Riley v. California, 134 S.Ct. 2473 (2014)
134 S.Ct. 2473
Supreme Court of the United States
David Leon RILEY, Petitioner
v.
CALIFORNIA.
United States, Petitioner
v.
Brima Wurie.
Nos. 13–132, 13–212. | Argued April 29, 2014. |
Decided June 25, 2014.
Opinion
Chief Justice ROBERTS delivered the opinion of the
Court.
These two cases raise a common question: whether the
police may, without a warrant, search digital information
on a cell phone seized from an individual who has been
arrested.
In the first case, petitioner David Riley was stopped by a
police officer for driving with expired registration tags. In
the course of the stop, the officer also learned that Riley’s
license had been suspended. The officer impounded
Riley’s car, pursuant to department policy, and another
officer conducted an inventory search of the car. Riley was
arrested for possession of concealed and loaded firearms
when that search turned up two handguns under the car’s
hood.
An officer searched Riley incident to the arrest and found
items associated with the “Bloods” street gang. He also
seized a cell phone from Riley’s pants pocket. According
to Riley’s uncontradicted assertion, the phone was a “smart
phone,” a cell phone with a broad range of other functions
based on advanced computing capability, large storage
capacity, and Internet connectivity. The officer accessed
information on the phone and noticed that some words
(presumably in text messages or a contacts list) were
preceded by the letters “CK”—a label that, he believed,
stood for “Crip Killers,” a slang term for members of the
Bloods gang.
At the police station about two hours after the arrest, a
detective specializing in gangs further examined the
contents of the phone. The detective testified that he “went
through” Riley’s phone “looking for evidence, because ...
gang members will *2481 often video themselves with
guns or take pictures of themselves with the guns.” App. in
No. 13–132, p. 20. Although there was “a lot of stuff” on
the phone, particular files that “caught [the detective’s]
eye” included videos of young men sparring while
someone yelled encouragement using the moniker
“Blood.” Id., at 11–13. The police also found photographs
of Riley standing in front of a car they suspected had been
involved in a shooting a few weeks earlier. . . .
Prior to trial . . . , Riley moved to suppress all evidence that
the police had obtained from his cell phone. He contended
that the searches of his phone violated the Fourth
Amendment, because they had been performed without a
warrant and were not otherwise justified by exigent
circumstances….
II
The Fourth Amendment provides:
“The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not
be violated, and no Warrants shall issue, but
upon probable cause, supported by Oath or
affirmation, and particula ...
Police can no longer search your phone without a warrant, rules Supreme CourtHarrison Weber
The Supreme Court heard two cases regarding warrantless searches of cell phones incident to arrest. In the first case, police searched Riley's smartphone multiple times following his arrest for weapons charges, obtaining evidence used to convict him of additional crimes. In the second case, police searched Wurie's flip phone call log after arresting him for a drug offense and used the information to locate drugs and a firearm in his home. The Court considered whether these warrantless searches violated the Fourth Amendment and ultimately ruled that police generally may not search digital information on a cell phone seized from an individual without first obtaining a warrant.
504 Part II Criminal Procedure# 151053 Cust Cengage .docxtroutmanboris
504 Part II Criminal Procedure
# 151053 Cust: Cengage Au: Hall Pg. No. 504
Title: Criminal Law and Procedure Server: __________________
K
Short / Normal
DESIGN SERVICES OF
S4-CARLISLE
Publishing Services
information or access to their systems for the government to collect data. In others, the
government has obtained FISC orders. In recent years third-party authority has been
scrutinized in the context of metadata, or non content information. An example of
metadata is the government’s collection of phone numbers dialed but not the content
of those conversations. In its review of an application for an order to capture a huge
amount of “telephony metadata,” FISC ruled in 2013 that such intelligence gathering is
analogous to the phone records sought in Smith v. Maryland.37 In that case the Supreme
Court held that when an individual dials a phone number he is transmitting the data
to a third party, the telephone company, and as a consequence loses his privacy in the
number he dialed. For this reason the acquisition of the number dialed, but not the
content of the call, does not raise implicate the Fourth Amendment. FISC held that
this conclusion is not changed because of the size of the data request.38 The amendments
to the FISA mentioned earlier empowered the Foreign Intelligence Surveillance Court
to review and approve programs that collect metadata, in addition to individual orders
of surveillance.
One particularly controversial authority created by the Patriot Act is the National
Security Letter. Without subpoena, the government is empowered to demand non-
content data from Internet service providers, communication companies, and busi-
nesses about their clients. Again, non content data include web sites visited, telephone
numbers called, and e-mail addresses. Thousands, in some years tens of thousands, of
NSLs have been issued yearly since 9/11. NSLs come with a “gag” order. That is, the
recipient of the NSL is ordered, under criminal penalty, to not disclose to anyone, in-
cluding the client who is named in the NSL, that the letter has been received. A federal
district judge found this and other provisions of the NSL law to be contrary to the First
Amendment’s protection of free speech and the Fourth Amendment in 2013.39
FISC is aimed at foreign governments and its agents, abroad. As you can see, the
authority of the United States to spy on U.S. persons abroad is limited to when U.S.
persons are acting as foreign agents and when engaged in terrorism. If the United
States wants to conduct a search within the United States, the Fourth Amendment and
Title III rules you have already learned apply, even if the underlying offense is a viola-
tion of a national security law. If the government acquires otherwise protected infor-
mation during an otherwise legitimate surveillance, the information is to be destroyed
unless the contents indicate a threat of serious bodily harm or death to any person.
An ex.
Darren Chaker, opinion by federal court on privacy issues, and in federal case. Important issues in privacy and internet are addressed in lawsuit, very useful cases discussed.
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
Government Employs Backdoor Searches ACSB standards: Social and Ethical Issues, Technology in Society he Central Intelligence Agency (CIA) conducts foreign covert operations, counterintelligence operations, and collects and analyzes foreign intelligence for the president and his staff to aid in national ecurity decisions. The National Security Agency (NSA) is responsible for global monitoring, collection, and processing of information for foreign intelligence and counterintelligence purposes. The Federal sureau of Investigation ( FBI ) conducts domestic counterintelligence and counterterrorism operations in addition to its role as the lead law enforcement agency in the country. hese three agencies have implemented sophisticated programs to capture, store, and analyze electronic communications. The Downstream program (formerly called PRISM) extracts data from the ervers of nine major American Intemet companies including AOL, Apple, Facebook, Google, Microsof, Paltalk, Skype, Yahoo, and YouTube to obtain direct access to audio, video, photographs, emails, ocuments, and connection logs for each of these systems. The Upstream program taps into the infrastructure of the Internet to capture the online communications of foreigners outside the United States ulile their communications are in transit. The leaders of the intelligence agencies argue that these programs are essential to fighting terrorism. The agencies can also provide a dozen or more examples of ow use of the data gathered by these programs has thwarted the efforts of terrorists around the world. he programs are authorized by Section 702 of the FISA Amendments Act which authorizes surveillance of any foreigner overgeas, provided the purpose is to obtain "foreign intelligence " The Act loosely efines "foreign intelligence" to mean any information that "relates to" the conduct of foreign affairs. This broad definition mears that the target being survelled need not be a terrorist. The target needs only be thought to have information that is relevant to the government's foreign intelligence objective-whatever that may be. he process of gathering foreign electronic communications necessarily means the incidental capture of many conversations involving an American (who may be here in the United States) and a foreign arget. They may well be having a totally innocent communication with a foreign triend, relative, or business partner who is not suspected of any wrongdoing whatsoever. The total number of Americans' ommunications "incidentally" collected since the inception of Section 702 is well into the millions. fection 702 also allows the government to pool all the messages it intercepts into a giant database and then search the database, including conversations involving Americans - without a warrant. Varrantless survelliance of communications between Americans and foreigners is known as a "backdoor search because it effectively evades other provisions of United States law that require an ndiv.
The Fourth Amendment protects against unreasonable searches and seizures. It was incorporated against the states through the Fourteenth Amendment. There is no reasonable expectation of privacy in open fields, abandoned property, or areas impliedly open to the public. Searches generally require a warrant based on probable cause, though there are exceptions such as consent, exigent circumstances, and searches incident to arrest. Evidence obtained in violation of the Fourth Amendment is generally inadmissible due to the exclusionary rule.
This Supreme Court case considers whether it is constitutional for police to collect and analyze DNA samples from individuals arrested for serious crimes. The Court holds that taking a DNA sample from an arrestee is allowable under the Fourth Amendment as a reasonable search incident to arrest. The government has a legitimate interest in identifying arrestees accurately and determining whether they have committed other crimes. DNA sampling provides an important law enforcement tool that is no more intrusive than fingerprinting and helps solve cases. While individuals have privacy interests, those interests are diminished after arrest. Therefore, the DNA collection and analysis in this case was constitutional.
State of Louisiana v Sonny Barker_Objective Memo_FINAL_11_30_14Joni Schultz
This memorandum analyzes the legality of the search and arrest of Sonny Barker. It summarizes that Officer Dillion initially stopped Barker for a traffic violation when his vehicle registration tags were expired. Barker could not produce his license or registration since the vehicle belonged to his mother. Barker consented to a search of the vehicle, where Officer Dillion found marijuana. Barker was then arrested. The memorandum analyzes whether the initial stop, search, and Barker's consent were valid under the Fourth Amendment. It also discusses if Officer Dillion properly accessed Barker's email without a warrant.
Police can no longer search your phone without a warrant, rules Supreme CourtHarrison Weber
The Supreme Court heard two cases regarding warrantless searches of cell phones incident to arrest. In the first case, police searched Riley's smartphone multiple times following his arrest for weapons charges, obtaining evidence used to convict him of additional crimes. In the second case, police searched Wurie's flip phone call log after arresting him for a drug offense and used the information to locate drugs and a firearm in his home. The Court considered whether these warrantless searches violated the Fourth Amendment and ultimately ruled that police generally may not search digital information on a cell phone seized from an individual without first obtaining a warrant.
504 Part II Criminal Procedure# 151053 Cust Cengage .docxtroutmanboris
504 Part II Criminal Procedure
# 151053 Cust: Cengage Au: Hall Pg. No. 504
Title: Criminal Law and Procedure Server: __________________
K
Short / Normal
DESIGN SERVICES OF
S4-CARLISLE
Publishing Services
information or access to their systems for the government to collect data. In others, the
government has obtained FISC orders. In recent years third-party authority has been
scrutinized in the context of metadata, or non content information. An example of
metadata is the government’s collection of phone numbers dialed but not the content
of those conversations. In its review of an application for an order to capture a huge
amount of “telephony metadata,” FISC ruled in 2013 that such intelligence gathering is
analogous to the phone records sought in Smith v. Maryland.37 In that case the Supreme
Court held that when an individual dials a phone number he is transmitting the data
to a third party, the telephone company, and as a consequence loses his privacy in the
number he dialed. For this reason the acquisition of the number dialed, but not the
content of the call, does not raise implicate the Fourth Amendment. FISC held that
this conclusion is not changed because of the size of the data request.38 The amendments
to the FISA mentioned earlier empowered the Foreign Intelligence Surveillance Court
to review and approve programs that collect metadata, in addition to individual orders
of surveillance.
One particularly controversial authority created by the Patriot Act is the National
Security Letter. Without subpoena, the government is empowered to demand non-
content data from Internet service providers, communication companies, and busi-
nesses about their clients. Again, non content data include web sites visited, telephone
numbers called, and e-mail addresses. Thousands, in some years tens of thousands, of
NSLs have been issued yearly since 9/11. NSLs come with a “gag” order. That is, the
recipient of the NSL is ordered, under criminal penalty, to not disclose to anyone, in-
cluding the client who is named in the NSL, that the letter has been received. A federal
district judge found this and other provisions of the NSL law to be contrary to the First
Amendment’s protection of free speech and the Fourth Amendment in 2013.39
FISC is aimed at foreign governments and its agents, abroad. As you can see, the
authority of the United States to spy on U.S. persons abroad is limited to when U.S.
persons are acting as foreign agents and when engaged in terrorism. If the United
States wants to conduct a search within the United States, the Fourth Amendment and
Title III rules you have already learned apply, even if the underlying offense is a viola-
tion of a national security law. If the government acquires otherwise protected infor-
mation during an otherwise legitimate surveillance, the information is to be destroyed
unless the contents indicate a threat of serious bodily harm or death to any person.
An ex.
Darren Chaker, opinion by federal court on privacy issues, and in federal case. Important issues in privacy and internet are addressed in lawsuit, very useful cases discussed.
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
Government Employs Backdoor Searches ACSB standards: Social and Ethical Issues, Technology in Society he Central Intelligence Agency (CIA) conducts foreign covert operations, counterintelligence operations, and collects and analyzes foreign intelligence for the president and his staff to aid in national ecurity decisions. The National Security Agency (NSA) is responsible for global monitoring, collection, and processing of information for foreign intelligence and counterintelligence purposes. The Federal sureau of Investigation ( FBI ) conducts domestic counterintelligence and counterterrorism operations in addition to its role as the lead law enforcement agency in the country. hese three agencies have implemented sophisticated programs to capture, store, and analyze electronic communications. The Downstream program (formerly called PRISM) extracts data from the ervers of nine major American Intemet companies including AOL, Apple, Facebook, Google, Microsof, Paltalk, Skype, Yahoo, and YouTube to obtain direct access to audio, video, photographs, emails, ocuments, and connection logs for each of these systems. The Upstream program taps into the infrastructure of the Internet to capture the online communications of foreigners outside the United States ulile their communications are in transit. The leaders of the intelligence agencies argue that these programs are essential to fighting terrorism. The agencies can also provide a dozen or more examples of ow use of the data gathered by these programs has thwarted the efforts of terrorists around the world. he programs are authorized by Section 702 of the FISA Amendments Act which authorizes surveillance of any foreigner overgeas, provided the purpose is to obtain "foreign intelligence " The Act loosely efines "foreign intelligence" to mean any information that "relates to" the conduct of foreign affairs. This broad definition mears that the target being survelled need not be a terrorist. The target needs only be thought to have information that is relevant to the government's foreign intelligence objective-whatever that may be. he process of gathering foreign electronic communications necessarily means the incidental capture of many conversations involving an American (who may be here in the United States) and a foreign arget. They may well be having a totally innocent communication with a foreign triend, relative, or business partner who is not suspected of any wrongdoing whatsoever. The total number of Americans' ommunications "incidentally" collected since the inception of Section 702 is well into the millions. fection 702 also allows the government to pool all the messages it intercepts into a giant database and then search the database, including conversations involving Americans - without a warrant. Varrantless survelliance of communications between Americans and foreigners is known as a "backdoor search because it effectively evades other provisions of United States law that require an ndiv.
The Fourth Amendment protects against unreasonable searches and seizures. It was incorporated against the states through the Fourteenth Amendment. There is no reasonable expectation of privacy in open fields, abandoned property, or areas impliedly open to the public. Searches generally require a warrant based on probable cause, though there are exceptions such as consent, exigent circumstances, and searches incident to arrest. Evidence obtained in violation of the Fourth Amendment is generally inadmissible due to the exclusionary rule.
This Supreme Court case considers whether it is constitutional for police to collect and analyze DNA samples from individuals arrested for serious crimes. The Court holds that taking a DNA sample from an arrestee is allowable under the Fourth Amendment as a reasonable search incident to arrest. The government has a legitimate interest in identifying arrestees accurately and determining whether they have committed other crimes. DNA sampling provides an important law enforcement tool that is no more intrusive than fingerprinting and helps solve cases. While individuals have privacy interests, those interests are diminished after arrest. Therefore, the DNA collection and analysis in this case was constitutional.
State of Louisiana v Sonny Barker_Objective Memo_FINAL_11_30_14Joni Schultz
This memorandum analyzes the legality of the search and arrest of Sonny Barker. It summarizes that Officer Dillion initially stopped Barker for a traffic violation when his vehicle registration tags were expired. Barker could not produce his license or registration since the vehicle belonged to his mother. Barker consented to a search of the vehicle, where Officer Dillion found marijuana. Barker was then arrested. The memorandum analyzes whether the initial stop, search, and Barker's consent were valid under the Fourth Amendment. It also discusses if Officer Dillion properly accessed Barker's email without a warrant.
The 4th Amendment protects citizens from unreasonable searches and seizures by law enforcement. It requires that searches be conducted with a warrant based on probable cause. A recent Supreme Court case, Riley v. California, addressed whether police could search digital data on phones seized during an arrest without a warrant. The Court ruled that a warrant is required for police to search the data of arrested individuals' phones, establishing an expectation of privacy for information on personal electronic devices. Historical cases like Entick v. Carrington influenced the drafting of the 4th Amendment by establishing that warrants must name the items to be seized and show probable cause.
Mandatory Key Disclosure and Self Incrimination in CanadaAnna Manley
This document discusses key disclosure, self-incrimination, and privacy issues related to mandatory disclosure of encryption keys in Canada. It provides an overview of relevant Canadian cases on compelled production of passwords and encryption keys, such as R. v. Meron in 2004 and R. c. Boudreau-Fontaine in 2010, which found that an accused cannot be ordered to produce their passwords. The document also discusses standards for searches at the border and whether refusing to provide passwords could be considered suspicious. Overall, the document examines the tension between privacy rights and the ability of law enforcement to compel disclosure of encryption keys during a criminal investigation.
Pick two of the types of criminal acts discussed in the readings and.docxrowthechang
Pick two of the types of criminal acts discussed in the readings and conduct an internet search for cases in which a security professional was charged with those particular offenses. Explain in detail the facts of the case, why you selected it and the outcome of the case.
Technical Requirements
•
Your paper must be at a minimum of 2-3 pages (the Title and Reference pages do not count towards the minimum limit).
•
Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
•
Type in Times New Roman, 12 point and double space.
Reference
Nemeth, C. (2011). Private Security and The Law-4th Edition (4th ed.). Waltham, MA: Elsevier
Butterworth-Heinemann.
Lola Rabon, Appellee, v. Guardsmark, Inc., Appellant No. 76-2398 UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT
571 F.2d 1277; 1978 U.S. App. LEXIS 12576 November 9, 1977, Argued February 16, 1978, Decided
PRIOR HISTORY: Appeal from the United States District Court for the District of South Carolina, at Columbia. Sol Blatt, Jr., District Judge.
DISPOSITION: Reversed.
CASE SUMMARY: PROCEDURAL POSTURE: Appellant security company sought review of a judgment from the United States District Court for the District of South Carolina which granted summary judgment to appellee injured person in her action which sought damages from the security company after the injured person was sexually assaulted at her place of employment by a security guard employed by the security company.
OVERVIEW: The security company provided security services where the injured person was employed. The injured person was sexually assaulted by a security guard employed by the security company and sought to find the security company liable for the attack. The district court found that, under state law, the security company would have a higher standard of care because the assault occurred at the place where the security company's business was carried out and because it was committed with a gun supplied by the security company. The court noted that only common carriers owed its patrons the highest degree of care. The court, however, disagreed with the district court's extension of that standard of care to the security company. The court found that the cases which extended the highest degree of care to the employer all involved common carriers and that it was unclear from the law the reasons for the state's adoption of the higher standard of liability. The court refused to extend liability to the security company for the unauthorized acts of its employee without some reasonable basis in the law and noted that S.C. Code § 56-646.1 et seq. was a licensing statute and did not impute liability. (Lola Rabon, Appellee, v. Guardsmark, Inc.)
There are three reasons usually given for the extraordinary liability of common carriers. First, the contract of passage between the carrier and the passenger is said to contain an implied assurance that the passenger will be transpor.
This document summarizes key aspects of Fourth Amendment search and seizure law, including requirements for search warrants, exceptions to the warrant requirement, and analyses of relevant Supreme Court cases. It discusses the reasonable expectation of privacy test, probable cause standard, and exclusionary rule. It also outlines exceptions such as search incident to arrest, automobile exception, plain view doctrine, consent searches, and inventory searches.
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.
This document summarizes key concepts related to the 4th Amendment. It defines search and seizure and explains that the 4th Amendment prohibits unreasonable searches and seizures by government agents. It also discusses the exclusionary rule, which prevents illegally obtained evidence from being used in court, and exceptions like stops, frisks, searches incident to arrest, and the plain view doctrine. Overall it provides an overview of 4th Amendment protections against unlawful searches and seizures.
This document provides an overview of the 4th Amendment and constitutional searches and seizures. It discusses key concepts like the reasonableness clause, warrant clause, probable cause, and the continuum of contacts between law enforcement and the public. It explains that the 4th Amendment aims to balance security and privacy by allowing limited government searches and seizures if they are reasonable or supported by a warrant and probable cause. It also summarizes the landmark Terry v. Ohio Supreme Court case that established the legality of brief stops and pat-downs for weapons, known as stop and frisk, based on reasonable suspicion of criminal activity.
C H A P T E R 3Essential FourthAmendmentDoctrines10.docxhumphrieskalyn
C H A P T E R 3
Essential Fourth
Amendment
Doctrines
105
CHAPTER OUTLINE
THE SEARCH WARRANT
Search Warrant Values: A Neutral and Detached
Magistrate
Obtaining a Search Warrant
Particularity
The Intersection of the First, Fourth, and Fifth
Amendments
Anticipatory Warrants and Controlled Deliveries
Challenging a Search Warrant Affidavit
Executing a Search Warrant: Knock and Announce
Inventory and Delayed Notice; “Sneak and Peek”
Warrants
Deadly Errors
REVOLUTIONIZING THE FOURTH AMENDMENT
Modernizing Search and Seizure Law
Creating the “Expectation of Privacy” Doctrine
Applying the “Expectation of Privacy” Doctrine
Undercover Agents and the Fourth Amendment
PROBABLE CAUSE AND THE FOURTH
AMENDMENT
The Concept of Evidence Sufficiency
Defining Probable Cause
Probable Cause Based on Informers’ Tips
Conservative Revisions
PLAIN VIEW AND RELATED DOCTRINES
Plain View
Curtilage and Open Fields
Airspace
Enhancement Devices
CONSENT SEARCHES
Voluntariness Requirement
Knowledge of One’s Rights
Third-Party Consent
Scope of Consent
“Knock and Talk”
LAW IN SOCIETY: POLICE PERJURY
AND THE FOURTH AMENDMENT
SUMMARY
LAW PUZZLES
JUSTICES OF THE SUPREME COURT:
ROOSEVELT’S LIBERALS: DOUGLAS, MURPHY,
JACKSON, AND RUTLEDGE
William O. Douglas
Frank Murphy
Robert H. Jackson
Wiley B. Rutledge
Power is a heady thing; and history shows that the police acting on their own cannot be
trusted. And so the Constitution requires a magistrate to pass on the desires of the police
before they violate the privacy of the home.
—JUSTICE WILLIAM O. DOUGLAS, McDonald v. United States, 335 U.S. 451, 456 (1948)
M03_ZALM7613_06_SE_CH03.QXD 1/11/10 3:03 PM Page 105
R
O
D
D
Y
,
A
N
T
H
O
N
Y
I
S
A
A
C
3
7
2
7
B
U
106 Chapter 3
KEY TERMS
anticipatory warrant
beeper
consent search
constitutionally protected
area
controlled delivery
curtilage
enhancement device
exigency
ex parte
expectation of privacy
industrial curtilage
inventory and return
“knock and announce” rule
magistrate
media ride-along
neutral and detached
magistrate
no-knock warrant
open fields
plain feel rule
plain view
plurality opinion
probable cause
reasonable suspicion
secret informant
“sneak and peek” warrant
telephonic warrant
thermal imaging
two-pronged test
undercover agent
This chapter presents five basic areas of Fourth Amendment law: (1) the search warrant, (2) the
‘expectation of privacy’ doctrine, (3) probable cause, (4) the plain view doctrine, and (5) consent
searches. Although in practice most searches are conducted without a warrant (i.e., are “warrant-
less”), the Fourth Amendment presumes that judicial search warrants are essential for preserving
the privacy protections of the people. The expectation of privacy doctrine, established in 1967, is
now the theoretical backbone of Fourth Amendment analysis. Probable cause, the level of evi-
dence required by the Constitution before government agents can invade individual privacy, is the
required basis for arrests and searches and seiz ...
Smartphone Encryption and the FBI DemystifiedMichael Sexton
The document discusses how Apple and Android have implemented stronger default encryption on smartphones that limits law enforcement access to user data even with a warrant. This shift has concerned the FBI director but protects users from potential exploitation of any backdoor access. While encryption has prevented access to a small percentage of authorized intercepts so far, this number will likely rise as more users opt into the stronger protections. The development raises questions about balancing privacy rights with government access that require serious political discussion.
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALLisa Greene
This document provides an overview of key concepts in criminal procedure before trial, including constitutional protections for criminal suspects and defendants. It discusses the requirements for reasonable searches and seizures under the 4th Amendment, including exceptions to the warrant requirement. It also covers interrogations and confessions, the right to counsel, and the 12 typical pretrial activities like arrest, booking, bail, arraignment and discovery. Key Supreme Court cases establishing rights like Miranda warnings, effective assistance of counsel, and exclusion of illegally obtained evidence are also summarized.
This document provides an overview of the 4th Amendment and key concepts related to constitutional searches and seizures. It discusses that the 4th Amendment protects against unreasonable searches and seizures by the government. It establishes that a warrant is generally required for a search or seizure, and that warrants must be based on probable cause. The document examines the clauses of the 4th Amendment, what constitutes a reasonable search, reasonable expectation of privacy, and probable cause. It explores the different sources of establishing probable cause and discusses search and arrest warrants.
The document discusses search and seizure law under the 4th Amendment. It defines what constitutes a search and what is not considered a search, such as searches of open fields. It discusses the Supreme Court case Oliver v. United States, which established that individuals have greater privacy protections for their homes and curtilage than open fields outside curtilage. The document also discusses warrants, probable cause, and exceptions to the warrant requirement, such as exigent circumstances, searches incident to arrest, vehicle searches, and searches based on consent or items in plain view.
The arresting officers have an arrest warrant for the defendant who is suspected of robbery. They can search the defendant incident to the lawful arrest. However, they cannot search the premises or vehicle without a search warrant absent exigent circumstances. While an arrest warrant authorizes the arrest of the defendant, it does not provide authority to conduct a search of places other than those under the defendant's immediate control. Any search of areas beyond the defendant's person requires a separate search warrant or exigent circumstances.
Excerpt - Georgetown Undergraduate Law Reviewmdespardmoore
This summary provides an overview of the document:
1) The document is the first issue of the Georgetown University Undergraduate Law Review from Spring 2014. It lists the editorial board and staff and their roles.
2) The main article analyzes two Supreme Court cases, Maryland v. King and United States v. Jones, regarding privacy issues related to modern technology. It examines the differing views among the justices on interpreting privacy under the Fourth Amendment.
3) The article briefly discusses a potential future Supreme Court case, United States v. Muhtorov, challenging the NSA's warrantless surveillance program, and predicts a five to four decision against the program.
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
Eastern European countries appear to have become dependent on Russian oil originally due to the country being a reliable supplier to the European countries (Bradshaw, 2014, p. 76). Though the countries were allies with the United States, they were trying to become less dependent on the Middle East and saw that Russia was a reliable source. Much of this reliance was due to the “iron curtain” as well as the fact that many of the Eastern European countries were part of the Soviet Union in some way or affiliated with them.
It appears that much of the reason as to why these countries reached energy accords with Russia is due to the convenience. There was “limited access to storage and alternative sources of gas supply” (Bradshaw, 2014, p. 77). This pushed these countries to depend more on Russia, which appeared to be an easier access to gas supplies. Another reason might have been due to fear as the Kremlin punished Ukraine for voting for an anti-Moscow government (Bradshaw, 2015, p. 77). This action shows that many of these countries may have reached these accords due to the pressure and encouragement of the Soviet Government. In the 1980’s the dependence of European countries on Russian gas resources was 50-60%. In the 1970’s, many of the Eastern European countries also became reliant on Russia due to a greater demand of oil and gas. The surrounding countries that were providing resources were not able to keep up with the demand and thus these countries sought to get their sources from Russia. It also helped that Russia’s prices appeared to be lower than that of the world market (Bradshaw, 2014, p. 87-88). Due to the price of oil and gas and the availability, Eastern European countries were able to grow and build in gas import and its infrastructure, thus in turn causing it to be dependent on Russia.
Bradshaw, M. (2014).
Global Energy Dilemmas: Energy Security, Globalization, and Climate Change
. Cambridge, UK: Polity Press.
Based on your considered review of this module’s readings as well as your reflection upon the first three modules, evaluate the questions below.
In retrospect it seems obvious, but exactly how and why did Eastern European countries come to depend on Russian oil and natural gas after World War II?
Why did the Western Europeans reach energy accords with the Russians in the 1970s and early 1980s, building large-scale natural gas import infrastructures and increasing their dependence on Russian gas?
.
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
EAS 209
Second Response Paper Topic
>>>Assignment Due Date: Friday, October 12, 2018<<<
Write 350 words, excluding works cited and references, on the following topic:
Dipesh Chakrabarty cites John Stuart Mill to show one dimension of historicist
consciousness: “a recommendation to the colonized to wait.” What does Chakrabarty
mean by this phrase? Consider, e.g. why, according to Mill, “Indians, Africans, and other
‘rude’ nations” had to be consigned to what Chakrabarty called “an imaginary waiting
room of history.”
To respond to this question, you might find it helpful to consider Chakrabarty’s discussion
on historicism or “stagist theory of history.”
▪ Submit a hard copy in your Tutorial Section on Friday, October 12.
▪ Papers must be type-written, double-spaced, appearing in 12 points Times New Roman font or
its equivalent with 1” margins. Do not exceed 400 words. You are responsible for keeping an
extra copy of your own paper.
▪ The assignment does not ask you to conduct additional research. Papers that do not respond
to the given topic or do not follow the specific instructions described above will receive no
marks. No resubmission allowed.
▪ You need to present your argument logically and clearly, fully demonstrate the precise
understanding of Chakrabarty’s argument and substantiate your argument convincingly and
with details.
▪ Observe the Chicago Manual of Style referencing practice and properly cite the passages you
quote (i.e. author, title, page number, etc.). Works cited or references should not be counted
toward the 350 word limit.
▪ Any ideas or expressions that are not your own must be placed in quotation marks and
referenced with page number. Academic misconduct will not be tolerated. See:
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
▪ You may share notes and discuss your ideas with others for preparation. But the paper you
submit must be exclusively written by you alone and in your own words clearly distinguishable
from others’. Papers that plagiarize, replicate others, or contain identical or near-identical
passages that appear in other papers will not be accepted or credited.
▪ You must proof-read before submission. Sentences that are incomplete or unintelligible will
not be read or credited.
▪ Late submission and papers submitted via e-mail will not be accepted or credited unless
under extraordinary circumstances. ABSOLUTELY NO EXCPETION!
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
I N T R O D U C T I O N
The Idea of Provincializing Europe
Europe . . . since 1914 has become provincialized, . . .
only the natural sciences are able to call forth a
quick international echo.
(Hans-Georg Gadamer, 1977)
The West is a name for a subject which gathers itself in
discourse but is also an object constituted discursively;
it is, evidently, a name always associating itself with
those regions, communities, and peoples.
Earth Science LabIn what order do materials settle in waterSo t.docxjoellemurphey
Earth Science Lab:In what order do materials settle in water?
So this is my Topic:
In what order do materials settle in water? Design and carry out an experiment to determine the order in which different sized materials (e.g., sand, gravel, topsoil) settle out in water after they have been mixed up.
but i don't understand the question below:
What are some possible treatments you can use to answer your question? What are some variables that may influence your question, and are they variables that you can easily manipulate and test?
What can i write about the possible treatments?
.
EarlyIntervention Strategies Paper (15 points)The pu.docxjoellemurphey
Early
Intervention Strategies Paper (15 points)
The purpose of the presentation is to help classmates understand different types of intervention strategies for early intervention. Students will be expected to write a 5-7 page paper that is comprised of two parts. In Part I, the student will discuss the role of each of the following professionals that can comprise a treatment team in a maximum of 3 pages:
Developmental Teacher Occupational Therapist Physical Therapist Speech/Language Pathologist
Audiologist Vision Consultant Psychologist Pediatrician
Part II: Furthermore, each student will set up a site visit at a local agency or provider of services to young children and will spend some time observing a particular facility or program that cares for and provides services to infants and young children. The following list should be used to guide the observations. The student should summarize thefollowing information in at least 3 pages:
Name of the facility or program
Ages of the children served
History and philosophy of the facility or program
Structure of the facility or program (Co-Op, Pre-K, )
Services provided
Activities and routines in which the children engage
Adult to child ratio
Types of delays and disabilities of the children who attend this program
Family involvement
Type of setting: inclusive setting, provisions for inclusion
Curriculum used
Would you recommend this facility to a family with a child with a disability? Why or why not?
.
Early Hominids & Australopithecus SubscribeWhat is a too.docxjoellemurphey
Early Hominids & Australopithecus
Subscribe
What is a tool? Did
Sahelanthropus
,
Orrorin
,
Ardipithecus, or Australopithecus
use tools? What evidence shows that they used tools?
What do these groups represent for human evolution? Why are these hominids unique in human evolutionary history?
.
Early scholarly and philosophical manuscripts were in Greek. However.docxjoellemurphey
Early scholarly and philosophical manuscripts were in Greek. However, by the 5th century CE – and onward – language was mainly spread by conquests, trades, religious affiliations, technological advancements or entertainment. (Gascoigne, 2001). For example, as the geographic territory under Roman control grew, the use of Latin as a common language also spread. In areas under Roman control, Latin was the spoken and written language of the courts and commerce, as well as the language of the Christian church. As the Roman Empire expanded, Latin served as a common language that allowed for people of diverse linguistic backgrounds to be able to communicate.
Onward and by the early 14th century, the trend toward the use of vernacular language had spread throughout most of Europe. As monarchies throughout the region began to consolidate, the use of vernacular languages contributed to an increasing nationalism, or feeling of pride in one’s own nation, and in this case among people of similar linguistic backgrounds. People began to feel more connected to local leaders than they did to influences from afar. These sociopolitical shifts, along with the development of moveable type (the printing press), helped to ensure the success of the vernacular languages during the Renaissance.
Assignment:
The goal of this assignment is to research and report on the origins of vernacular language, and its spread while also providing evidence of Latin’s influence on all Western languages.
Choose one native language spoken in Europe, discuss the origins of the vernacular language and describe how the language spread.
As a whole, in what ways has Latin influenced Western language development?
Prepare a 2-page essay (not including cover page and works cited page) answering the questions stated above in APA format.
.
More Related Content
Similar to Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
The 4th Amendment protects citizens from unreasonable searches and seizures by law enforcement. It requires that searches be conducted with a warrant based on probable cause. A recent Supreme Court case, Riley v. California, addressed whether police could search digital data on phones seized during an arrest without a warrant. The Court ruled that a warrant is required for police to search the data of arrested individuals' phones, establishing an expectation of privacy for information on personal electronic devices. Historical cases like Entick v. Carrington influenced the drafting of the 4th Amendment by establishing that warrants must name the items to be seized and show probable cause.
Mandatory Key Disclosure and Self Incrimination in CanadaAnna Manley
This document discusses key disclosure, self-incrimination, and privacy issues related to mandatory disclosure of encryption keys in Canada. It provides an overview of relevant Canadian cases on compelled production of passwords and encryption keys, such as R. v. Meron in 2004 and R. c. Boudreau-Fontaine in 2010, which found that an accused cannot be ordered to produce their passwords. The document also discusses standards for searches at the border and whether refusing to provide passwords could be considered suspicious. Overall, the document examines the tension between privacy rights and the ability of law enforcement to compel disclosure of encryption keys during a criminal investigation.
Pick two of the types of criminal acts discussed in the readings and.docxrowthechang
Pick two of the types of criminal acts discussed in the readings and conduct an internet search for cases in which a security professional was charged with those particular offenses. Explain in detail the facts of the case, why you selected it and the outcome of the case.
Technical Requirements
•
Your paper must be at a minimum of 2-3 pages (the Title and Reference pages do not count towards the minimum limit).
•
Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
•
Type in Times New Roman, 12 point and double space.
Reference
Nemeth, C. (2011). Private Security and The Law-4th Edition (4th ed.). Waltham, MA: Elsevier
Butterworth-Heinemann.
Lola Rabon, Appellee, v. Guardsmark, Inc., Appellant No. 76-2398 UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT
571 F.2d 1277; 1978 U.S. App. LEXIS 12576 November 9, 1977, Argued February 16, 1978, Decided
PRIOR HISTORY: Appeal from the United States District Court for the District of South Carolina, at Columbia. Sol Blatt, Jr., District Judge.
DISPOSITION: Reversed.
CASE SUMMARY: PROCEDURAL POSTURE: Appellant security company sought review of a judgment from the United States District Court for the District of South Carolina which granted summary judgment to appellee injured person in her action which sought damages from the security company after the injured person was sexually assaulted at her place of employment by a security guard employed by the security company.
OVERVIEW: The security company provided security services where the injured person was employed. The injured person was sexually assaulted by a security guard employed by the security company and sought to find the security company liable for the attack. The district court found that, under state law, the security company would have a higher standard of care because the assault occurred at the place where the security company's business was carried out and because it was committed with a gun supplied by the security company. The court noted that only common carriers owed its patrons the highest degree of care. The court, however, disagreed with the district court's extension of that standard of care to the security company. The court found that the cases which extended the highest degree of care to the employer all involved common carriers and that it was unclear from the law the reasons for the state's adoption of the higher standard of liability. The court refused to extend liability to the security company for the unauthorized acts of its employee without some reasonable basis in the law and noted that S.C. Code § 56-646.1 et seq. was a licensing statute and did not impute liability. (Lola Rabon, Appellee, v. Guardsmark, Inc.)
There are three reasons usually given for the extraordinary liability of common carriers. First, the contract of passage between the carrier and the passenger is said to contain an implied assurance that the passenger will be transpor.
This document summarizes key aspects of Fourth Amendment search and seizure law, including requirements for search warrants, exceptions to the warrant requirement, and analyses of relevant Supreme Court cases. It discusses the reasonable expectation of privacy test, probable cause standard, and exclusionary rule. It also outlines exceptions such as search incident to arrest, automobile exception, plain view doctrine, consent searches, and inventory searches.
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.
This document summarizes key concepts related to the 4th Amendment. It defines search and seizure and explains that the 4th Amendment prohibits unreasonable searches and seizures by government agents. It also discusses the exclusionary rule, which prevents illegally obtained evidence from being used in court, and exceptions like stops, frisks, searches incident to arrest, and the plain view doctrine. Overall it provides an overview of 4th Amendment protections against unlawful searches and seizures.
This document provides an overview of the 4th Amendment and constitutional searches and seizures. It discusses key concepts like the reasonableness clause, warrant clause, probable cause, and the continuum of contacts between law enforcement and the public. It explains that the 4th Amendment aims to balance security and privacy by allowing limited government searches and seizures if they are reasonable or supported by a warrant and probable cause. It also summarizes the landmark Terry v. Ohio Supreme Court case that established the legality of brief stops and pat-downs for weapons, known as stop and frisk, based on reasonable suspicion of criminal activity.
C H A P T E R 3Essential FourthAmendmentDoctrines10.docxhumphrieskalyn
C H A P T E R 3
Essential Fourth
Amendment
Doctrines
105
CHAPTER OUTLINE
THE SEARCH WARRANT
Search Warrant Values: A Neutral and Detached
Magistrate
Obtaining a Search Warrant
Particularity
The Intersection of the First, Fourth, and Fifth
Amendments
Anticipatory Warrants and Controlled Deliveries
Challenging a Search Warrant Affidavit
Executing a Search Warrant: Knock and Announce
Inventory and Delayed Notice; “Sneak and Peek”
Warrants
Deadly Errors
REVOLUTIONIZING THE FOURTH AMENDMENT
Modernizing Search and Seizure Law
Creating the “Expectation of Privacy” Doctrine
Applying the “Expectation of Privacy” Doctrine
Undercover Agents and the Fourth Amendment
PROBABLE CAUSE AND THE FOURTH
AMENDMENT
The Concept of Evidence Sufficiency
Defining Probable Cause
Probable Cause Based on Informers’ Tips
Conservative Revisions
PLAIN VIEW AND RELATED DOCTRINES
Plain View
Curtilage and Open Fields
Airspace
Enhancement Devices
CONSENT SEARCHES
Voluntariness Requirement
Knowledge of One’s Rights
Third-Party Consent
Scope of Consent
“Knock and Talk”
LAW IN SOCIETY: POLICE PERJURY
AND THE FOURTH AMENDMENT
SUMMARY
LAW PUZZLES
JUSTICES OF THE SUPREME COURT:
ROOSEVELT’S LIBERALS: DOUGLAS, MURPHY,
JACKSON, AND RUTLEDGE
William O. Douglas
Frank Murphy
Robert H. Jackson
Wiley B. Rutledge
Power is a heady thing; and history shows that the police acting on their own cannot be
trusted. And so the Constitution requires a magistrate to pass on the desires of the police
before they violate the privacy of the home.
—JUSTICE WILLIAM O. DOUGLAS, McDonald v. United States, 335 U.S. 451, 456 (1948)
M03_ZALM7613_06_SE_CH03.QXD 1/11/10 3:03 PM Page 105
R
O
D
D
Y
,
A
N
T
H
O
N
Y
I
S
A
A
C
3
7
2
7
B
U
106 Chapter 3
KEY TERMS
anticipatory warrant
beeper
consent search
constitutionally protected
area
controlled delivery
curtilage
enhancement device
exigency
ex parte
expectation of privacy
industrial curtilage
inventory and return
“knock and announce” rule
magistrate
media ride-along
neutral and detached
magistrate
no-knock warrant
open fields
plain feel rule
plain view
plurality opinion
probable cause
reasonable suspicion
secret informant
“sneak and peek” warrant
telephonic warrant
thermal imaging
two-pronged test
undercover agent
This chapter presents five basic areas of Fourth Amendment law: (1) the search warrant, (2) the
‘expectation of privacy’ doctrine, (3) probable cause, (4) the plain view doctrine, and (5) consent
searches. Although in practice most searches are conducted without a warrant (i.e., are “warrant-
less”), the Fourth Amendment presumes that judicial search warrants are essential for preserving
the privacy protections of the people. The expectation of privacy doctrine, established in 1967, is
now the theoretical backbone of Fourth Amendment analysis. Probable cause, the level of evi-
dence required by the Constitution before government agents can invade individual privacy, is the
required basis for arrests and searches and seiz ...
Smartphone Encryption and the FBI DemystifiedMichael Sexton
The document discusses how Apple and Android have implemented stronger default encryption on smartphones that limits law enforcement access to user data even with a warrant. This shift has concerned the FBI director but protects users from potential exploitation of any backdoor access. While encryption has prevented access to a small percentage of authorized intercepts so far, this number will likely rise as more users opt into the stronger protections. The development raises questions about balancing privacy rights with government access that require serious political discussion.
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALLisa Greene
This document provides an overview of key concepts in criminal procedure before trial, including constitutional protections for criminal suspects and defendants. It discusses the requirements for reasonable searches and seizures under the 4th Amendment, including exceptions to the warrant requirement. It also covers interrogations and confessions, the right to counsel, and the 12 typical pretrial activities like arrest, booking, bail, arraignment and discovery. Key Supreme Court cases establishing rights like Miranda warnings, effective assistance of counsel, and exclusion of illegally obtained evidence are also summarized.
This document provides an overview of the 4th Amendment and key concepts related to constitutional searches and seizures. It discusses that the 4th Amendment protects against unreasonable searches and seizures by the government. It establishes that a warrant is generally required for a search or seizure, and that warrants must be based on probable cause. The document examines the clauses of the 4th Amendment, what constitutes a reasonable search, reasonable expectation of privacy, and probable cause. It explores the different sources of establishing probable cause and discusses search and arrest warrants.
The document discusses search and seizure law under the 4th Amendment. It defines what constitutes a search and what is not considered a search, such as searches of open fields. It discusses the Supreme Court case Oliver v. United States, which established that individuals have greater privacy protections for their homes and curtilage than open fields outside curtilage. The document also discusses warrants, probable cause, and exceptions to the warrant requirement, such as exigent circumstances, searches incident to arrest, vehicle searches, and searches based on consent or items in plain view.
The arresting officers have an arrest warrant for the defendant who is suspected of robbery. They can search the defendant incident to the lawful arrest. However, they cannot search the premises or vehicle without a search warrant absent exigent circumstances. While an arrest warrant authorizes the arrest of the defendant, it does not provide authority to conduct a search of places other than those under the defendant's immediate control. Any search of areas beyond the defendant's person requires a separate search warrant or exigent circumstances.
Excerpt - Georgetown Undergraduate Law Reviewmdespardmoore
This summary provides an overview of the document:
1) The document is the first issue of the Georgetown University Undergraduate Law Review from Spring 2014. It lists the editorial board and staff and their roles.
2) The main article analyzes two Supreme Court cases, Maryland v. King and United States v. Jones, regarding privacy issues related to modern technology. It examines the differing views among the justices on interpreting privacy under the Fourth Amendment.
3) The article briefly discusses a potential future Supreme Court case, United States v. Muhtorov, challenging the NSA's warrantless surveillance program, and predicts a five to four decision against the program.
Similar to Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx (16)
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
Eastern European countries appear to have become dependent on Russian oil originally due to the country being a reliable supplier to the European countries (Bradshaw, 2014, p. 76). Though the countries were allies with the United States, they were trying to become less dependent on the Middle East and saw that Russia was a reliable source. Much of this reliance was due to the “iron curtain” as well as the fact that many of the Eastern European countries were part of the Soviet Union in some way or affiliated with them.
It appears that much of the reason as to why these countries reached energy accords with Russia is due to the convenience. There was “limited access to storage and alternative sources of gas supply” (Bradshaw, 2014, p. 77). This pushed these countries to depend more on Russia, which appeared to be an easier access to gas supplies. Another reason might have been due to fear as the Kremlin punished Ukraine for voting for an anti-Moscow government (Bradshaw, 2015, p. 77). This action shows that many of these countries may have reached these accords due to the pressure and encouragement of the Soviet Government. In the 1980’s the dependence of European countries on Russian gas resources was 50-60%. In the 1970’s, many of the Eastern European countries also became reliant on Russia due to a greater demand of oil and gas. The surrounding countries that were providing resources were not able to keep up with the demand and thus these countries sought to get their sources from Russia. It also helped that Russia’s prices appeared to be lower than that of the world market (Bradshaw, 2014, p. 87-88). Due to the price of oil and gas and the availability, Eastern European countries were able to grow and build in gas import and its infrastructure, thus in turn causing it to be dependent on Russia.
Bradshaw, M. (2014).
Global Energy Dilemmas: Energy Security, Globalization, and Climate Change
. Cambridge, UK: Polity Press.
Based on your considered review of this module’s readings as well as your reflection upon the first three modules, evaluate the questions below.
In retrospect it seems obvious, but exactly how and why did Eastern European countries come to depend on Russian oil and natural gas after World War II?
Why did the Western Europeans reach energy accords with the Russians in the 1970s and early 1980s, building large-scale natural gas import infrastructures and increasing their dependence on Russian gas?
.
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
EAS 209
Second Response Paper Topic
>>>Assignment Due Date: Friday, October 12, 2018<<<
Write 350 words, excluding works cited and references, on the following topic:
Dipesh Chakrabarty cites John Stuart Mill to show one dimension of historicist
consciousness: “a recommendation to the colonized to wait.” What does Chakrabarty
mean by this phrase? Consider, e.g. why, according to Mill, “Indians, Africans, and other
‘rude’ nations” had to be consigned to what Chakrabarty called “an imaginary waiting
room of history.”
To respond to this question, you might find it helpful to consider Chakrabarty’s discussion
on historicism or “stagist theory of history.”
▪ Submit a hard copy in your Tutorial Section on Friday, October 12.
▪ Papers must be type-written, double-spaced, appearing in 12 points Times New Roman font or
its equivalent with 1” margins. Do not exceed 400 words. You are responsible for keeping an
extra copy of your own paper.
▪ The assignment does not ask you to conduct additional research. Papers that do not respond
to the given topic or do not follow the specific instructions described above will receive no
marks. No resubmission allowed.
▪ You need to present your argument logically and clearly, fully demonstrate the precise
understanding of Chakrabarty’s argument and substantiate your argument convincingly and
with details.
▪ Observe the Chicago Manual of Style referencing practice and properly cite the passages you
quote (i.e. author, title, page number, etc.). Works cited or references should not be counted
toward the 350 word limit.
▪ Any ideas or expressions that are not your own must be placed in quotation marks and
referenced with page number. Academic misconduct will not be tolerated. See:
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
▪ You may share notes and discuss your ideas with others for preparation. But the paper you
submit must be exclusively written by you alone and in your own words clearly distinguishable
from others’. Papers that plagiarize, replicate others, or contain identical or near-identical
passages that appear in other papers will not be accepted or credited.
▪ You must proof-read before submission. Sentences that are incomplete or unintelligible will
not be read or credited.
▪ Late submission and papers submitted via e-mail will not be accepted or credited unless
under extraordinary circumstances. ABSOLUTELY NO EXCPETION!
http://www.artsci.utoronto.ca/osai/The-rules/what-is-academic-misconduct
I N T R O D U C T I O N
The Idea of Provincializing Europe
Europe . . . since 1914 has become provincialized, . . .
only the natural sciences are able to call forth a
quick international echo.
(Hans-Georg Gadamer, 1977)
The West is a name for a subject which gathers itself in
discourse but is also an object constituted discursively;
it is, evidently, a name always associating itself with
those regions, communities, and peoples.
Earth Science LabIn what order do materials settle in waterSo t.docxjoellemurphey
Earth Science Lab:In what order do materials settle in water?
So this is my Topic:
In what order do materials settle in water? Design and carry out an experiment to determine the order in which different sized materials (e.g., sand, gravel, topsoil) settle out in water after they have been mixed up.
but i don't understand the question below:
What are some possible treatments you can use to answer your question? What are some variables that may influence your question, and are they variables that you can easily manipulate and test?
What can i write about the possible treatments?
.
EarlyIntervention Strategies Paper (15 points)The pu.docxjoellemurphey
Early
Intervention Strategies Paper (15 points)
The purpose of the presentation is to help classmates understand different types of intervention strategies for early intervention. Students will be expected to write a 5-7 page paper that is comprised of two parts. In Part I, the student will discuss the role of each of the following professionals that can comprise a treatment team in a maximum of 3 pages:
Developmental Teacher Occupational Therapist Physical Therapist Speech/Language Pathologist
Audiologist Vision Consultant Psychologist Pediatrician
Part II: Furthermore, each student will set up a site visit at a local agency or provider of services to young children and will spend some time observing a particular facility or program that cares for and provides services to infants and young children. The following list should be used to guide the observations. The student should summarize thefollowing information in at least 3 pages:
Name of the facility or program
Ages of the children served
History and philosophy of the facility or program
Structure of the facility or program (Co-Op, Pre-K, )
Services provided
Activities and routines in which the children engage
Adult to child ratio
Types of delays and disabilities of the children who attend this program
Family involvement
Type of setting: inclusive setting, provisions for inclusion
Curriculum used
Would you recommend this facility to a family with a child with a disability? Why or why not?
.
Early Hominids & Australopithecus SubscribeWhat is a too.docxjoellemurphey
Early Hominids & Australopithecus
Subscribe
What is a tool? Did
Sahelanthropus
,
Orrorin
,
Ardipithecus, or Australopithecus
use tools? What evidence shows that they used tools?
What do these groups represent for human evolution? Why are these hominids unique in human evolutionary history?
.
Early scholarly and philosophical manuscripts were in Greek. However.docxjoellemurphey
Early scholarly and philosophical manuscripts were in Greek. However, by the 5th century CE – and onward – language was mainly spread by conquests, trades, religious affiliations, technological advancements or entertainment. (Gascoigne, 2001). For example, as the geographic territory under Roman control grew, the use of Latin as a common language also spread. In areas under Roman control, Latin was the spoken and written language of the courts and commerce, as well as the language of the Christian church. As the Roman Empire expanded, Latin served as a common language that allowed for people of diverse linguistic backgrounds to be able to communicate.
Onward and by the early 14th century, the trend toward the use of vernacular language had spread throughout most of Europe. As monarchies throughout the region began to consolidate, the use of vernacular languages contributed to an increasing nationalism, or feeling of pride in one’s own nation, and in this case among people of similar linguistic backgrounds. People began to feel more connected to local leaders than they did to influences from afar. These sociopolitical shifts, along with the development of moveable type (the printing press), helped to ensure the success of the vernacular languages during the Renaissance.
Assignment:
The goal of this assignment is to research and report on the origins of vernacular language, and its spread while also providing evidence of Latin’s influence on all Western languages.
Choose one native language spoken in Europe, discuss the origins of the vernacular language and describe how the language spread.
As a whole, in what ways has Latin influenced Western language development?
Prepare a 2-page essay (not including cover page and works cited page) answering the questions stated above in APA format.
.
Early Learning & Developmental Guidelines July 2017 1 .docxjoellemurphey
Early Learning &
Developmental Guidelines
July 2017 1
Early Learning and Developmental Guidelines
This document provides current Web links to all State early learning and development guidelines (ELGs). At this
time, all 56 States and Territories have developed ELGs for preschool children, and virtually all have ELGs for
infants and toddlers. The following table provides the website for ELGs from the States.
State ELG Name and Web Site
ELG Age
Range
Alabama Alabama Early Learning Guidelines
http://dhr.alabama.gov/large_docs/aelg.pdf
Birth to 5
years
Alaska Early Learning Guidelines (2007)
https://education.alaska.gov/publications/earlylearningguidelines.pdf
Birth to 5
years
Arizona Early Learning Standards (2013)
http://www.azed.gov/early-childhood/files/2011/11/arizona-early-learning-
standards-3rd-edition.pdf
3 to 5 years
Arizona’s Infant and Toddler Developmental Guidelines (Draft)
http://www.azftf.gov/Documents/Arizona%20Infant%20and%20Toddler%20
Developmental%20Guidelines%20DRAFT%20for%20VETTING.pdf
Birth to 3
years
Arkansas Arkansas Child Development and Early Learning Standards (2016)
http://www.arheadstart.org/Ark_Early_Learning_Standards%20(19)%20(1).p
df
Birth to 5
years
California California Infant/Toddler Learning & Development Foundations (2009)
http://www.cde.ca.gov/sp/cd/re/itfoundations.asp
Birth to 3
years
California Preschool Learning Foundations, Volumes 1-3
http://www.cde.ca.gov/sp/cd/re/psfoundations.asp
3 to 5 years
Colorado Colorado Early Learning & Development Guidelines (2013)
https://www.cde.state.co.us/early/eldgs
Birth to 5
years
Connecticut Guidelines for the Development of Infant & Toddler Early Learning
http://www.ct.gov/dss/lib/dss/dss_early_learning_guidelines.pdf
Birth to 3
years
Connecticut Early Learning and Development Standards (2014)
http://www.ct.gov/oec/lib/oec/earlycare/elds/ctelds.pdf
Birth to 5
years
Connecticut Preschool Assessment Framework (2008)
http://www.sde.ct.gov/sde/lib/sde/PDF/DEPS/Early/Preschool_Assessment_
Framework.pdf
3 to 5 years
http://dhr.alabama.gov/large_docs/aelg.pdf
https://education.alaska.gov/publications/earlylearningguidelines.pdf
http://www.azed.gov/early-childhood/files/2011/11/arizona-early-learning-standards-3rd-edition.pdf
http://www.azed.gov/early-childhood/files/2011/11/arizona-early-learning-standards-3rd-edition.pdf
http://www.azftf.gov/Documents/Arizona%20Infant%20and%20Toddler%20Developmental%20Guidelines%20DRAFT%20for%20VETTING.pdf
http://www.azftf.gov/Documents/Arizona%20Infant%20and%20Toddler%20Developmental%20Guidelines%20DRAFT%20for%20VETTING.pdf
http://www.cde.ca.gov/sp/cd/re/itfoundations.asp
http://www.cde.ca.gov/sp/cd/re/psfoundations.asp
https://www.cde.state.co.us/early/eldgs
http://www.ct.gov/dss/lib/dss/dss_early_learning_guidelines.pdf
http://www.ct.gov/oec/lib/oec/earlycare/elds/ctelds.pdf
http://www.sde.ct.gov/sde/lib/sde/PDF/DEPS/Early/Preschool.
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxjoellemurphey
Early Innovations and Their Impact Today
Wilbur and Orville Wright's innovative spirit allowed them to take their place in history. Their inventions have changed the way people live around the world. At the turn of the century, an explosion in technological achievements occurred. The same kind of energy that went into advances in aviation went into the development of automobiles, telephones, televisions, and immunizations to prevent diseases. These and other innovations and achievements continue to have an enormous impact on human life.
In this week's Discussion, you will analyze two technological innovations/achievements of the late 19th/early 20th century and describe the impact they have on life today.
To prepare for this Discussion:
Review Chapter 2 (pp.10–30) from this week's Learning Resources focusing on technological innovations and achievements around the globe.
Identify two significant technological innovations/achievements (such as the telephone, television, automobiles, and vaccinations) from the late 19th and early 20th centuries.
Consider the ways in which these technologies made an impact on society at the turn of the century.
Reflect on how these technologies continue to impact your life today.
Support your assertions by making at least 2 references, in proper APA format, to your course readings.
With these thoughts in mind:
Post by Day 3 a 2- to 3-paragraph analysis where you do the following:
Identify two significant technological innovations/achievements from the late 19th and early 20th centuries.
Describe, in your opinion, why you believe your choices were significant and created global impacts during that time period.
Explain how these two particular innovations/achievements impact the way you live today.
.
Early childhood professionals have an essential role in creating.docxjoellemurphey
Early childhood professionals have an essential role in creating and supporting stable, responsive environments that reduce and reverse the impact of adversity (Center on the Developing Child, 2015b). In this Discussion, you explore the impact of adverse experiences and the role of the early childhood professional in supporting healthy, nurturing developmental contexts.
.
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxjoellemurphey
Early Constitutional Controversies
In 1788, Alexander Hamilton and James Madison, who had both played active roles at the Constitutional Convention, worked together to write
The Federalist Papers
, a series of articles originally published in New York newspapers to convince readers to back the ratification of the Constitution. Constitutional scholars often refer to these papers to gain an appreciation of the “original intention” of the Framers, how those men expected the federal government to operate under the Constitution, and the powers they sought to grant or deny the federal government. By the early 1790s, however, Hamilton and Madison had divided over basic constitutional questions such as whether or not the federal government could charter a national bank. The American electorate, which had ratified the Constitution, had split on the issue as well, dividing into rival Federalist and Republican parties.
For this assignment, explore
one
significant constitutional controversy, from the first two decades of the United States under the Constitution (1789 to 1821). Topics to consider include:
The incorporation of the Bank of the United States
Debt assumption
The Jay Treaty
The Alien and Sedition Acts
The Election of 1800
John Marshall’s use of judicial review
The Louisiana Purchase
The trial of Aaron Burr
Jefferson’s Embargo
Federalist opposition to the War of 1812
Missouri’s application for statehood
Describe opposing views of the topic under consideration, and explain how each side used the Constitution to support its position. Assess the validity of the two sides according to your own interpretation of the Constitution as well as according to how the Constitution and constitutional principles were understood at the time the controversy occurred.
The paper should draw from at least
one
primary source and
two
scholarly, secondary sources for a total of three sources (not including the Constitution itself). For assistance on the use of primary and secondary sources, please see sections 8.1 and 8.2 of the Ashford Writing Center. The secondary sources should be accessed through any of the academic databases available through the Ashford University library.
The paper must be three pages in length and formatted according to APA style. You must use at least three scholarly resources (at least two of which can be found in the Ashford Online Library) other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar.
.
Early Civilizations MatrixUsing your readings and outside sour.docxjoellemurphey
Early Civilizations Matrix
Using your readings and outside sources complete the following matrix. Be sure to address the following in your matrix:
•
Provide names, titles, dates, brief descriptions of important events, and other details as necessary.
•
Note the details of key political, socioeconomic, technological, artistic, musical, architectural, philosophical, and literary developments for each civilization listed in the table, which were evidenced in the humanities.
Be sure to properly cite the sources that you use in completing this matrix.
.
Early childhood teachers need to stay connected to what is occurring.docxjoellemurphey
Early childhood teachers need to stay connected to what is occurring in the community outside the classroom politically and economically because these factors will influence their classroom. Items of recent debate include social and emotional development, as well as technology in the early childhood classrooms.
For this assignment, take on the role of an early childhood teacher. The principal of your school has placed you on a committee to create a 12-15 slide digital presentation to inform families about current trends in early childhood education. Explain the trends and discuss whether they are developmentally appropriate for young children. In addition, include a description of the effect this trend has on student outcomes. The presentation should discuss early childhood trends and influences on the early childhood classroom in the following areas:
Political (legislative and regulatory)
Economic
Social-emotional
Technological
One trend of choice (e.g., assessment, physical fitness, play in the classroom, emergent curriculums, recess, common core)
Include a title slide, reference slide, and speaker’s notes in your digital presentation.
Use 3-5 scholarly resources to support your research
.
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxjoellemurphey
Early and Middle Adulthood Paper
Prepare
a 1,050- to 1,400-word paper in which you examine the psychological adjustments to aging and lifestyle that occur within individuals during early and middle adulthood. Be sure to include the following:
Discuss how social and intimate relationships evolve and change during early and middle adulthood.
Identify various role changes that occur during early and middle adulthood.
Examine the immediate and future impact of healthy and unhealthy habits practiced during early and middle adulthood.
Use
a minimum of two peer-reviewed sources.
.
Earlier this semester, you participated in a class discussion about .docxjoellemurphey
Earlier this semester, you participated in a class discussion about the character of Bath de Chaucer's wife. You are aware of the complexity of her as a resourceful, cunning, open and ambitious woman. For this essay, I would like you to write a comparison / contrast essay in which you discuss the Wife of Bath as you compare or contrast one or more of these three well-known modern American women: Beyoncé Lil 'Kim, and / or Lady Gaga.
Think beyond and below cliches and perceptions. The comparison should not be disrespectful to these modern iconic women. Obviously, times have changed, and I am in no way suggesting that these modern women share all or even some of the qualities of the Wife of Bath, aside from her drive for independence, sovereignty, and success.
When developing the comparisons and contrasts of it, you should use AT LEAST THREE SOURCES to gather information and knowledge to support the claims and interpretations of it. These sources should be cited in the text and on a works cited page using a precise MLA documentation style.
You will write one essay of 500 - 600 words for this paper . This essay must be formatted in MLA Paper form.
Here is the reading about The character of Bath de Chaucer’s life
From The Canterbury Tales:
General Prologue
Here bygynneth the Book of the Tales of Caunterbury
Whan that Aprill, with his shoures soote
The droghte of March hath perced to the root
And he bathed every veyne in swich liquor,
Of which virtue begotten is the flour;
5 Whan Zephirus eek with his sweete breeth
Inspired hath in every holt and heeth
The tender croppes, and the yonge ring
Hath in the Ram his halfe cours yronne,
And smale foweles maken melodye,
10 That slepen al the nyght with open eye-
(So priketh hem Nature in hir corages);
Thanne longen folk to goon on pilgrimages
And palmeres for to seken straunge strondes
To ferne halwes, kowthe in probry londes;
15 And specially from every shires ende
Of Engelond, to Caunterbury they wende,
The hooly blisful martir for to seke
That hem hath holpen, whan that they were seeke.
Bifil that in that seson, on a day,
20 In Southwerk at the Tabard as I lay
Redy to wenden on my pilgrymage
To Caunterbury with ful devout courage,
At nyght was come into that hostelrye
Wel nyne and twenty in a compaignye
25 Of Sondry folk, by aventure yfalle
In felaweshipe, and pilgrimes were they alle,
That toward Caunterbury wolden ryde.
The rooms and the stables weren wyde,
And wel we weren esed att beste;
30 And shortly, whan the sonne was to rest,
So hadde I spoken with hem everichon
That I was of hir felaweshipe anon,
And made forward erly for to ryse
To take our wey, ther as I yow devyse.
35 But nathelees, whil I have tyme and space,
Er that I ferther in this tale pace,
Me thynketh it acordaunt to resoun
To tel yow to the conditio.
This document provides instruction on writing comparison and contrast essays. It discusses balancing points between topics, writing a strong thesis statement using a T-diagram, and following an effective structure. Specifically, it recommends determining if an essay will focus more on similarities or differences, and using a T-diagram to outline key points for each topic. This allows writers to logically organize their ideas and ensure equal coverage of topics in their essays. Effective introductions and conclusions are also important.
Earlean, please write these notes for me. October 01, 20181. My .docxjoellemurphey
Earlean, please write these notes for me. October 01, 2018
1. My name is Brittney, this is my first day in group, I am from Lake worth, my age is 25, Originally from California, I have been clean 83 days. She grew up Catholic. She is pregnant with her first child 6 weeks states she wants to be a good mother, she went to doctor today it is confirmed. A BOY
Brittney’s does not believe in God she believes the Universe
Tell me one positive thing about yourself? I am FUNNY.
2. Tessa, I am 20 years old, I am from Missouri, I have been clean 8 months, and I’m going home Friday. I have a sister that just relapsed 4 days a go with an overdose, beaten etc. and I am showing her tough love. I got some news that my best friend in New York overdose, so my feelings have been going back and forth. And I am supposed to be the strong one. But I’m OK.
I am Out Going and Determined to make it.
Tessa has a Buddha faith says karma is a bitch
Tessa wants to co to college in January, she stated I am the SIT, says her self esteem is high.
3. Megan, I am 20-year-old from Colorado, Arizona… I am grateful and kind.
Megan believes FLDS Mormon latter-day saints, believes in God, he is loving and caring.
4. Elizabeth, I am 19 years old from St. Louis, Missouri, I was adopted, and I am very CARING. She explained to me before group she was given her meds Seroquel, and she has not had it for 4 days, so she was in and out asleep, but when I called her name she did respond politely. Believes in God
5. She is concerned about going to jail, would like to go to culinary school but this will be her first year.
6. Julian, I am 31 years old I am a Hard Worker I work two jobs Java Juice, and Brews.
Believes in God, and she prays every morning, se shared when she relapsed she did not pray that morning. July 28.
7. Dawn, originally from New York, I have been married a long time with 3children I been living in Florida. My family does not know I have another side I am like a camelina to my family my entire life they had no idea I was smoking crack an that I am a Junky I have lost everything facing divorce
Dawn was raised Catholic and she believes in God. And she would love forgiveness from husband and children, wants a chance to be understood. Teresa stated understand yourself and be accountable to you first.
When Dawn shared her story, it detoured the SPIRITUALITY meeting because Tessa gave the first feedback. And Codependency, cross addictions, service work, was discussed between them. The director Teresa interjected and explained the meaning you are replacing one thing with something else like, going to the GYM, SHOPPING, RELATIONSHIPS, any distraction to get you outside of yourself, or to get validated by someone else. You are hurting you to help someone else.
Breaktime
.
eam Assignment 4 Teaming Across Distance and Culture..docxjoellemurphey
eam Assignment 4: Teaming Across Distance and Culture.
1. What are the major effects of the physical separation of group members? How can distance, in some cases, be beneficial to groups and teams?
2. What other areas of organizational behavior or design are impacted by information technology, and what are the implications for organizational change?
3. Brainstorm some ways to “redesign” your office space (or an office space you have previously worked in) on paper using virtual or flexible space, or flexible furniture. How would this redesign enhance successful teamwork?
4. What are some of the ways that cross-cultural teams are distinguished from other types of teams? What are some of the benefits and difficulties of building a cross-cultural team?
250 Words
.
ead the following articleMother Tongue Maintenance Among North .docxjoellemurphey
ead the following article:
Mother Tongue Maintenance Among North American Ethnic Groups
, Robert W. Shrauf
Address the following:
What are some of the factors behind both the loss and persistence of native languages?
Does losing or maintaining one's native language have any impact on one's degree of acculturation or assimilation?
.
eActivityGo to the United States Equal Employment Oppo.docxjoellemurphey
eActivity
Go to the United States Equal Employment Opportunity Commission’s website to review discrimination types, located at
http://www.eeoc.gov/laws/types
. Be prepared to discuss.
Employment Relationship and Discrimination" Please respond to the following:
From the e-activity, visit the EEOC website link provided and select any three (3) types of discrimination and discuss. What key laws are applicable to the discrimination types you selected?
.
Each year on or around June 15, communities and municipalities aroun.docxjoellemurphey
Each year on or around June 15, communities and municipalities around the world plan activities and programs to recognize World Elder Abuse Awareness Day, a day set aside to spread awareness of the abuse of the elderly (Center of Excellence on Elder Abuse & Neglect, 2013). The abuse of older adults is a growing concern and statistics suggest that the number of elders experiencing abuse is an alarmingly high number. Research suggests that close to half the people diagnosed with dementia experience some form of abuse (Cooper, C., Selwood, A., Blanchard, M., Walker, Z., Blizard, R., & Livingston, G., 2009; Wiglesworth, A., Mosqueda, L., Mulnard, R., Liao, S., Gibbs, L., & Fitzgerald, W., 2010, as cited on http://www.ncea.aoa.gov/Library/Data/index.aspx). Elder abuse takes on many forms and can include physical, emotional, psychological, and economic abuse. The legendary American actor, Mickey Rooney, spoke to the United States Senate, describing his own experiences of pain and neglect at the hands of his stepson, asking legislators to take seriously the abuse of the elderly.
Respond to colleagues by suggesting alternative strategies. The Original posts are contained in the attachement.
Support your responses with specific references to the Learning Resources. Be sure to provide full APA citations for your references.
.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
1. Riley v. California, 134 S.Ct. 2473 (2014)
134 S.Ct. 2473
Supreme Court of the United States
David Leon RILEY, Petitioner
v.
CALIFORNIA.
United States, Petitioner
v.
Brima Wurie.
Nos. 13–132, 13–212. | Argued April 29, 2014. |
Decided June 25, 2014.
Opinion
Chief Justice ROBERTS delivered the opinion of the
Court.
These two cases raise a common question: whether the
police may, without a warrant, search digital information
on a cell phone seized from an individual who has been
arrested.
In the first case, petitioner David Riley was stopped by a
police officer for driving with expired registration tags. In
the course of the stop, the officer also learned that Riley’s
2. license had been suspended. The officer impounded
Riley’s car, pursuant to department policy, and another
officer conducted an inventory search of the car. Riley was
arrested for possession of concealed and loaded firearms
when that search turned up two handguns under the car’s
hood.
An officer searched Riley incident to the arrest and found
items associated with the “Bloods” street gang. He also
seized a cell phone from Riley’s pants pocket. According
to Riley’s uncontradicted assertion, the phone was a “smart
phone,” a cell phone with a broad range of other functions
based on advanced computing capability, large storage
capacity, and Internet connectivity. The officer accessed
information on the phone and noticed that some words
(presumably in text messages or a contacts list) were
preceded by the letters “CK”—a label that, he believed,
stood for “Crip Killers,” a slang term for members of the
Bloods gang.
At the police station about two hours after the arrest, a
detective specializing in gangs further examined the
contents of the phone. The detective testified that he “went
through” Riley’s phone “looking for evidence, because ...
gang members will *2481 often video themselves with
guns or take pictures of themselves with the guns.” App. in
No. 13–132, p. 20. Although there was “a lot of stuff” on
the phone, particular files that “caught [the detective’s]
eye” included videos of young men sparring while
someone yelled encouragement using the moniker
“Blood.” Id., at 11–13. The police also found photographs
of Riley standing in front of a car they suspected had been
involved in a shooting a few weeks earlier. . . .
Prior to trial . . . , Riley moved to suppress all evidence that
3. the police had obtained from his cell phone. He contended
that the searches of his phone violated the Fourth
Amendment, because they had been performed without a
warrant and were not otherwise justified by exigent
circumstances….
II
The Fourth Amendment provides:
“The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not
be violated, and no Warrants shall issue, but
upon probable cause, supported by Oath or
affirmation, and particularly describing the
place to be searched, and the persons or
things to be seized.”
[1] [2] [3] As the text makes clear, “the ultimate touchstone of
the Fourth Amendment is ‘reasonableness.’ ” Our cases
have determined that “[w]here a search is undertaken by
law enforcement officials to discover evidence of criminal
wrongdoing, ... reasonableness generally requires the
obtaining of a judicial warrant.” Such a warrant ensures
that the inferences to support a search are “drawn by a
neutral and detached magistrate instead of being judged by
the officer engaged in the often competitive enterprise of
ferreting out crime.” In the absence of a warrant, a search
is reasonable only if it falls within a specific exception to
the warrant requirement.
The two cases before us concern the reasonableness of a
warrantless search incident to a lawful arrest. . . . Although
the existence of the exception for such searches has been
5. textData=(sc.Keycite)
http://www.westlaw.com/Link/Document/FullText?findType=Y
&serNum=1969133021&pubNum=708&originationContext=doc
ument&vr=3.0&rs=cblt1.0&transitionType=DocumentItem&con
textData=(sc.Keycite)
Riley v. California, 134 S.Ct. 2473 (2014)
[4] The Court crafted the following rule for assessing the
reasonableness of a search incident to arrest:
“When an arrest is made, it is reasonable for the arresting
officer to search the person arrested in order to remove
any weapons that the latter might seek to use in order to
resist arrest or effect his escape. Otherwise, the officer’s
safety might well be endangered, and the arrest itself
frustrated. In addition, it is entirely reasonable for the
arresting officer to search for and seize any evidence on
the arrestee’s person in order to prevent its concealment
or destruction.... There is ample justification, therefore,
for a search of the arrestee’s person and the area ‘within
his immediate control’—construing that phrase to mean
the area from within which he might gain possession of
a weapon or destructible evidence.” Id., at 762–763, 89
S.Ct. 2034.
The extensive warrantless search of Chimel’s home did not
fit within this exception, because it was not needed to
protect officer safety or to preserve evidence. Id., at 763,
768, 89 S.Ct. 2034.
III
These cases require us to decide how the search incident to
6. arrest doctrine applies to modern cell phones, which are
now such a pervasive and insistent part of daily life that the
proverbial visitor from Mars might conclude they were an
important feature of human anatomy. A smart phone of the
sort taken from Riley was unheard of ten years ago; a
significant majority of American adults now own such
phones. See A. Smith, Pew Research Center, Smartphone
Ownership—2013 Update (June 5, 2013)....
A
We first consider each Chimel concern [officer safety
and/or destruction of evidence] in turn. . . .
1
[9] Digital data stored on a cell phone cannot itself be used
as a weapon to harm an arresting officer or to effectuate the
arrestee’s escape. Law enforcement officers remain free to
examine the physical aspects of a phone to ensure that it
will not be used as a weapon—say, to determine whether
there is a razor blade hidden between the phone and its
case. Once an officer has secured a phone and eliminated
any potential physical threats, however, data on the phone
can endanger no one. . . .
The United States and California both suggest that a search
of cell phone data might help ensure officer safety in more
indirect ways, for example by alerting officers that
confederates of the arrestee are headed to the scene. There
is undoubtedly a strong government interest in warning
officers about such possibilities, but neither the United
States nor California offers evidence to suggest that their
concerns are based on actual experience. The *2486
proposed consideration would also represent a broadening
of Chimel ‘s concern that an arrestee himself might grab a
7. weapon and use it against an officer “to resist arrest or
effect his escape.” 395 U.S., at 763, 89 S.Ct. 2034. And any
such threats from outside the arrest scene do not “lurk[ ] in
all custodial arrests.” Chadwick, 433 U.S., at 14–15, 97
S.Ct. 2476. Accordingly, the interest in protecting officer
safety does not justify dispensing with the warrant
requirement across the board. To the extent dangers to
arresting officers may be implicated in a particular way in
a particular case, they are better addressed through
consideration of case-specific exceptions to the warrant
requirement, such as the one for exigent circumstances….
2
The United States and California focus primarily on the
second Chimel rationale: preventing the destruction of
evidence.
Both Riley and Wurie concede that officers could have
seized and secured their cell phones to prevent destruction
of evidence while seeking a warrant. That is a sensible
concession. . . . And once law enforcement officers have
secured a cell phone, there is no longer any risk that the
arrestee himself will be able to delete incriminating data
from the phone.
The United States and California argue that information on
a cell phone may nevertheless be vulnerable to two types
of evidence destruction unique to digital data—remote
wiping and data encryption. Remote wiping occurs when a
phone, connected to a wireless network, receives a signal
that erases stored data. This can happen when a third party
sends a remote signal or when a phone is preprogrammed
to delete data upon entering or leaving certain geographic
areas (so-called “geofencing”). . . . . Encryption is a
security feature that some modern cell phones use in
addition to password protection. When such phones lock,
10. Riley v. California, 134 S.Ct. 2473 (2014)
We have also been given little reason to believe that either
problem is prevalent…. In any event, as to remote wiping,
law enforcement is not without specific means to address
the threat. Remote wiping can be fully prevented by
disconnecting a phone from the network. There are at least
two simple ways to do this: First, law enforcement officers
can turn the phone off or remove its battery. Second, if they
are concerned about encryption or other potential
problems, they can leave a phone powered on and place it
in an enclosure that isolates the phone from radio waves.
Such devices are commonly called “Faraday bags,” after
the English scientist Michael Faraday. They are essentially
sandwich bags made of aluminum foil: cheap, lightweight,
and easy to use…. In fact, a number of law enforcement
agencies around the country already encourage the use of
Faraday bags.
To the extent that law enforcement still has specific
concerns about the potential loss of evidence in a particular
case, there remain more targeted ways to address those
concerns. If “the police are truly confronted with a ‘now or
never’ situation,” …. they may be able to rely on exigent
circumstances to search the phone immediately…. Or, if
officers happen to seize a phone in an unlocked state, they
may be able to disable a phone’s automatic-lock feature in
order to prevent the phone from locking and encrypting
data….
B
11. [11] The search incident to arrest exception rests not only on
the heightened government interests at stake in a volatile
arrest situation, but also on an arrestee’s reduced privacy
interests upon being taken into police custody….
[12] The fact that an arrestee has diminished privacy
interests does not mean that the Fourth Amendment falls
out of the picture entirely. Not every search “is acceptable
solely because a person is in custody.” To the contrary,
when “privacy-related concerns are weighty enough” a
“search may require a warrant, notwithstanding the
diminished expectations of privacy of the arrestee.” Ibid.
One such example, of course, is Chimel. Chimel refused to
“characteriz[e] the invasion of privacy that results from a
top-to-bottom search of a man’s house as ‘minor.’ ”
Because a search of the arrestee’s entire house was a
substantial invasion beyond the arrest itself, the Court
concluded that a warrant was required.
[13] The United States asserts that a search of all data stored
on a cell phone is “materially indistinguishable” from
searches of [other] physical items. That is like saying a ride
on horseback is materially indistinguishable from a flight
to the moon. Both are ways of getting from point A to point
B, but little else justifies lumping them together….
1
Cell phones differ in both a quantitative and a qualitative
sense from other objects that might be kept on an arrestee’s
person. The term “cell phone” is itself misleading
shorthand; many of these devices are in fact minicomputers
that also happen to have the capacity to be used as a
telephone. They could just as easily be called cameras,
video players, rolodexes, calendars, tape recorders,
libraries, diaries, albums, televisions, maps, or newspapers.
12. One of the most notable distinguishing features of modern
cell phones is their immense storage capacity. Before cell
phones, a search of a person was limited by physical
realities and tended as a general matter to constitute only a
narrow intrusion on privacy…. Most people cannot lug
around every piece of mail they have received for the past
several months, every picture they have taken, or every
book or article they have read—nor would they have any
reason to attempt to do so. And if they did, they would have
to drag behind them a trunk of the sort held to require a
search warrant in Chadwick, supra, rather than a container
the size of the cigarette package in Robinson.
But the possible intrusion on privacy is not physically
limited in the same way when it comes to cell phones. The
current top-selling smart phone has a standard capacity of
16 gigabytes (and is available with up to 64 gigabytes).
Sixteen gigabytes translates to millions of pages of text,
thousands of pictures, or hundreds of videos….
The storage capacity of cell phones has several interrelated
consequences for privacy. First, a cell phone collects in one
place many distinct types of information—an address, a
note, a prescription, a bank statement, a video—that reveal
much more in combination than any isolated record.
Second, a cell phone’s capacity allows even just one type
of information to convey far more than previously possible.
The sum of an individual’s private life can be reconstructed
through a thousand photographs labeled with dates,
locations, and descriptions; the same cannot be said of a
photograph or two of loved ones tucked into a wallet.
Third, the data on a phone can date back to the purchase of
the phone, or even earlier….
Finally, there is an element of pervasiveness that
characterizes cell phones but not physical records. Prior to
14. Consumer Habits Study (June 2013). A decade ago police
officers searching an arrestee might have occasionally
stumbled across a highly personal item such as a diary.
But those discoveries were likely to be few and far
between. Today, by contrast, it is no exaggeration to say
that many of the more than 90% of American adults who
own a cell phone keep on their person a digital record of
nearly every aspect of their lives—from the mundane to the
intimate.…
Although the data stored on a cell phone is distinguished
from physical records by quantity alone, certain types of
data are also qualitatively different. An Internet search and
browsing history, for example, can be found on an Internet-
enabled phone and could reveal an individual’s private
interests or concerns—perhaps a search for certain
symptoms of disease, coupled with frequent visits to
WebMD. Data on a cell phone can also reveal where a
person has been. Historic location information is a standard
feature on many smart phones and can reconstruct
someone’s specific movements down to the minute, not
only around town but also within a particular building….
Mobile application software on a cell phone, or “apps,”
offer a range of tools for managing detailed information
about all aspects of a person’s life. There are apps for
Democratic Party news and Republican Party news; apps
for alcohol, drug, and gambling addictions; apps for
sharing prayer requests; apps for tracking pregnancy
symptoms; apps for planning your budget; apps for every
conceivable hobby or pastime; apps for improving your
romantic life. There are popular apps for buying or selling
just about anything, and the records of such transactions
may be accessible on the phone indefinitely. There are over
a million apps available in each of the two major app stores;
the phrase “there’s an app for that” is now part of the
15. popular lexicon. The average smart phone user has
installed 33 apps, which together can form a revealing
montage of the user’s life.
In 1926, Learned Hand observed (in an opinion later
quoted in Chimel ) that it is “a totally different thing to
search a man’s *2491 pockets and use against him what
they contain, from ransacking his house for everything
which may incriminate him.” If his pockets contain a cell
phone, however, that is no longer true. Indeed, a cell phone
search would typically expose to the government far more
than the most exhaustive search of a house: A phone not
only contains in digital form many sensitive records
previously found in the home; it also contains a broad array
of private information never found in a home in any form—
unless the phone is….
IV
We cannot deny that our decision today will have an impact
on the ability of law enforcement to combat crime. Cell
phones have become important tools in facilitating
coordination and communication among members of
criminal enterprises, and can provide valuable
incriminating information about dangerous criminals.
Privacy comes at a cost.
Our holding, of course, is not that the information on a cell
phone is immune from search; it is instead that a warrant is
generally required before such a search, even when a cell
phone is seized incident to arrest. Our cases have
historically recognized that the warrant requirement is “an
important working part of our machinery of government,”
not merely “an inconvenience to be somehow ‘weighed’
16. against the claims of police efficiency.” Coolidge v. New
Hampshire, 403 U.S. 443, 481, 91 S.Ct. 2022, 29 L.Ed.2d
564 (1971). Recent technological advances similar to those
discussed here have, in addition, made the process of
obtaining a warrant itself more efficient. See McNeely, 569
U.S., at ––––, 133 S.Ct., at 1561–1563; id., at ––––, 133
S.Ct., at 1573 (ROBERTS, C.J., concurring in part and
dissenting in part) (describing jurisdiction where “police
officers can e-mail warrant requests to judges’ iPads [and]
judges have signed such warrants and e-mailed them back
to officers in less than 15 minutes”)….
[19] In light of the availability of the exigent circumstances
exception, there is no reason to believe that law
enforcement officers will not be able to address some of
the more extreme hypotheticals that have been suggested:
a suspect texting an accomplice who, it is feared, is
preparing to detonate a bomb, or a child abductor who may
have information about the child’s location on his cell
phone. The defendants here recognize—indeed, they
stress—that such fact-specific threats may justify a
warrantless search of cell phone data. The critical point is
that, unlike the search incident to arrest exception, the
exigent circumstances exception requires a court to
examine whether an emergency justified a warrantless
search in each particular case. See McNeely, supra, at –––
–, 133 S.Ct., at 1559.
….Modern cell phones are not just another technological
convenience. With all they contain and all they may reveal,
they hold *2495 for many Americans “the privacies of
life,” Boyd, supra, at 630, 6 S.Ct. 524. The fact that
technology now allows an individual to carry such
information in his hand does not make the information any
less worthy of the protection for which the Founders
fought. Our answer to the question of what police must do
19. NOTES
1. The statement of facts should be a short summary including
only the essential facts. In
most cases you read, the decision is based on a few determining
facts. DO NOT
COPY THE ENTIRE FACTUAL STATEMENT FROM THE
TEXT. State the
procedural facts (who is suing whom, the cause of action, the
remedy sought, the result
in the lower court or courts) - what we call the "posture of the
case."
2. The ISSUE or question of law is the central or focal legal
question in the case. The
student will have to determine the question of law by a careful
reading of the case.
NOTE: There may be more than one issue.
3. The RULE of law will generally be obvious. However, the
judge does not always state
the rule of law clearly. In some cases, it must be abstracted by
a careful reading of the
text. The question to ask is, "What legal principle does this
case stand for?" If there is
more than one issue, there should be a rule for each issue.
4. APPLYING the rule or rules of law to the facts of the case is
an important part of
20. briefing. Look for specific facts in the case to justify the
conclusion of the court. This
is the analytical aspect.
5. CONCLUSION - how the Court answers the problem.
6. All case briefs must be in writing and must contain ALL six
parts of the case brief
format. Be prepared to read the brief in class and answer
questions about it. The
original will be turned into the instructor. Keep a copy of your
brief.
ENGLAND v. S & M FOODS, INC.
511 So. 2d 1313 (La.Ct.App. 1987)
OPINION
[*1314] The plaintiff, Betty England, instituted this action
against defendants, S & M Foods,
Inc. and Larry Garley, to recover damages for a battery which
allegedly occurred in a work
related argument. Defendants appeal the trial court judgment
which awarded plaintiff $ 1,000.00
for humiliation and embarrassment as a result of the battery. We
affirm.
Plaintiff was employed by S & M Foods, Inc. at its Dairy Queen
21. restaurant in Tallulah, Louisiana
when the incident occurred. Larry Garley was the manager of
this restaurant. Garley became
upset when several hamburgers were incorrectly prepared
resulting in them being returned by the
customer who had ordered them. Garley allegedly expressed his
dissatisfaction by using profane
language and throwing a hamburger which hit plaintiff on the
leg.
The sole issue on appeal is whether the trial court erred in
concluding [**2] a battery was
committed.
Defendants contend no battery was committed because Garley
did not intend to inflict bodily
harm upon plaintiff. They argue Garley was disgusted about the
returned hamburgers and he
threw one hamburger toward a trash can and it inadvertently
splattered on plaintiff. Defendants
contend Garley did not intend to physically touch or injure
plaintiff and her embarrassment was
caused as much by her overreaction to the situation as by
Garley's conduct.
Plaintiff contends a battery may consist of forcible touching in
an angry, revengeful, rude or
insolent manner and damages are recoverable for humiliation
and mental distress. She asserts
Garley admitted he may have struck her with the hamburger, he
did not deny using profanity, he
was looking at her when he threw the hamburger and several
customers observed the incident.
Plaintiff contends the incident caused her to cry and become
emotionally upset. For these reasons,
plaintiff contends the judgment should be affirmed.
22. A battery is any intentional and unpermitted contact with the
plaintiff's person or anything
attached to it or practically identified with it. Vascocu v.
Singletary, 404 So.2d 301 (La. App.
[**3] 3d Cir. 1981), writ den., 409 So.2d 676 (La. 1981);
Prosser: Law of Torts, (4th Ed.), p. 34.
In the area of intentional torts, intent means the defendant
either desired to bring about the
physical results of his act or believed they were substantially
certain to follow from what he did.
Bazley v. Tortorich, 397 So.2d 475 (La. 1981); Monk v.
Veillon, 312 So.2d 377 (La. App. 3d Cir.
1975). In order to recover for a battery, the plaintiff must prove
by a preponderance of the
evidence that his damages resulted from an unprovoked attack
by the defendant. Gilliam v.
Williams, 451 So.2d 681 (La. App. 2d Cir. 1984); Hemsley v.
Sims, 325 So.2d 877 (La. App. 2d
Cir. 1976), writ den., 328 So.2d 374 (La. 1976).
Mental distress and humiliation in connection with a battery are
compensable items of damage.
Reck v. Stevens, 373 So.2d 498 (La. 1979); Squyres v. Phillips,
285 So.2d 337 (La. App. 3d Cir.
1973); Earle v. Wilhite, 299 So.2d 393 (La. App. 2d Cir. 1974).
The trial judge is in a better position to evaluate the credibility
of witnesses and the weight of
evidence than an appellate [*1315] court which does not see or
hear the witnesses. For this
reason, [**4] a reviewing court should adopt the trial court's
finding as its own in the absence of
23. clear error, even if other conclusions from the same evidence
are equally reasonable. Arceneaux
v. Domingue, 365 So.2d 1330 (La. 1978); Harris v. Pineset, 499
So.2d 499 (La. App. 2d Cir.
1986).
The trial judge found that Garley committed a battery by
throwing a hamburger which hit
plaintiff on the leg. The trial judge further found the incident
occurred in front of patrons and
other employees of Dairy Queen and caused plaintiff
humiliation and embarrassment. For the
reasons which follow, we find no clear error in these findings of
the trial judge.
Plaintiff testified Garley used profane language when he told
her to prepare the hamburgers
correctly. She stated Garley, while looking straight at her, then
threw the hamburger which hit her
on the leg. Plaintiff testified she argued with Garley about the
matter and several patrons
observed the incident which caused her to cry and become
emotionally upset.
Garley testified he threw the hamburger toward a trash can
because he was disgusted with the
way the hamburgers were being prepared. He stated he did not
see where the hamburger hit,
but [**5] noticed some of it splattered on plaintiff and Alice
Rash, another employee. Garley
testified he did not intend to hit anyone with the hamburger. He
stated he and plaintiff argued
about the matter and he told the plaintiff to go home.
Ms. Rash testified she did not see Garley throw the hamburger,
but observed a hamburger hit the
floor and it splattered mayonnaise and mustard on her and
24. plaintiff.
Two other employees who were working on the day of the
incident heard Garley's complaints
about the hamburgers going out wrong and saw a hamburger hit
the floor, but did not see Garley
throw it.
The totality of the evidence provided a substantial basis for the
trial judge to conclude Garley
must have been substantially certain the hamburger would hit
plaintiff or splatter on plaintiff
when he threw it toward her after becoming disgusted over the
manner in which the hamburgers
were being prepared. His contact with plaintiff was, therefore,
intentional and unpermitted and
constituted a battery. The incident occurred in front of several
patrons and other employees of
Dairy Queen and caused plaintiff embarrassment and
humiliation, although she suffered no
physical injuries.
The trial judge [**6] had the opportunity to see and hear the
witnesses as they testified. The
record shows no clear error in the trial judge's finding that a
battery was committed.
The judgment appealed is affirmed at defendants' costs.
AFFIRMED.
25. EXAMPLE CASE BRIEF
(1) Title: England v. S&M Foods, Inc., (La.Ct.App. 1987).
Judgment at trial for England; Defendants appeal.
(2) Facts: England was employed at a Dairy Queen Restaurant
owned by S&M Foods,
Inc. The restaurant manager, Garley, used profane language,
looked straight at
England and threw a hamburger which hit her on the leg.
Another employee,
Rash, testified that she did not see Garley throw the hamburger
but that it did hit
the floor and splatter mayonnaise and mustard on her and
England.
(3) Issue: Did Garley have the requisite intent for battery?
(4) Rule: A defendant has acted with intent if he or she either
desired to bring about the
physical results of his or her act or believed they were
substantially certain to
result from his or her actions.
(5) Analysis: Garley threw a hamburger in England's direction
either hitting her directly on
26. the leg (her testimony) or indirectly (splattering her with
mayonnaise and
mustard). He therefore acted with substantial certainty that
offensive touching of
plaintiff would occur.
6. Conclusion: Judgment affirmed; the contact was a battery
due to sufficient intent.
Katie Miller, Reference Librarian
Florida State University College of Law
How to brief a case
27. 1
Why do I have to do this?
You’re not in law school so you normally just show up to class,
do some reading, take some notes during your professors
lectures. Why would you have to brief a case? (1) Prof. Prum is
requiring it, and (2) it is a good sneak peak into law school.
28. Law school has a different format. Usually your entire grade is
based off of one exam and your professors don’t just stand at
the front of the class to give you the answers to questions that
will appear on the exam.
2
In law school Professors expect that you read a case and create
a brief. They don’t collect the briefs, but it is expected that the
students are using them during class.
You used to the briefs to gain an understanding of the case and
29. it helps you prepare to discuss the case. The professor may use
the Socratic Method where a student is called upon to answer
questions and make the student think critically about the case.
Not opinions or argument or things found directly in the case
but a critical analysis or changing hypotheticals about the case.
To have this type of discussion you must really understand the
case and the briefs help you reach that point.
Reading and highlighting isn’t enough. Briefing slows you
down and makes your read slower, think about the materials.
Then you use your briefs to create outlines which you use to
study for your exam.
3
Professors expect it
Socratic Method
Active Learning & outlines
HOW LONG DO I HAVE TO DO THIS?
31. You start to figure out the important information and how in-
depth you need to go to understand the case. Some people brief
all the way through law school. Some may be able to create
shorter briefs or highlight and write in the margins. So the
process gets quicker and briefs may be shorter.
5
It is an evolutionary process
It gets easier
Briefs get shorter
What am I looking at?
Background info
(don’t worry about all of it yet)
Opinion from the court
32. One judge or a panel of judges
Trial court or appellate court
You’re given a case name by Professor Prum, you look it up,
but what are you actually looking at?
What you see on TV is usually a trial. At the conclusion of a
trial the judge may provide a written opinion. OR if the trial
court’s decision is appealed then there is another opinion from
an appellate court. Typically the cases you read in law school
are appellate court opinions. It’s the judges words telling you
who won and why. Could be one judge or a panel of judges.
Supreme Court of the US is an appellate court, with a panel of
33. judges.
6
An example from LexisNexis Academic.
Caption or case name – could be last names or names of a
corporation or state or people if it is a criminal case
Court – trial/appellate/location
Citation – is where to find it
34. Date
Other stuff – don’t worry about the other stuff. It is helpful for
doing legal research, not needed for this brief.
7
England v. S & M Foods, Inc., 511 So. 2d 1313 (La. Ct. App.
1987)
Volume #
Southern Reporter 2nd ed.
Page #
35. Taking a closer look at the citation, just these random numbers
and letters are enough to find any case. The first numbers are
telling you which volume the case is in. The strange letters are
an abbreviation of the title of the book. We call books that
contain opinions reporters. So the Southern Reporter 2nd
edition. Then the last number is the page number. So if you
walked in the library with just this info we could walk directly
to the books and find this case. But you won’t have to look in
the books, you will use the citation to find the cases on
LexisNexis Academic.
8
36. Another confusing aspect about the law- the publishers of the
reporters aren’t very good at geography. You can’t necessarily
tell the area of a case from the reporter. Kansas is in the
pacific? GA not in Southern, NY, OH, IL in north east?
9
37. To get an idea of what the books look like in the library, these
are some of the Southern Reporters. They wrap around to the
other side. There are 999 volumes in the second edition, then
they moved to the 3rd edition.
10
* Indicates the page number
If you ever see * * * it means the case was edited and part of
the opinion was removed
If you are reading a case on LexisNexis Academic and you see
38. symbols within the text, like a star it is just telling you the page
number that you would be on if you were reading it in the book.
*** means that part of the case was removed.
11
Ignore all this until you get to the word “opinion”.
12
Briefing a case
39. Reading a case
VS.
A brief is a
Organized summary of the important elements of a written
opinion
Summarize the parts to understand the whole
You all know how to read, but what is a brief? It is a summary
of the important parts of an opinion. You summarize the parts to
understand the whole. Have you ever heard on the news that the
president is getting briefed on an issue? Someone is just telling
him the important things he needs to know. A case brief is just
40. the important parts of a case.
13
Before you brief a case
Read the case carefully
Use a legal dictionary
Keep track of the parties
Take minimal notes (in pencil)
What does a brief include?
Rule
Holding
41. Facts
Analysis or application
Issue
Identification
Some people do them differently, different order or condense
areas, but generally they have the following headings:
15
NAME – parties, who’s who, (buyer, employer, etc.)
CITATION
YEAR
42. COURT
JUDGE
PAGE/SECTION OF BOOK
IDENTIFICATION
This seems like a lot of information but everything except the
judge is included within the full citation. For names you may
want to include their role in the lawsuit, so leasor, leasee,
defendant, plaintiff, husband, wife, etc.
16
FACTS
43. FOCUS ON MATERIAL FACTS (FACTS WITH LEGAL
SIGNIFICANCE WHICH INFLUENCE A COURT’S
REASONING)
A FACT IS LEGALLY SIGNIFICANT IF ALTERING OR
ELIMINATING THAT FACT WOULD CHANGE THE LEGAL
CONCLUSION OR RESULT OF THE CASE.
One of the biggest differences between lawyers and non-lawyers
is the ability to determine facts from material facts. So
something like the color of a car might not matter if the issue is
just whether someone ran a red light. So instead of dwelling on
things that don’t matter, you need to try and figure out the facts
44. that make a difference in the case. When you read the case, the
court has already gotten rid of a lot of the extra stuff, but still
contains things that are not legally significant.
17
PROCEDURAL HISTORY
(Part of facts)
ALL THESE FACTS OCCUR AFTER THE LAWSUIT IS
FILED
PARTY WHO BROUGHT ACTION
CLAIMS, DEFENSES, AND RELIEF SOUGHT
TRIAL COURT DISPOSITION
DISPOSITION OF INTERMEDIATE COURTS
45. Part of the facts is procedural history. Instead of the facts that
describe what happened that led to litigation, the procedural
history explains what has already happened in the court. So who
won or lost below if the opinion you are reading is an appeal.
Has the case gone up or down multiple times? The facts are
everything that led up to the litigation, the procedural history is
the history of the legal case.
18
ISSUE
MATERIAL QUESTION OF FACT AND/OR LAW THAT
ARISES IN A CASE
46. What is it that the parties want the court to answer? Why have
they entered into litigation?
Was the grocery store negligent in not cleaning up a spill that
resulted in an injury when the employee caused the spill? Does
the mother owe additional alimony if …
19
ISSUE
MUST BE STATED NARROWLY SO IT IDENTIFIES THE
LEGAL QUESTION THAT DISTINGUISHES THIS CASE
FROM OTHERS
48. Under tort law of negligence is a grocery story liable when a
customer falls on a spill? Under criminal law does evidence get
excluded if police perform an illegal search and seizure?
21
RULE
THE LOGIC THAT SUPPORTS THE COURT’S DECISION
THE RULE OF LAW THAT THE COURT APPLIES
If premises are open to the public and owner has notice of a
49. spill it is negligent if the spill is not cleaned up.
22
RULE
ALLOWS YOU TO PREDICT HOW THE HOLDING MIGHT
BE INFLUENCED BY DIFFERENT FACTS
THE RULE OF LAW CAN COME FROM A STATUTE, CASE
RULE, REGULATION
23
More of a general statement that is applied to various facts.
50. RULE
IS THE “WHY” OF THE RESULT OF THE CASE
24
The issue is “what” the parties want the court to answer, the
rule is why the court answered it this way. There is a trick to
finding the rule in a case which we will go over in an example.
ANALYSIS or APPLICATION
APPLY THESE FACTS TO THIS LAW
51. 25
This facts of this specific case applied to the general rule is the
analysis.
So for the tort case of a grocery store injury, if the case
involved an employee causing a spill and the rule required that
the store knew of the spill but didn’t clean it up, the analysis
would discuss the store’s liability based on the employee’s
knowledge.
THE HOLDING
52. ANSWER TO THE ISSUE
26
THE HOLDING
IDENTIFY THE CONSIDERATIONS THAT WERE
ESSENTIAL TO THE DECISION
54. 28
The result of the analysis. The answer to the issue. The store is
negligent and liable for the injury because it had notice and the
store must pay damages.
D.A.B.E., Inc. v. City of Toledo
Citation:
393 F.3d 692 (6th Cir. 2005).
55. 29
D.A.B.E., Inc. v. City of Toledo
Facts
City of Toledo passed an ordinance banning smoking in public
places including bars, restaurants, bowling alleys. A group of
restaurant and bar owners filed suit claiming that the ordinance
constituted a regulatory taking of their property in violation of
the U.S. Constitution and that the ordinance was in violation of
Ohio law.
56. 30
Notice how extraneous facts are missing. It doesn’t talk about
whether the places are all ages or the operating hours because
those things are not legally significant.
D.A.B.E., Inc. v. City of Toledo
Procedural History
Restaurant and bar owners preliminary and permanent
injunction was denied.
57. 31
If you don’t know what an injunction is look it up! An official
legal dictionary is Black’s legal dictionary but there are plenty
of free legal dictionaries online if you just google legal terms.
D.A.B.E., Inc, v. City of Toledo
Issue (s)
Issue 1: Does the ordinance constitute a regulatory taking in
that it denies the property owner “economically viable use of
his land” in violation of the 5th Amendment to the U.S.
Constitution?
58. 32
Look up regulatory taking or 5th amendment if you didn’t know
what they mean. 5th amendment protects against government
interference so no taking of private property for public use
without just compensation.
D.A.B.E., Inc. v. City of Toledo
Rule (1)
An economic taking must almost completely deny a property
owner economic use of their land, losing customers or profit is
not enough.
It is a taking if it on its face, prevents beneficial use of the
land, categorically prohibits rather than merely regulate the
conditions under which operations may be conducted, and
purports to regulate alternative uses.
59. 33
This is the test to determine whether something is a taking.
D.A.B.E., Inc. v. City of Toledo
Application or Analysis
The plaintiffs have only provided allegations of loss or fear
that they will lose customers which is not enough to
demonstrate a taking.
A smoking room might require a financial investment but
that is not enough to constitute a taking. The owners could
make other use of their property.
60. 34
Apply the facts to the rule.
D.A.B.E., Inc. v. City of Toledo
Holding: AFFIRMED
The ordinance did not constitute a regulatory taking because it
only limited smoking, not prohibited it and plaintiffs may have
other economic uses for the property.
61. 35
Agree with the result below. Reversed would mean the court
disagrees with the trial court and a different outcome then
below.
How do I find cases?
http://www.lib.fsu.edu/
65. Electronic copy available at: http://ssrn.com/abstract=1160925
Electronic copy available at: http://ssrn.com/abstract=1160925
11 GREEN BAG 2D 51
HOW TO READ A
LEGAL OPINION
A GUIDE FOR NEW LAW STUDENTS
Orin S. Kerr†
This essay is designed to help new law students prepare for the
first few weeks of class. It explains what judicial opinions are,
how they are structured, and what law students should look
for when reading them.
I. WHAT’S IN A LEGAL OPINION?
66. hen two people disagree and that disagreement leads to a
lawsuit, the lawsuit will sometimes end with a ruling by a
judge in favor of one side. The judge will explain the ruling in a
written document referred to as an “opinion.” The opinion
explains
what the case is about, discusses the relevant legal principles,
and
then applies the law to the facts to reach a ruling in favor of one
side
and against the other.
Modern judicial opinions reflect hundreds of years of history
and
practice. They usually follow a simple and predictable formula.
This
† Orin Kerr is a professor of law at the George Washington
University Law School. This essay
can be freely distributed for non-commercial uses under the
Creative Commons Attribution-
NonCommercial-NoDerivs 3.0 Unported license. For the terms
of the license, visit creative-
commons.org/licenses/by-nc-nd/3.0/legalcode.
W
Orin S. Kerr
52 11 GREEN BAG 2D
section takes you through the basic formula. It starts with the
intro-
67. ductory materials at the top of an opinion and then moves on to
the
body of the opinion.
The Caption
The first part of the case is the title of the case, known as the
“cap-
tion.” Examples include Brown v. Board of Education and
Miranda v.
Arizona. The caption usually tells you the last names of the
person
who brought the lawsuit and the person who is being sued.
These
two sides are often referred to as the “parties” or as the
“litigants” in
the case. For example, if Ms. Smith sues Mr. Jones, the case
caption
may be Smith v. Jones (or, depending on the court, Jones v.
Smith).
In criminal law, cases are brought by government prosecutors
on
behalf of the government itself. This means that the government
is
the named party. For example, if the federal government
charges
John Doe with a crime, the case caption will be United States v.
Doe.
If a state brings the charges instead, the caption will be State v.
Doe,
People v. Doe, or Commonwealth v. Doe, depending on the
practices of
that state.1
The Case Citation
Below the case name you will find some letters and numbers.
68. These
letters and numbers are the legal citation for the case. A citation
tells you the name of the court that decided the case, the law
book
in which the opinion was published, and the year in which the
court
decided the case. For example, “U.S. Supreme Court, 485 U.S.
759
(1988)” refers to a U.S. Supreme Court case decided in 1988
that
appears in Volume 485 of the United States Reports starting at
page
759.
The Author of the Opinion
The next information is the name of the judge who wrote the
opin-
ion. Most opinions assigned in law school were issued by courts
1 English criminal cases normally will be Rex v. Doe or Regina
v. Doe. Rex and
Regina aren’t the victims: the words are Latin for “King” and
“Queen.” During
the reign of a King, English courts use “Rex”; during the reign
of a Queen, they
switch to “Regina.”
How to Read a Legal Opinion
AUTUMN 2007 53
with multiple judges. The name tells you which judge wrote that
69. particular opinion. In older cases, the opinion often simply
states a
last name followed by the initial “J.” No, judges don’t all have
the
first initial “J.” The letter stands for “Judge” or “Justice,”
depending
on the court. On occasion, the opinion will use the Latin phrase
“per curiam” instead of a judge’s name. Per curiam means “by
the
court.” It signals that the opinion reflects a common view
among all
the judges rather than the writings of a specific judge.
The Facts of the Case
Now let’s move on to the opinion itself. The first part of the
body
of the opinion presents the facts of the case. In other words,
what
happened? The facts might be that Andy pulled out a gun and
shot
Bob. Or maybe Fred agreed to give Sally $100 and then changed
his
mind. Surprisingly, there are no particular rules for what facts a
judge must include in the fact section of an opinion. Sometimes
the
fact sections are long, and sometimes they are short. Sometimes
they are clear and accurate, and other times they are vague or
in-
complete.
Most discussions of the facts also cover the “procedural
history”
of the case. The procedural history explains how the legal
dispute
worked its way through the legal system to the court that is
issuing
70. the opinion. It will include various motions, hearings, and trials
that
occurred after the case was initially filed. Your civil procedure
class
is all about that kind of stuff; you should pay very close
attention to
the procedural history of cases when you read assignments for
your
civil procedure class. The procedural history of cases usually
will be
less important when you read a case for your other classes.
The Law of the Case
After the opinion presents the facts, it will then discuss the law.
Many opinions present the law in two stages. The first stage
dis-
cusses the general principles of law that are relevant to cases
such as
the one the court is deciding. This section might explore the
history
of a particular field of law or may include a discussion of past
cases
(known as “precedents”) that are related to the case the court is
de-
Orin S. Kerr
54 11 GREEN BAG 2D
ciding. This part of the opinion gives the reader background to
help
understand the context and significance of the court’s decision.
The
second stage of the legal section applies the general legal
71. principles
to the particular facts of the dispute. As you might guess, this
part is
in many ways the heart of the opinion: It gets to the bottom line
of
why the court is ruling for one side and against the other.
Concurring and/or Dissenting Opinions
Most of the opinions you read as a law student are “majority”
opin-
ions. When a group of judges get together to decide a case, they
vote on which side should win and also try to agree on a legal
ra-
tionale to explain why that side has won. A majority opinion is
an
opinion joined by the majority of judges on that court. Although
most decisions are unanimous, some cases are not. Some judges
may disagree and will write a separate opinion offering a
different
approach. Those opinions are called “concurring opinions” or
“dis-
senting opinions,” and they appear after the majority opinion. A
“concurring opinion” (sometimes just called a “concurrence”)
ex-
plains a vote in favor of the winning side but based on a
different
legal rationale. A “dissenting opinion” (sometimes just called a
“dis-
sent”) explains a vote in favor of the losing side.
II. COMMON LEGAL TERMS
FOUND IN OPINIONS
ow that you know what’s in a legal opinion, it’s time to learn
some of the common words you’ll find inside them. But first a
72. history lesson, for reasons that should be clear in a minute.
In 1066, William the Conqueror came across the English Chan-
nel from what is now France and conquered the land that is
today
called England. The conquering Normans spoke French and the
de-
feated Saxons spoke Old English. The Normans took over the
court
system, and their language became the language of the law. For
sev-
eral centuries after the French-speaking Normans took over
Eng-
land, lawyers and judges in English courts spoke in French.
When
English courts eventually returned to using English, they
continued
to use many French words.
N
How to Read a Legal Opinion
AUTUMN 2007 55
Why should you care about this ancient history? The American
colonists considered themselves Englishmen, so they used the
Eng-
lish legal system and adopted its language. This means that
Ameri-
can legal opinions today are littered with weird French terms.
Ex-
amples include plaintiff, defendant, tort, contract, crime, judge,
attorney, counsel, court, verdict, party, appeal, evidence, and
73. jury.
These words are the everyday language of the American legal
sys-
tem. And they’re all from the French, brought to you by
William
the Conqueror in 1066.
This means that when you read a legal opinion, you’ll come
across a lot of foreign-sounding words to describe the court
system.
You need to learn all of these words eventually; you should read
cases with a legal dictionary nearby and should look up every
word
you don’t know. But this section will give you a head start by
intro-
ducing you to some of the most common words, many of which
(but not all) are French in origin.
Types of Disputes and the Names of Participants
There are two basic kinds of legal disputes: civil and criminal.
In a
civil case, one person files a lawsuit against another asking the
court
to order the other side to pay him money or to do or stop doing
something. An award of money is called “damages” and an
order to
do something or to refrain from doing something is called an
“in-
junction.” The person bringing the lawsuit is known as the
“plaintiff”
and the person sued is called the “defendant.”
In criminal cases, there is no plaintiff and no lawsuit. The role
of
a plaintiff is occupied by a government prosecutor. Instead of
filing
74. a lawsuit (or equivalently, “suing” someone), the prosecutor
files
criminal “charges.” Instead of asking for damages or an
injunction,
the prosecutor asks the court to punish the individual through
either
jail time or a fine. The government prosecutor is often referred
to
as “the state,” “the prosecution,” or simply “the government.”
The
person charged is called the defendant, just like the person sued
in a
civil case.
In legal disputes, each party ordinarily is represented by a law-
yer. Legal opinions use several different words for lawyers,
includ-
Orin S. Kerr
56 11 GREEN BAG 2D
ing “attorney” and “counsel.” There are some historical
differences
among these terms, but for the last century or so they have all
meant the same thing. When a lawyer addresses a judge in
court,
she will always address the judge as “your honor,” just like
lawyers
do in the movies. In legal opinions, however, judges will
usually
refer to themselves as “the Court.”
Terms in Appellate Litigation
75. Most opinions that you read in law school are appellate
opinions,
which means that they decide the outcome of appeals. An
“appeal” is
a legal proceeding that considers whether another court’s legal
deci-
sion was right or wrong. After a court has ruled for one side,
the
losing side may seek review of that decision by filing an appeal
be-
fore a higher court. The original court is usually known as the
trial
court, because that’s where the trial occurs if there is one. The
higher court is known as the appellate or appeals court, as it is
the
court that hears the appeal.
A single judge presides over trial court proceedings, but appel-
late cases are decided by panels of several judges. For example,
in
the federal court system, run by the United States government, a
single trial judge known as a District Court judge oversees the
trial
stage. Cases can be appealed to the next higher court, the Court
of
Appeals, where cases are decided by panels of three judges
known
as Circuit Court judges. A side that loses before the Circuit
Court
can seek review of that decision at the United States Supreme
Court. Supreme Court cases are decided by all nine judges. Su-
preme Court judges are called Justices instead of judges; there
is
one “Chief Justice” and the other eight are just plain “Justices”
(technically they are “Associate Justices,” but everyone just
calls
76. them “Justices”).
During the proceedings before the higher court, the party that
lost at the original court and is therefore filing the appeal is
usually
known as the “appellant.” The party that won in the lower court
and
must defend the lower court’s decision is known as the
“appellee”
(accent on the last syllable). Some older opinions may refer to
the
appellant as the “plaintiff in error” and the appellee as the
“defendant
How to Read a Legal Opinion
AUTUMN 2007 57
in error.” Finally, some courts label an appeal as a “petition,”
and
require the losing party to petition the higher court for relief. In
these cases, the party that lost before the lower court and is
filing
the petition for review is called the “petitioner.” The party that
won
before the lower court and is responding to the petition in the
higher court is called the “respondent.”
Confused yet? You probably are, but don’t worry. You’ll read
so
many cases in the next few weeks that you’ll get used to all of
this
very soon.
77. III. WHAT YOU NEED TO LEARN FROM
READING A CASE
kay, so you’ve just read a case for class. You think you under-
stand it, but you’re not sure if you learned what your profes-
sor wanted you to learn. Here is what professors want students
to
know after reading a case assigned for class:
Know the Facts
Law professors love the facts. When they call on students in
class,
they typically begin by asking students to state the facts of a
particu-
lar case. Facts are important because law is often highly fact-
sensitive, which is a fancy way of saying that the proper legal
out-
come depends on the exact details of what happened. If you
don’t
know the facts, you can’t really understand the case and can’t
un-
derstand the law.
Most law students don’t appreciate the importance of the facts
when they read a case. Students think, “I’m in law school, not
fact
school; I want to know what the law is, not just what happened
in
this one case.” But trust me: the facts are really important.2
2 If you don’t believe me, you should take a look at a few law
school exams. It
turns out that the most common form of law school exam
78. question presents a
long description of a very particular set of facts. It then asks the
student to “spot”
and analyze the legal issues presented by those facts. These
exam questions are
known as “issue-spotters,” as they test the student’s ability to
understand the facts
and spot the legal issues they raise. As you might imagine,
doing well on an issue-
O
Orin S. Kerr
58 11 GREEN BAG 2D
Know the Specific Legal Arguments Made by the Parties
Lawsuits are disputes, and judges only issue opinions when two
par-
ties to a dispute disagree on a particular legal question. This
means
that legal opinions focus on resolving the parties’ very specific
dis-
agreement. The lawyers, not the judges, take the lead role in
fram-
ing the issues raised by a case.
In an appeal, for example, the lawyer for the appellant will ar-
ticulate specific ways in which the lower court was wrong. The
ap-
pellate court will then look at those arguments and either agree
or
disagree. (Now you can understand why people pay big bucks
for
79. top lawyers; the best lawyers are highly skilled at identifying
and
articulating their arguments to the court.) Because the lawyers
take
the lead role in framing the issues, you need to understand
exactly
what arguments the two sides were making.
Know the Disposition
The “disposition” of a case is the action the court took. It is
often
announced at the very end of the opinion. For example, an
appeals
court might “affirm” a lower court decision, upholding it, or it
might “reverse” the decision, ruling for the other side. Alterna-
tively, an appeals court might “vacate” the lower court decision,
wiping the lower-court decision off the books, and then
“remand”
the case, sending it back to the lower court for further
proceedings.
For now, you should keep in mind that when a higher court “af-
firms” it means that the lower court had it right (in result, if not
in
reasoning). Words like “reverse,” “remand,” and “vacate”
means
that the higher court though the lower court had it wrong.
Understand the Reasoning of the Majority Opinion
To understand the reasoning of an opinion, you should first
identify
the source of the law the judge applied. Some opinions interpret
the
Constitution, the founding charter of the government. Other
cases
80. spotter requires developing a careful and nuanced understanding
of the impor-
tance of the facts. The best way to prepare for that is to read the
fact sections of
your cases very carefully.
How to Read a Legal Opinion
AUTUMN 2007 59
interpret “statutes,” which is a fancy name for written laws
passed
by legislative bodies such as Congress. Still other cases
interpret
“the common law,” which is a term that usually refers to the
body of
prior case decisions that derive ultimately from pre-1776
English
law that the Colonists brought over from England.3
In your first year, the opinions that you read in your Torts, Con-
tracts, and Property classes will mostly interpret the common
law.
Opinions in Criminal Law mostly interpret either the common
law
or statutes. Finally, opinions in your Civil Procedure casebook
will
mostly interpret statutory law or the Constitution. The source of
law is very important because American law follows a clear
hierar-
chy. Constitutional rules trump statutory (statute-based) rules,
and
statutory rules trump common law rules.
81. After you have identified the source of law, you should next
identify the method of reasoning that the court used to justify
its
decision. When a case is governed by a statute, for example, the
court usually will simply follow what the statute says. The
court’s
role is narrow in such settings because the legislature has
settled the
law. Similarly, when past courts have already answered similar
questions before, a court may conclude that it is required to
reach a
particular result because it is bound by the past precedents. This
is
an application of the judicial practice of “stare decisis,” an
abbrevia-
tion of a Latin phrase meaning “That which has been already
decided
should remain settled.”
In other settings, courts may justify their decisions on public
pol-
icy grounds. That is, they may pick the rule that they think is
the
best rule, and they may explain in the opinion why they think
that
rule is best. This is particularly likely in common law cases
where
judges are not bound by a statute or constitutional rule. Other
courts will rely on morality, fairness, or notions of justice to
justify
3 The phrase “common law” started being used about a thousand
years ago to refer
to laws that were common to all English citizens. Thus, the
82. word “common” in
the phrase “common law” means common in the sense of
“shared by all,” not
common in the sense of “not very special.” The “common law”
was announced in
judicial opinions. As a result, you will sometimes hear the
phrase “common law”
used to refer to areas of judge-made law as opposed to
legislatively-made law.
Orin S. Kerr
60 11 GREEN BAG 2D
their decisions. Many courts will mix and match, relying on
several
or even all of these justifications.
Understand the Significance of the Majority Opinion
Some opinions resolve the parties’ legal dispute by announcing
and
applying a clear rule of law that is new to that particular case.
That
rule is known as the “holding” of the case. Holdings are often
con-
trasted with “dicta” found in an opinion. Dicta refers to legal
state-
ments in the opinion not needed to resolve the dispute of the
par-
ties; the word is a pluralized abbreviation of the Latin phrase
“obiter
dictum,” which means “a remark by the way.”
When a court announces a clear holding, you should take a min-
83. ute to think about how the court’s rule would apply in other
situa-
tions. During class, professors like to pose “hypotheticals,” new
sets
of facts that are different from those found in the cases you
have
read. They do this for two reasons. First, it’s hard to understand
the
significance of a legal rule unless you think about how it might
apply
to lots of different situations. A rule might look good in one
setting,
but another set of facts might reveal a major problem or
ambiguity.
Second, judges often reason by “analogy,” which means a new
case
may be governed by an older case when the facts of the new
case are
similar to those of the older one. This raises the question, which
are
the legally relevant facts for this particular rule? The best way
to
evaluate this is to consider new sets of facts. You’ll spend a lot
of
time doing this in class, and you can get a head start on your
class
discussions by asking the hypotheticals on your own before
class
begins.
Finally, you should accept that some opinions are vague. Some-
times a court won’t explain its reasoning very well, and that
forces
us to try to figure out what the opinion means. You’ll look for
the
holding of the case but become frustrated because you can’t
84. find
one. It’s not your fault; some opinions are written in a narrow
way
so that there is no clear holding, and others are just poorly
reasoned
or written. Rather than trying to fill in the ambiguity with false
cer-
tainty, try embracing the ambiguity instead. One of the skills of
top-
flight lawyers is that they know what they don’t know: they
know
How to Read a Legal Opinion
AUTUMN 2007 61
when the law is unclear. Indeed, this skill of identifying when a
problem is easy and when it is hard (in the sense of being
unsettled
or unresolved by the courts) is one of the keys to doing very
well in
law school. The best law students are the ones who recognize
and
identify these unsettled issues without pretending that they are
easy.
Understand Any Concurring and/or Dissenting Opinions
You probably won’t believe me at first, but concurrences and
dis-
sents are very important. You need to read them carefully. To
un-
derstand why, you need to appreciate that law is man-made, and
Anglo-American law has often been judge-made. Learning to
“think
85. like a lawyer” often means learning to think like a judge, which
means learning how to evaluate which rules and explanations
are
strong and which are weak. Courts occasionally say things that
are
silly, wrongheaded, or confused, and you need to think
independ-
ently about what judges say.
Concurring and dissenting opinions often do this work for you.
Casebook authors edit out any unimportant concurrences and
dis-
sents to keep the opinions short. When concurrences and
dissents
appear in a casebook, it signals that they offer some valuable
insights
and raise important arguments. Disagreement between the
majority
opinion and concurring or dissenting opinions often frames the
key
issue raised by the case; to understand the case, you need to
under-
stand the arguments offered in concurring and dissenting
opinions.
IV. WHY DO LAW PROFESSORS
USE THE CASE METHOD?
’ll conclude by stepping back and explaining why law
professors
bother with the case method. Every law student quickly realizes
that law school classes are very different from college classes.
Your
college professors probably stood at the podium and droned on
while you sat back in your chair, safe in your cocoon. You’re
86. now
starting law school, and it’s very different. You’re reading
about
actual cases, real-life disputes, and you’re trying to learn about
the
law by picking up bits and pieces of it from what the opinions
tell
I
Orin S. Kerr
62 11 GREEN BAG 2D
you. Even weirder, your professors are asking you questions
about
those opinions, getting everyone to join in a discussion about
them.
Why the difference?, you may be wondering. Why do law
schools
use the case method at all?
I think there are two major reasons, one historical and the other
practical.
The Historical Reason
The legal system that we have inherited from England is largely
judge-focused. The judges have made the law what it is through
their written opinions. To understand that law, we need to study
the actual decisions that the judges have written. Further, we
need
to learn to look at law the way that judges look at law. In our
sys-
tem of government, judges can only announce the law when
87. decid-
ing real disputes: they can’t just have a press conference and
an-
nounce a set of legal rules. (This is sometimes referred to as the
“case or controversy” requirement; a court has no power to
decide
an issue unless it is presented by an actual case or controversy
be-
fore the court.) To look at the law the way that judges do, we
need
to study actual cases and controversies, just like the judges. In
short,
we study real cases and disputes because real cases and disputes
his-
torically have been the primary source of law.
The Practical Reason
A second reason professors use the case method is that it
teaches an
essential skill for practicing lawyers. Lawyers represent clients,
and
clients will want to know how laws apply to them. To advise a
cli-
ent, a lawyer needs to understand exactly how an abstract rule
of
law will apply to the very specific situations a client might
encoun-
ter. This is more difficult than you might think, in part because
a
legal rule that sounds definite and clear in the abstract may
prove
murky in application. (For example, imagine you go to a public
park
and see a sign that says “No vehicles in the park.” That plainly
for-
bids an automobile, but what about bicycles, wheelchairs, toy