Monthly Archives: March 2014

Nebraska v. Schuller, 2014 WL 684602 (Neb.), February 2014

Facts:  Police used E-Phex to browse IP addresses in the local area and viewed what files those computers had available in the shared folders (via a P2P program).  Defendant’s IP Address was identified, and one image of suspected CP was … Continue reading

Posted in Defenses, Deleted Files, Fourth Amendment, Probable Cause, Search Warrant, Suppression, Technology | Leave a comment

United States v. Baldwin, 2014 WL 657949 (C.A.2 (Vt.)), February 2014

Practitioner Notes: I write up this case only as a reminder that we as prosecutors are also responsible for the record.  Had the Judge made an actual finding of fact in this case, we most likely would not be discussing … Continue reading

Posted in Defenses, Sentencing, Technology | Leave a comment

United States v. Vallejos, 742 F.3d 902 (9th Cir.), February 2014

Facts: Very similar to the facts as Baldwin (above).  Defendant also confessed in both audio and video recordings to the police.   This appeal is based on 2 level sentence enhancement for “simple distribution,” as well as an attack on the … Continue reading

Posted in Defenses, Rules of Evidence, Sentencing, Technology | Leave a comment

United States v. Specialist Curtis Lacefield, 2014 WL 642950 (Army Ct.Crim.App.), February 2014

Facts:  Appellant was performing a duty with another Soldier.  Appellant allowed the other Soldier to use his external hard drive to find a movie to watch.  Appellant left the area for a while.  During his absence, the other Soldier found … Continue reading

Posted in Charging Document, Defenses, Rules of Evidence, Sentencing, Technology, UCMJ | Leave a comment

Ohio v. Marquand, 2014 WL 811793 (Ohio App. 8 Dist.), February 2014

Facts:  Marquand posted a craigslist add looking for “younger girls for fun.”  An ICAC investigator responded to the add with an email, asking what age and what is your age limit?  Appellant replied that he “had no limit.”  The ICAC … Continue reading

Posted in Defenses, Rules of Evidence, Suppression | Leave a comment