Articles Posted in Uncategorized

For your reading. R. Michael Cassidy, Character, Credibility and Rape Shield Rules. RESEARCH PAPER 542, Boston College Law School, October 8, 2020.

Cassidy’s introduction notes the attention sexual assaults have received over recent years in reference to Harvey Weinstein, Justice Kavanaugh, and even then VP Biden. He goes on to say that,

“It is a tautology to say “We believe survivors,” because the complainant is only a survivor if her claim of victimization is truthful. “The war cry “believe women” is seen by some as a necessary corrective to a historic injustice, and by others as dangerous ideological orthodoxy if “believe women” becomes “believe all women.”

“Thinking about bringing marijuana on base? Weed rather you didn’t,” the Naval Submarine Base posted on Facebook on July 1, the day possession of marijuana became legal in Connecticut. “State law legalizing possession of marijuana doesn’t apply to military installations.”

A few weeks later, the sub base posted a graphic with the message, “We’re going to be blunt. Don’t bring marijuana on base.”

Active-duty and civilian Navy personnel hope their puns will grab people’s attention and get the message through.

A servicemember can refuse to take a COVID vaccine–BUT there are potential disciplinary consequences.

Military law is clear that a servicemember can be ordered to submit to vaccinations. This happens at the beginning of enlistment when you are required to have or get certain vaccinations. This is a long-standing practice when reporting to MEPS for medical screening.

When deploying to certain overseas locations vaccinations to protect against local disease are required.

We all have clients who have been ordered to enter their passwords to their cellphone so the investigators can forensically examine the phone. As military defense counsel we frequently have these issues come up.

In 2018 there were an estimated 396 million smartphones and cellphone accounts nationwide. Carpenter v. United States, 585 U.S. ___, 138 S.Ct. 2206 (2018). Important personal information exists in smartphones. In the context of searching smartphones, the requirement for specificity should be at its apogee. Smartphones are mini-computers with extraordinary amounts of personal information, increasing exponentially on the device. Invading a smartphone is more harmful, quantitatively, and qualitatively, to privacy than invading a house or even early cellphones. See generally, United States v. Riley, Brief of Electronic Privacy Information Center (EPIC). The court in Riley observed that,

“modern cell phones, which are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy. A smartphone of the sort taken from Riley was unheard of ten years ago; a significant majority of American adults now own such phones. See A. Smith, Pew Research Center, Smartphone Ownership—2013 Update (June 5, 2013). Even less sophisticated phones like Wurie’s, which have already faded in popularity since Wurie was arrested in 2007, have been around for less than 15 years. Both phones are based on technology nearly inconceivable just a few decades ago[.]

We all have clients anxious to know their SOR status post-conviction.

We are required to, at minimum, advise them of the DoD regulation when there is a guilty plea for charges which might require registration.

But clients are never satisfied. Here is one case that might have some relevance to registrant’s in South Carolina.

There was a time when having adverse information in a restricted folder in the official record meant something in terms of lasting effect of that information.

Over time that changed if the officer was selected for promotion. A post-selection screen was then made of everything before forwarding the officer’s name for promotion.

Now,

Colorado v. Johnson, No. 2021 CO 35, 396 P.3d ____ (2021), requires us to visit the Hobson’s choice where you have successfully had evidence or statements suppressed but there is much value added if the client testifies. The issue then becomes one of potential impeachment with the suppressed evidence.

Mil. R. Evid. 304(e)(1) gives us a partial answer.

(e) Limited Use of an Involuntary Statement. A statement obtained in violation of Article 31 or Mil. R.

In United States v. Schloff, we had an issue with extraneous influences in the “jury” room. The two senior members essentially argued that the Army reputation for dealing with sexual assaults was relevant to their findings–and a guilty result ensued.

At the beginning of deliberations on findings of appellant’s court-martial, the president and senior ranking member of the panel, [COL JW], made a statement to the effect that based on the political climate, the Army could not seem weak or soft in dealing with sexual harassment or assault. He also asked a question to the effect of, ‘How does the Chief of Staff of the Army’s current emphasis on sexual harassment affect the findings and our decision in this matter?’ [COL AM] made some unspecified but similar comments or comments indicating agreement with [COL JW].

Through luck, we discovered this post-trial, and the ACCA set aside the findings and allowed a new trial. In a footnote, the court observed the standard rule about jury deliberations.

I think we all know that MCIOs use Cellebrite UFED devices and software to conduct DFEs of an accused’s cell or smartphone.

Up until now, it seems, the DFE reports have been accepted as reliable and accurate so we do not often find ourselves litigating the reliability of the DFE reports.

Have circumstances changed which require more attention to the underlying forensic examination of the DFE? I ask because of a new report from Engadget, “Signal hacked Cellebrite’s phone hacking software used by law enforcement.”

Contact Information