6.2: Critical Thinking
- Page ID
- 35657
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)- To what extent should constitutional standards governing searches in private spaces, such as our homes, as opposed to searches in public settings, such as airports, differ under the Fourth Amendment? Why? How should distinctions between private and public spaces be defined?
- The founders of our country could never envision the world we live in today and the technological advancements which exist today. After reviewing the history and development of the 4th amendment, identify how technology has impacted the right to privacy and police searches.
- Exclusionary Rule Questions: As we learned in this section, if evidence is obtained improperly, it will be excluded from trial. Unless the attorney provides an exception to the rule. In the following scenarios, identify if the evidence will be allowed into court or not, and why. Identify the exception to the exclusionary rule.
- EXAMPLE (1): The police illegally search D’s car and find drugs. Are the drugs admissible into evidence?
- EXAMPLE (2): The police conduct an illegal search of D’s home and find a map showing the location of a well-hidden, remotely located outdoor marijuana field. The police go to the field and seize the marijuana. Is the evidence admissible?
- EXAMPLE (3): The police conduct an illegal search of D’s home and find a map showing the location of an outdoor marijuana field located 50 feet behind the loading dock of a busy commercial strip. The police go to the field and seize the marijuana.
- EXAMPLE (4): Officer Brady illegally searches Donald’s barn and discovers documents identifying Donald as the culprit behind an internet scam. The next day a confidential informant e-mails Officer Brady the same documents.
- EXAMPLE (5): The police perform an illegal search of Fred’s residence and discover stolen goods. On the counter they find a notepad on which Fred wrote the following: Reminder - place newspaper ad “Computer stuff for sale; cheap and hot! Call Fred 555-1234.” Based on this, the police call the number and that leads them to more evidence against Fred.
- EXAMPLE (6): Officer Careful executes a search in accordance with a search warrant obtained from Judge Hatchet. Unknown to Officer Careful, Judge Hatchet issued the warrant after an incorrect finding of probable cause.
- EXAMPLE (7): Judge E. Doe issues a warrant based on Officer Ellay’s sworn testimony that he saw Al Bronco removing stolen shoes from his trunk and carrying them into his home in Big Town, California. The warrant is made out for “that property owned by Mr. Al Bronco in Big Town, California.” Unbeknownst to Judge E. Doe, Al owns several houses in Big Town, one in which his mother lives and the others which he rents out. Officer Ellay is aware of this and executes the search of the intended home.
Answers:
- Example (1) – No. The drugs will be excluded as evidence in the case against D in accordance with the Exclusionary Rule.
- Example (2) – No. Under the doctrine of "fruit of the poisonous tree," the marijuana will be excluded as evidence in the case against D as it stemmed directly from an illegal search.
- Example (3) – Yes, the marijuana may be admitted as evidence by a court. Although the police were led to the field by information discovered during an illegal search, a court could find that discovery was inevitable, given the field's proximity to heavily used areas and the fact that the field was not well hidden. If discovery of the evidence was "inevitable", the evidence may be admitted, as it was not then the illegal search that caused the evidence to be found. “Inevitable” is a strong word, and to admit evidence under this exception, a court must find that police would have discovered the evidence whether or not they conducted the unreasonable search.
- Example (4) - Yes, the documents are admissible. The documents are admissible as evidence because there was an independent source for the evidence besides the illegal search. If the police had an independent source of knowledge of the evidence aside from the fruits of the illegal search, then the doctrine will not exclude the discovered evidence.
- Example (5) – No. The discovery was not inevitable as the ad never ran. It can not be used because there was no independent source of knowledge, and it was not “inevitable” discovery. The evidence will be excluded.
- Example (6) – Yes, the evidence is admissible. “Good Faith Exception.” Although the search was illegal, the evidence is not tainted and does not fall under the Exclusionary Rule because Officer Careful acted in good faith upon the Judge’s finding. If otherwise relevant and admissible, the evidence may be considered.
- Example (7) No. Because the warrant is not "precise on its face,” Officer Ellay’s search cannot be said to be in good faith and this exception to the Exclusionary Rule will not apply. Any evidence discovered from the search or stemming there from will be excluded.
- In its 1979 decision in Smith v. Maryland, the Supreme Court ruled in favor of the government, observing that “this Court consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” The Smith ruling also made reference to another Fourth Amendment case decided three years earlier, United States v. Miller, that involved warrantless government access of a suspect’s bank records. In Miller, the Supreme Court had also found in favor of the government. Considering social media, if a suspect puts information about a crime on Facebook, does the officer need a search warrant to admit the information as evidence in a trial? Why or why not?
- Imagine this scenario: You’re driving home. Police pull you over, allegedly for a traffic violation. After you provide your license and registration, the officer catches you off guard by asking: “Since you’ve got nothing to hide, you don’t mind unlocking your phone for me, do you?” Of course, you don’t want the officer to copy or rummage through all the private information on your phone. But they’ve got a badge and a gun, and you just want to go home. You comply. As he starts scrolling through your phone, he finds something interesting and says “what is this?” You immediately say give me my phone back, you can’t look at my phone anymore!” The officer arrests you and you are charged with a misdemeanor. In court, your attorney argues the evidence was illegally obtained and should be excluded. Why?