Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 296
» Latest member: acharlespetrvoz883
» Forum threads: 392
» Forum posts: 1,925

Full Statistics

Online Users
There are currently 6 online users.
» 0 Member(s) | 6 Guest(s)

Latest Threads
Daugherty A Theoretical F...
Forum: Main Board
Last Post: admin
Yesterday, 10:36 PM
» Replies: 8
» Views: 90
ISP AND FBI ARE IN CONTEM...
Forum: Main Board
Last Post: admin
03-18-2026, 09:12 PM
» Replies: 0
» Views: 8
THE ACLU SUCKS!!!
Forum: Main Board
Last Post: admin
03-18-2026, 09:11 PM
» Replies: 2
» Views: 13
Open webUI
Forum: AI Information
Last Post: admin
03-18-2026, 08:56 AM
» Replies: 0
» Views: 66
Some Math
Forum: Main Board
Last Post: admin
03-17-2026, 02:48 AM
» Replies: 0
» Views: 12
The Yellow Queen
Forum: Main Board
Last Post: admin
03-16-2026, 03:00 AM
» Replies: 0
» Views: 16
What is Silly Tavern?
Forum: AI Information
Last Post: admin
03-15-2026, 06:07 PM
» Replies: 0
» Views: 16
Been Busy
Forum: Main Board
Last Post: admin
03-14-2026, 03:59 PM
» Replies: 1
» Views: 18
Legal Update
Forum: Main Board
Last Post: admin
03-13-2026, 07:43 PM
» Replies: 0
» Views: 17
Server back up
Forum: Main Board
Last Post: admin
03-10-2026, 11:01 PM
» Replies: 0
» Views: 15

 
  Before one makes a comment
Posted by: admin - 08-16-2025, 02:48 PM - Forum: Main Board - Replies (1)

Read the motion to suppress  and know what's going on before posting.

Print this item

  Happy Birthday to my late cousin Alexei Romanov
Posted by: admin - 08-15-2025, 07:26 PM - Forum: Main Board - Replies (2)

Alexei was born August 12th, 1905, and died on July 16th, 1918. 

[Image: 529523429_1419164329627773_7962084636110709335_n.jpg]

Print this item

  Important from US v Winn 2015
Posted by: admin - 08-14-2025, 07:23 PM - Forum: Main Board - Replies (6)

D. Overbreadth and Particularity of the Search Warrant

Winn next argues that the search warrant violated the Fourth Amendment because it failed to state with particularity the items permitted to be seized (Doc. 22, pp. 6-8). It authorized the seizure of “any and all files” that constituted evidence of disorderly conduct which, according to Winn, essentially invited the police to conduct an illegal general search of his cell phone (Id.). The Court agrees with Winn on this point.

The Fourth Amendment prohibits general search warrants and requires that a warrant describe, with particularity, the place to be searched and the persons or things to be seized. U.S. Const, amend. IV. The purpose of the particularity, requirement is to “protect persons against the government’s indiscriminate rummaging through their property” and to “[prevent] the searching for and seizure of items that there is no probable cause to believe are either contraband or evidence of a crime” United States v. Jones, 54 F.3d 1285, 1289-90 (7th Cir.1995) (citing Coolidge v. New Hampshire, 403 U.S. 443, 467, 91 S.Ct. 2022, 29 L.Ed.2d 564 (1971)); United States v. Sims, 553 F.3d 580, 582 (7th Cir.2009) (citing Maryland v. Garrison, 480 U.S. 79, 84-85, 107 S.Ct. 1013, 94 L.Ed.2d 72 (1987)). “By limiting the authorization to search to the specific areas and things for which there is probable cause to search, the requirement ensures that the search will be carefully tailored to its justifications, and will not take on the character of the wide-ranging exploratory searches the Framers intended to prohibit.” Garrison, 480 U.S. at 84, 107 S.Ct. 1013; United States v. Vitek Supply Corp., 144 F.3d 476, 481 (7th Cir.1998) (“This requirement ... ensures that the scope of a search will be confined to evidence relating to a specific crime that is supported by probable cause.”)

To satisfy the particularity requirement, a warrant “must describe the objects of the search with reasonable specificity, but need not be elaborately detailed.” Vitek Supply Corp., 144 F.3d at 481. “In practice, courts have ... demanded that the executing officers be able *919to identify the things to be seized with reasonable certainty and that the warrant description must be as particular as circumstances permit.” Jones, 54 F.3d at 1290 (citing United States v. Brown, 832 F.2d 991, 996 (7th Cir.1987)). Accord United States v. Yusuf, 461 F.3d 374, 395 (3d Cir.2006) (“The breadth of items to be searched depends upon the particular factual context of each case and also the information available to the investigating agent that could limit the search at the time the warrant application is given to the magistrate.”) Furthermore, when the search involves digital media, the Seventh Circuit has instructed police officers “to exercise caution to ensure that warrants describe with particularity the things to be seized and that searches are narrowly tailored to uncover only those things described.” United States v. Mann, 592 F.3d 779, 786 (7th Cir.2010).

The warrant in this case particularly described the place of the search: the white Samsung Galaxy III cell phone. With regard to the objects of the search, however, the warrant was facially over-broad, exceeded the probable cause to support it, and was not as particular as the circumstances would allow.

The warrant authorized the seizure of “any or all files” contained on the cell phone and its memory card that “constitute[d] evidence of the offense of [Public Indecency 720 ILCS 5/11-30],”6 including, but not limited to, the calendar, phone-book, contacts, SMS messages, MMS messages, emails, pictures, videos, images, ringtones, audio files, all call logs, installed application data, GPS information, WIFI information, internet history and usage, any system files, and any delated data (Docs. 22-2, 22-3).

' The major, overriding problem with the description of the object of the search— “any or all files” — is that the police did not have probable cause to believe that everything on the phone was evidence of the crime of public indecency. The description was a template used by the St. Clair County State’s Attorney’s Office for all cell phone searches. Templates are, of course, fine to use as a starting point. But they must be tailored to the facts of each case. This particular template authorized the seizure of virtually every piece of data that could conceivably be found on the phone. The Supreme Court put the scope of such a wholesale seizure in perspective by explaining that it “would typically expose the government to far more than the most exhaustive search of a house.” Riley v. California, — U.S. -, 134 S.Ct. 2473, 2491, 189 L.Ed.2d 430 (2014) (emphasis in original). Obviously, the police will not have probable cause to search through and seize such an expansive array of data every time they search a cell phone. And, in the case of a misdemeanor crime, it is difficult to fathom why the police would ever need, or have probable cause, to do so. That certainly holds true in the instant case.

Based on the complaint supporting the search warrant, there was probable cause to believe that only two categories of data could possibly be evidence of the crime: photos and videos (see Doc. 22-2). The complaint did not offer any basis — such as facts learned during the investigation or Detective Lambert’s training and expertise — to believe that the calendar, phone-book, contacts, SMS messages, MMS mes*920sages, emails, ringtones, audio files, all call logs, installed application data, GPS information, WIFI information, internet history and usage, or system files were connected with Winn’s act of public indecency. In fact, the narrative portion of the complaint did not even mention those categories of data. Furthermore, Detective Lambert admitted at the hearing that he had no reason to believe much of that data contained evidence of the crime of public indecency.

The Government elicited explanations at the hearing from Detective Lambert and Investigator Robertson as to how some of this data might be evidence of the crime of public indecency. However, “[t]he police cannot rationalize a search post hoc on the basis of information they failed to set forth in their warrant application to a neutral [judge].” Messerschmidt v. Millender, — U.S. -, 132 S.Ct. 1235, 1257 n. 8, 182 L.Ed.2d 47 (2012); accord Guzman v. City of Chicago, 565 F.3d 393, 396 (7th Cir.2009) (“[Courts] do not view probable cause determinations with hindsight.”) The validity of the warrant is assessed solely on the basis of the information that the police disclosed in the complaint at the time the search warrant was issued. See Messerschmidt, 132 S.Ct. at 1257 n. 8 (“It is elementary that in passing on the validity of a warrant, the reviewing court may consider only information brought to the magistrate’s attention.” (citing Aguilar v. Texas, 378 U.S. 108, 109 n. 1, 84 S.Ct. 1509, 12 L.Ed.2d 723 (1964)); United States v. Carson, 582 F.3d 827, 831-32 (7th Cir.2009) (“If an affidavit is the only evidence presented to the judge in support of a search warrant ... the validity of the warrant depends on the strength of the affidavit.”) (citation omitted). “Information that emerges after the warrant is issued has no bearing” on the analysis of the validity of the warrant. Guzman, 565 F.3d at 396.

The bottom line is that if Detective Lambert wanted to seize every type of data from the cell phone, then it was incumbent upon him to explain in the complaint how and why each type of data was connected to Winn’s criminal activity, and he did not do so. Consequently, the warrant was overbroad, because it allowed the police to search for and seize broad swaths of data without probable cause to believe it constituted evidence of public indecency.

With respect to the categories of data for which the police did have probable cause — the photos and the videos — the warrant was not as particular as could be reasonably expected given the nature of the crime and the information the police possessed. The warrant merely described the category of data, rather than specific items, which allowed the police to seize all of the photos and videos on Winn’s phone, as opposed to specific photos and videos. As the Supreme Court explained, a sixteen-gigabyte smart phone like Winn’s can hold thousands of pictures and hundreds of videos dating back “to the purchase of the phone, or even earlier.” Riley, 134 S.Ct. at 2489, 2490. This is not a case where the police needed to browse through hundreds of photos and videos to find what they were looking for because Detective Lambert knew the precise identity and content of the photos/videos sought. However, he failed to mention the characteristics that made those photos/videos easily identifiable and distinguished them from others that were irrelevant. For example, the warrant could have described the location of the' incident as well as the subjects of the images — children at a swimming pool, or more specifically young girls in swimsuits at the Mascoutah Public Pool. See, e.g., Mann, 592 F.3d at 780-81 (where warrant authorized police to search for *921“images of women in locker rooms or other private areas” for evidence of voyeurism).

Most importantly, the warrant should have specified the relevant time frame. The alleged criminal activity took place on one day only—June 18, 2014—and the police were looking for photos or videos taken that same day. There was nothing in the complaint indicating that any data created prior to that date was connected to the suspected public indecency. “Failure to limit broad descriptive terms by relevant dates, when such dates are available to the police, will render a warrant overbroad.” United States v. Lazar, 604 F.3d 230, 238 (6th Cir.2010) (citing United States v. Ford, 184 F.3d 566, 576 (6th Cir.1999) (warrant was overbroad where “the government chose to use descriptions of items to be seized that referenced no specific patients, no specific transactions, and most importantly, no time frame”). See also United States v. Ninety-Two Thousand Four Hundred Twenty-Two Dollars & Fifty-Seven Cents ($92,422.57), 307 F.3d 137, 156 (3d Cir.2002) (warrant was overbroad where it contained no limitations as to the time period and “bestowed license to forage through any records,” including those from an eleven-year period prior to the time frame under investigation).

The only limit implied by the search warrant is the reference to the criminal statute that Winn supposedly violated. “An unadorned reference to a broad federal statute does not sufficiently limit the scope of a search warrant.” United States v. Leary, 846 F.2d 592, 602 (10th Cir.1988). See also United States v. Spilotro, 800 F.2d 959, 965 (9th Cir.1986) (finding that search warrant violated particularity requirement where only limitation on scope of search was items to be seized had to be evidence of violation of one of thirteen statutes, some of exceptional scope); United States v. Roche, 614 F.2d 6, 8 (1st Cir.1980) (finding that search warrant violated particularity requirement where only limitation was reference to the mail fraud statute which is extremely broad in scope). And a reference to a general statute certainly will not satisfy the Fourth Amendment’s particularity requirement when the police could have more precisely described the evidence that they were seeking or included other limiting features. See Cassady v. Goering, 567 F.3d 628, 636 (10th Cir.2009) (“It is not enough that the warrant makes reference to a particular offense; the warrant must ensure that the search is confined in scope to particularly described evidence relating to a specific crime for which there is demonstrated probable cause.”) (citation and alterations omitted). But see United States v. Vitek Supply Corp., 144 F.3d 476, 481-82 (1998) (finding warrant did not violate particularity requirement because it was limited by reference to three narrowly focused statutes, narrowed by a date limitation, and the government could not have been more precise about the records it was seeking).

Here, it is especially hard to accept that the reference to the criminal statute could possible constitute a meaningful limitation on the scope of the search when the warrant referred to the wrong criminal statute. Furthermore, the execution of the warrant clearly demonstrates that the reference to the criminal statute did nothing to actually restrict the seizure or limit the executing officers’ discretion. Detective Lambert asked Investigator Robertson to do a complete phone dump, and Robertson used the Cellebrite UFED Touch machine to extract every bit of data from the cell phone that the machine could detect. Two calendar events, a forty-four item call log, twenty-three contacts, eighty text messages, 312 images, and twenty-five *922videos were seized from Winn’s cell phone. (Doc. 22-4; Doc. 22-5). Notably, none of that data was evidence of public indecency. Some of it was, however, evidence of other crimes, namely child pornography and unlawful videotaping of a minor (see Government’s Exhibit 5 — Bates stamped pages 61-62; Government’s Exhibit 6 — Bates stamped pages 57-60). And Winn went from being suspected of misdemeanor public indecency to being charged with twenty-six unrelated felonies, including two in federal court. Thus, the warrant allowed precisely the kind of rummaging through a person’s belongings, in search of evidence of even previously unsuspected crimes or of no crime at all, that the Fourth Amendment proscribes.

In sum, the complaint establishes that the police had probable cause to look for and seize a very small and specific subset of data on Winn’s cell phone. But the warrant did not limit the scope of the seizure to only that data or describe that data with as much particularity as the circumstances allowed. Instead, the warrant contained an unabridged template that authorized the police to seize the entirety of the phone and rummage through every conceivable bit of data, regardless of whether it bore any relevance whatsoever to the criminal activity at issue. Simply put, the warrant told the police to take everything, and they did. As such, the warrant was overbroad in every respect and violated the Fourth Amendment.

Print this item

  What the judge said...
Posted by: Road Runner - 08-14-2025, 06:23 PM - Forum: Main Board - Replies (1)

See, no AI required and it's the only ruling that matters

"I think I see why Public Defender Sanger felt she had a conflict in defending you."

"The court finds probable cause"

HAAAAHHAHAHAHHAAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA

[Image: 3264824594c1995daef0.jpg]

Print this item

  The 3 words Toad is going to see soon
Posted by: Road Runner - 08-14-2025, 05:10 PM - Forum: Main Board - No Replies

MOTION TO WITHDRAW

[Image: OIP.Alv0sri1N91J_qP8lHGd5QHaEK?rs=1&pid=ImgDetMain]

Print this item

  What chatgpt said
Posted by: admin - 08-14-2025, 03:08 PM - Forum: Main Board - Replies (3)

Yes — that language reads like what courts often call a general warrant, because it doesn’t meaningfully limit the scope of the search or seizure to particular evidence tied to a specific crime.
Here’s why:

  1. Overbroad “Any and All” Language
    • The “TO BE SEIZED” section repeatedly says “any and all computers”, “any and all magnetic or optical media”, and “any and all information and data stored”.
    • Courts have repeatedly criticized this as too broad, because it authorizes seizing essentially everything in the home that could store data, regardless of whether it is connected to the alleged offense.
  2. Insufficient Particularity
    • The Fourth Amendment (and Illinois Constitution, Art. I § 6) requires the warrant to describe items to be seized with enough detail so officers can reasonably identify them without leaving it to their discretion.
    • Here, there’s some narrowing (“pertaining to posts regarding threats of violence…”) — but it’s buried inside a much broader list that authorizes taking all data, all software, and even all ownership records.
    • In practice, this means the officers could seize far more than what’s tied to the specific suspected offense.
  3. Catch-All Language at the End
    • The final parts (“including but not limited to…”) expand the scope back out again, undermining the limited parts earlier.
    • This “including but not limited to” phrasing is a red flag for overbreadth.
  4. Digital Search Issues
    • Courts treat computer warrants carefully because hard drives hold vast personal information. Warrants that authorize seizing and searching any computer/media in a home, without temporal or content-based limits, are often struck down or evidence suppressed.
If this were challenged, a court might find it invalid as a general warrant — especially if the “threats of violence” language is not used to truly limit the search to that specific evidence, but instead as a thin justification for seizing everything.
If you want, I can break this down side-by-side against Fourth Amendment “particularity” standards and show exactly where it fails them. That would make it clear why it could be considered unconstitutional.

Print this item

  The Issue
Posted by: admin - 08-14-2025, 11:55 AM - Forum: Main Board - Replies (2)

The issue is that people think this case is "cut and dry," but that's far from the truth.

1. A threat was made against a school.

2. The next day, I was arrested without the police investigating or corroborating the tip.

3. A day later, individuals informed the police, FBI, and state attorney that more posts, including threats, were being made on the same website—which was impossible since I was in jail.

4. The state obtained a warrant to search my house and seize every computer, making it a General Warrant.

5. A week later, they got records from the website showing I didn't make the threat or access the site. The attorney admitted this in an affidavit, proving no probable cause.

6. Despite knowing they lacked probable cause, the police contacted the FBI to search the computers, which the FBI picked up a week later.

7. On April 16th, the charges were dropped, and the warrant was quashed.

8. A week later, the FBI searched the computers without a warrant, violating the law (Riley v California 2014, United States v Winn 2015).

9. During this search, they found a computer-generated image and paused to get a second warrant.

10. Two years later, they obtained a second warrant, claiming the computers were under a valid state warrant.

11. They searched the devices and passed the information to the U.S. Assistant Attorney, who declined to prosecute. The FBI returned the case to the state.

12. In 2022, the state arrested me again based on that invalid search warrant.

SO:

1. The warrant was a general warrant.

2. They lacked probable cause from the start.

3. The quashed warrant made subsequent

Print this item

  Time go get to work with just 8 days to go.....
Posted by: LOOK WHAT I FOUND - 08-13-2025, 09:23 PM - Forum: Main Board - Replies (3)

mark@wykofflaw.com

Print this item

  Look what I found on Twitter
Posted by: LOOK WHAT I FOUND - 08-12-2025, 06:47 PM - Forum: Main Board - Replies (1)

[Image: H6AQUgR.png]

Print this item

  The Complete Works of Todd Doherty
Posted by: admin - 08-11-2025, 04:34 AM - Forum: Main Board - Replies (17)

The Complete Works of Todd E. Doherty

Enjoy

Print this item