Lorem ipsum dolor sit amet, consectetur adipiscing elit. Maecenas ultrices mi velit, sit amet malesuada elit venenatis et.
Sed condimentum sodales justo, a molestie tortor mattis ut. Cras ornare rutrum lorem, a auctor sem hendrerit ac.
Quisque auctor eros eu dui pretium condimentum in in leo. Phasellus interdum tellus in elementum maximus. Quisque
ut condimentum nulla. Nunc lorem ligula, vehicula id pretium ut, gravida sit amet nunc.
Nam gravida turpis a nulla vehicula fringilla. Nam a luctus augue, nec ultrices est. Proin a feugiat massa, id vulputate
metus. Mauris id lacinia elit, et lobortis sem. Sed quis diam pulvinar, egestas urna at, mattis odio. Phasellus bibendum
nulla vitae maximus imperdiet. Vestibulum ac quam volutpat, commodo enim id, molestie tortor. Morbi dapibus dapibus
ornare. Pellentesque quis massa tellus. In interdum in lacus nec fermentum. Nullam ullamcorper euismod justo at
dictum. Phasellus aliquet ultrices dolor, vel tempor diam convallis quis. Vestibulum hendrerit dignissim enim nec
dapibus. Integer volutpat congue tincidunt. Vestibulum sed nunc leo.
Morbi sed sapien vitae urna pretium dignissim eu at sapien. Aliquam eu nisl volutpat, commodo mauris sed, pharetra
ante. Nulla lobortis lectus ac sem imperdiet, at fringilla ante commodo. Aliquam sed ullamcorper nisl. Nullam sollicitudin
dolor purus, nec cursus mauris mattis quis. Pellentesque consectetur tellus vel nisi elementum volutpat. Suspendisse
sed dolor sit amet libero tincidunt congue. In egestas libero neque, vel cursus dui blandit vel.
Quisque sit amet venenatis eros. Nulla vulputate pulvinar mauris. Vestibulum pulvinar erat varius sem vestibulum, at
tristique nisl dapibus. Morbi hendrerit nisi malesuada, feugiat justo vitae, sagittis orci. Nam quis laoreet quam, a
faucibus risus. Morbi egestas molestie odio quis elementum. Suspendisse iaculis nisi id risus vehicula convallis. Donec
tincidunt congue fringilla.
Aliquam erat volutpat. Sed imperdiet augue sit amet eros rhoncus egestas. Mauris mauris nunc, scelerisque eu dapibus
nec, hendrerit a dolor. Duis vel nisl porttitor, dictum nulla id, molestie lacus. Nulla vehicula placerat justo, vel semper
metus luctus sed. Cras blandit ultrices ipsum sed facilisis. Maecenas varius eros orci, sed mollis arcu finibus eu. Nullam
ut quam ut lorem rutrum cursus non sed massa. Nunc sed sollicitudin orci. Integer libero tellus, iaculis in orci ut, ornare
vehicula ante.
Quisque sit amet venenatis eros. Nulla vulputate pulvinar mauris. Vestibulum pulvinar erat varius sem vestibulum, at
tristique nisl dapibus. Morbi hendrerit nisi malesuada, feugiat justo vitae, sagittis orci. Nam quis laoreet quam, a
faucibus risus. Morbi egestas molestie odio quis elementum. Suspendisse iaculis nisi id risus vehicula convallis. Donec
tincidunt congue fringilla.
Maecenas varius eros orci, sed mollis arcu finibus eu. Nullam ut quam ut lorem rutrum cursus non sed massa. Nunc sed
sollicitudin orci. Integer libero tellus, iaculis in orci ut, ornare vehicula ante.
Official Research Paper
Lorem Ipsum Research Paper Title
Lorem Ipsum Sub-Heading
115 West Allegan Suite 480 | Lansing, MI 48933 | crcmich.org pg. 1
3
PROPOSAL 20-2
Law enforcement agencies must comply with
specific procedures when investigating alleged
crimes. Specically, they must obtain a warrant if
the collection of evidence necessitates searching a
person, that person’s location, and specic items. A
valid search warrant must meet four requirements:
1. it must be led in good faith by a law enforcement
ocer;
2. it must be based on reliable information showing
probable cause to search;
3. it must be issued by a neutral and detached
magistrate; and
4. it must state specically the place to be searched
and the items to be seized.
3
The scope of what would currently be included
in a definition of electronic data and electronic
communications and covered by Proposal 2 is broad.
Obviously, electronic communications would
include email and text messages. Electronic data
would include user les related to word processing,
spreadsheets, pictures, accounting, and similar les
and images.
Electronic data and communications are very broad
categories, and law enforcement is able to dig deeply
into electronic devices to access other forms of electronic
data and communications, including: telephone call
records; participation in online chatrooms; Internet
search histories; IP addresses; location data; and the
time and length of use of individual apps.
As technology evolves, new forms of data and
communications also may fall within the bounds of the
proposed language. Just as the terms and concepts
mentioned above would have been alien to citizens
adopting the 1963 Constitution, law enforcement and
the courts 20 or 30 years from now may wrestle with
access to forms of electronic data and communications
that seem farfetched to us today.
Even though electronic data and communications
are not explicitly recognized in the U.S. Constitution,
aspects of them have been protected by a rigorous
vetting processes requiring law enforcement to obtain
warrants. For the most part, electronic information is
considered an “eect” in the language of the Fourth
Amendment, and it is widely analogized as closed
containers by the federal courts.
b
4
Congress has enacted several laws applying to Fourth
Amendment protections and the need for search
warrants. Among these are the Pen Registers and
Trap and Trace Device Statute that restricts collection
of metadata concerning telephone and Internet
communications.
5
The Electronic Communications
Privacy Act protects email and other subscriber data
stored by Internet service providers from disclosure
without appropriate warrants.
6
Just as is the case for tangible evidence, statutes and
case law require warrants for electronic information to
be specic in the desired evidence and its location.
7
For example, in United States vs Carey, some
evidence was suppressed because searchers went
beyond the scope of their warrant when gathering
evidence from the defendant’s computer.
8
Even with electronic data and communications
already being protected without explicit reference
to it in the Fourth Amendment, some grey area
still exists with regard for searching and seizing
electronic information. For instance, while the U.S.
Supreme Court decision in Carpenter v. United
States (2018) held that the government violated the
Fourth Amendment by accessing historical records
containing the physical locations of cellphones
without a search warrant, it has not yet addressed
how to handle email communications.
9
“Electronic data” could refer solely to content or it could mean
both content and metadata. Content is whatever is found
on drives or les, email messages, or other electronic data.
Metadata is information that is related to this content. As an
analogy, when sending a letter to someone, the content would
be the written letter and the metadata would be the address
of the recipient; or in an electronic context, content might
be the contents of an electronic le, and the corresponding
metadata would be the le’s size, date of creation, date of
last edit, and so on.
b
As it relates to the Fourth Amendment, the courts have dier-
entiated items in plain view from those contained in closed con-
tainers. In overly simplied terms, identifying property in plain
view involves no invasion of privacy, but property in closed con-
tainers is generally assumed to be private.