution, amendment V.
United States Department of Justice (2009). Search and seizing computers and obtaining electronic evidence in criminal investigations. http://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf
United States v. Al-Marri, 230 F. Supp.2d 535 (S.D.N.Y. 2002).
United States v. Bradley, 488 Fed. App’x 99 (6th Cir. 2012).
United States v. Chadwick, 433 U.S. 1 (1977).
United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013).
United States v. David, 756 F. Supp. 1385 (D. Nev. 1991).
United States v. Doe, 465 U.S. 605 (1984).
United States v. Fisher, 425 U.S. 391 (1976).
United States v. Flores-Montano, 541 U.S. 149 (2004).
United States v. Fricosu, 841 F. Supp.2d 1232 (D. Colo. 2012); app. denied, Fricosu v. United States, 2012 U.S. App. LEXIS 3561 (10th Cir. Colo., Feb. 21, 2012).
United States v. Gorshkov, 2001 U.S. Dist. LEXIS 26306.(W.D. Wash. May 23, 2001).
United States v. Hubbell, 530 U.S. 27 (2000).
United States v. Jacobsen, 466 U.S. 109 (1984).
United States v. Jones, 565 U.S. ___, 132 S. Ct. 945 (2012).
United States v. Karo, 468 U.S. 705 (1984).
United States v. Kirschner, 823 F. Supp. 2d 665 (E.D. Mich. 2010).
United States v. Knotts, 460 U.S. 276 276 (1983).
United States v. Kyllo, 533 U.S. 27 (2001).
United States v. Lifshitz, 369 F.2d 173 (2d Cir. 2004).
United States v. Matlock, 415 U.S. 164 (1974).
United States v. Mitchell, 565 F.3d 13247 (11th Cir. 2009).
United States v. Robinson, 414 U.S. 218 (1973).
United States v. Ross, 456 U.S. 798 (1982).
United State v. Schandl, 947 F.2d 462 (11th Cir. 1991).
United States v. Segovia-Ayala, No. 14-cf-00167(01), 2015 U.S. Dist. LEXIS 21375 (W.D. La. Jan. 23, 2015).
United States v. White, 504 Fed. Appx. 168 (3d Cir. Nov. 15, 2012).
United States v. White, 2013 U.S. Dist. LEXIS 155407 (E.D. Pa. Oct. 30, 2013).
United States v. Williams, 592 F.3d 511 (4th Cir. 2010).
United States v. Wurie, 573 U.S. __, 134 S. Ct. 2473.(2014).
Van Brocklin, V. (2014, Aug. 20). Cell phone tracking by police: 2 key court decisions explained. http://www.policeone.com/legal/articles/7481685-Cell-phone-tracking-by-police-2-key-court-decisions-explained/.
Vance, Jr., C. R. “Going dark: encryption, technology, and the balance between public safety and privacy,” written testimony before the United Senate Committee on the Judiciary, Washington, DC, 7/8/2015.
Weber RH. Internet of things: privacy issues revisited. 31 Computer Law & Security Review. 2015:618.
Weeks v. United States, 232 U.S. 383. (1914).
Weiser B. Man behind Silk Road website is convicted on all counts. New York Times; 2015, Feb. 4.
Wiretap Act, 2015 18 U.S.C. §§ 2510-202.
Wisconsin v. Tate, 357 Wis.2d 172; 849 N.W.21d 798. (2014).