_ __ CA¢/S'éj' /{/0’ DB'/ff2 C`/_€ 83 MMK 03
0”7§”. i//zz'//§ ' -
70 Fé§,¢/,,.¢ 5 /;105'057 ‘ - . . ' . '\
./y/L»}”/'" é/.;/.j/ /J ;_/y,z»' dé"”~~,/,///»K//»¢,q,"“. ;>;¢»__/ 4 d t
/70 301 /9/3?§,_ b v v `
\
/..)' 010 ,'¢'¢Y~'~W)v ‘/,:;/;r
12 _ ~ 1
,-2:“/¢»__,§-,.;¢,/5€,.\.,>»¢ ,_'3;; l »-0'7@§@
207 ,/!.'//”//?,# . /,¢.~?;// w;»;;;;“"
'; //f/-.~_f -.» /) f ‘»` ,A jfny,/M /~'Av/ _»;;,"`//»¢L_»';'»»'/" ~/:" 1532er /‘B/./ /:’Ti`»"“ fFZM/Z°/;" 772 Mf@
§ `. ` 55”{4"/1';/10;%" /.‘/d 7 §;,.~)V"'/"" cr ,>" vEMé'”?@ 'C"; 24 /.?“ 7 ` ,_//~M 7?1»¢ M/_Q/‘,,,,w/_,; .\é¢
' ./,¢Q/MJM"- /,//`// ,.¢07/!/¢//, 55er /é"££~"/@//J¢f/“*}VM»M'»' ` f/"`”"'N"‘ `5"7:"\/ 7?_" n
`:*'F;<~'/;>~" 070-1057 v '~ F~z»',,.»y/M¢~¢ /’02¢= § wa~je€/;/ ,' :-k /.~./ ,#%waz,}?~.?-z(; /y'c»w/
./ \
M@M/vz,, .
\
. -"UG'24‘\5
AbesAeosfa',Cie*r:< '
C/?U§€";é‘/p§§/ffz 63
32/4&7¢7;» 67 0 ' ` '
7 z
44 ' l § .Z;‘/ 7% /g 4"4'°' j'<:)/d/c/,¢g_._,
. . v /£/ ' __ § v \ /// 370/1507 507/02
~ ' ."'J'.‘ -" { y F;__' ` l '»_:,. -
5477»7,,7 __/ 27'" _ § q q 615/7001 77 ..,/,~'/;0 5
/%)7/01/ 72 777277 777%27/707 0/:'~ 000 72 //.a 0 7~/~/7
254/504 §//7;_»”~"/`0/ 7“7?<~.»'\/ 005"' YMVMFN
éé/f?r£i'>' 1225"75;; » 022/3 /`/‘4»3/70'€7“-’/2; Z¢:>/S: 77 ////JM~/c 7::~»»>.77 272='5: ;/:/
3§’¢2/§?.0“"/¢3?’:~ //!¢53/2'/¢"`8 @’33~1:1> -`7'§.?` /?¢%7¢€>'//,6.=:;/¢/2 3~'* 70'{¢?"7¢'7’0,0/72~/?702@ 777 '~"-f'~‘?>~*=./
729 M/// / '4»‘4/ //L//C. //'97 /;`//¢/‘./77?¢/-»' 4§/»`/¢?&“5’//`7-¢: 750 7/‘/ /c//o€e"" /Z é’¢:)/ I,_ \
/ 77/0/0'/;‘,1/'“4 /m/{i:*‘/M;‘ 04//0,¢0;/'¥ /'/;"' _0.¢/.3//7¢0€_ 0 T:/y,¢;:“yéé;;\/Y /;¢/,¢/ »-- ;A¢ / 7;WJ '
/40'57’.3,,, /--/7 , 70777)0¢/7 16»~0/0rJ/?A/A 71 0;7?/ - /»"-`». M/¢_§ /7¢;;7¢;;,_/ ;/'0_ 277/0 ,.
. »./
”..f /,/;Y/:;gj;'/T
y /.7»€¢,’*"27¢3-¢/ . -
z _, l 071/7207 ,»1“2::‘§"“2'-“ 3'§';&‘3 1 1222/2 <‘ /2///0/@¢ f '
/4//;7/!/7?"4 ¢f¢»;/ 470///1,/:0' 1 0"00//¢2»“'” 72 EF*/j,§/ 031/207 077/057 `”* 707 ;';~7$/-
f:) 740 2775 Q//zz// § 732 ‘7”~¢?`¢?* 777 " c 0,f¢.£_ -“'
5'~/»2,<_ /¢" 0=/7/'¢/ i‘//z'¢>.#/i/ /”7/2 7/3/72/¢:/ 00sz c_ 77/,/7’/7M z 7 0000"6““=» 007/77e
. 741/777 5 727/7777771/ /77 770/70 720 //‘/.-m@~,~? v
{M/fZY/M
705 é/f 77l/51 /f/?/,¢;z: 07 005/20 777 706 f€‘z»~»M-
W-~.'?';;/ 07 faa/gc
l
L_
914
0£ ""”?.'¢:f
x ~’__
4 2152/527 762/73 77:>~,7», 701/7 f%'¢///f 66”/,5777/225¢/3;2 523 767 _/777;27'4/
~ 7 77 777 720 777 7<- 677 77 1127 M 54 ,\ 22
../
__ . 1 _' ` \
_ _ /' _" ‘ ""/""'~ , " __ , 7 v ' ,\
(/¢5"'07r7 »:;F‘ 67’ 172 /j/;é’?. ~ 1 ` '~’1777,;{;31" l ;S/¢f'A/}¢¢¢’;;»;.¢.J"“
. / ' . . '." y .
1 »- . ; ‘ , , 1 . > \ )`.,1.":
.//');,»1"'/"" `:';57 /2/‘“’12' 2-75~?`~` )3;.::§" 0"0’7>"" ` 1 ' ~. 1 d
» , ~ .¢_W` ' 4 . x
-w»..`_
\
g ` /§/-_ :3_,..~’;»1'.», /:»;:-,72.'1:~"/' /¢///,7`»¢’,/1" /l//' 15 '.': '~5= ..7?;1,0773,1/`-2»*-.::/. 7701/7%,”7; 777
\
M/%I°j/l;?é,i:=? ` .-"'//"~:" \K/g;,: 7 §//_') /;/» ~/'7 - '/?~'H'r/_Z/’ 7€35?7£`".¢¢‘(
\
v
/§'3»:7>»/_ 177/7051 /~~1~- ;,v’ng//$ 7 /;~’, 27/,7:>7" /;»-~» gm 714/470 ,/;@'/»072/7:77316773770 M
/'
//~Y?"/ '>»v/`¢’ `,;¢- /):?»- ,1?~4»;.»_/§');),;¢’/‘1'/ 72 /2”";`“""'/': /;?~7',"_,(7§5‘2; "/"?'»"/‘.¢w 75"$¢/'~1-`“ G'Jv)€'.}"" v'a~- C!'Z.»/,g_)'/,¢_,;dyz //;,F"/?YY"S,-
l - _J
y,r*“"'*'l»-n-»
A/i/ 325 =*;1'/,1'/- 73'»_/ i:';;// /7“777='7'/,00,2_ 5‘/4";//,'7 /7:'07‘:1 ,~N . /7¢'_¢';»07 7/»'*`~` 402 777 751/77 JL/¢@_ -._- ¢:.&gz "
M¢ '@¢~»§2 6174£.,;;1 gér~ ` /.¢ j 7 /70;22'-73»~“ 777/7 67/)/720-03~: .,/£4//;9 //2/2’3'/,"/,./¢' F»‘?./Q
..,.~p~p¢»_ ..,......,_, “’___,~,,..4 ,,,...,.._' wm ’ /' "' / _' - , / ' l - '
- 7» 750 , . /’ ' - ,‘ '4 . ' / l '
gF;/}/,f/j.;/y/r 777/65 710 ~"",7;7.,_/ /7=- 725 ;,;»:_).;»-= 730 .7/;1;.7‘; ,7.\@ m',,/;_>;;'- .6/;2:'7;/77~
fg,‘:;`é€,zf_' 571 ,5/_/'7;*/»7;// ?.d &.0/_.4/7`/2'/ ._J\,n/f,;? /’73?;/*£ A’°Z:'/.J!‘r_:¢_/r/ 651:}“/;/ /5;¢",'0 C“Z)»J»/-')"' 7;,/"`“~»
/)¢5’/6/,3.»/,0» /;:/~,131,3»7,7,- 711 ‘,773.’ :1:7_;;;,,,3 §-
_7 “’ ~ " '“
j _ _`4'/%?/222:) cv/z_% ' 2§"/_/7/§
k _ " 521/7 ?;/272) Ac'///z; z J¢é/Z/{J/?j /)'$/~22{
‘. 2 ’ l (: / /7¢.;/.//,»‘// /1//`7‘
- /5¢»':0 222 2510 '
/l/'> cf"}/:?%‘/”/;'/f/ 7"7§'/
{/A/’?"j ,£Q¢§“ (Q/f/M//?§ /7£/»»§**/1; f F/'Z"”' ¢?;: 4//‘/»" ` a /` :' .-' _ 7 ": , fix `.
/%*?02 //2~1’/;€ -. - 2 ‘ ` , ~ l 2 '»
F/ /VQ/ /.)3.€'2`2€> "~ l 5 l l .. 2 `
5324/2274 §7'%~”7¢1,\/ l 2 5 5 5
//: 2222/2 172 72 //2 _ ) l
/Pf.;-' 1‘%’)’12§>'//: 4222"" /f;r@ 2253 W/»%‘/,,, »<’22//" ~2-'2‘/ / /'/~? ” "’~`"..-:-j~’_;.(,f ?;f/U';L,;';§ ”/_ />/.7_;5%_ .
/
772/2252 222/122 /2'€2:»'“ //¢2/;,12/22 dev/1271
/ 1232 / 2- 21 ~, ./-;,¢~'1'2" 2‘422/¢@/;,22? , '2" »» <=/.'2~//,/ '~" ' "'/~2-* 'f'<>: <“<.‘4~
r/é.#//j‘$j‘ )' %/ cf / F/ ) .¢}’/ /' 6 c, ,C // ./¢~' 0
' // f _ / / . ~ -
7?%=" /7/¢//2/22' /a¢//2:2, 72> ;/¢-,_, ~/2/_/,/»2;¢/ 222/12 //- 2222
,€“/" / /: ia""“ /;z-»z“/z~¢» >¢J»/
,/ 345/1220 f' /»,_/27-“/;/ 143 /"’?`<222‘2 /// {:r.-M‘~ ¢"/2#’.<~4 ./Zr“fd' 1-"2 .
' ' ' 4 , ,~.' , /'
/' f »
2’::7~’?2//” / //2/@ / 222/_:” 227~22// /0/1/§
/7/2/~?/;1{,7§ />/O/i//: j/A/é*/ /1_ ‘»
»
. '
%/1:?:7§5//” 7/:) jug/615 C/€c/ 510/71 6//7
70////¢5'2: % jfézé / ¢5615@¥£@3’45171"?~€/€
7/£` //;57:'/:% /£:1;/117; //76@//€»_/,7/’/(/ g@//¢;/;/¢,/ '/441% 4151114` 51;5;_/ _/f
69/%’/"#/# /W//// 55 ///..¢f /{/d/.m,//¢{( MJ*H'€?//(Q% (/5€ A/.?-|?~/ . fair z;:f'/,GQ/
751/1111 5567§‘ 1655111111!716 ér/
///5'/<;7" 1’€:,117£'1,1/)/10///1,/‘/'5”/ 6/%/5’¢"'¢/ /./.’1///’¢1/1’/ 5"55-6’
ha/, 7 /W///r %¢' 5`/1"1‘£’ 61 501/f 'z` _, 11 '
Mf);/% 1//;1/ `:/11)/’1/;'11/ 775/'£./ §15114&> 616/1 116 S`“:¢/J//(j'?
. /.6" /' __5"`1°'“‘*“ ' " \'/)1€ 6*'[1§675'“£/1¢1///1 1;1).;': //11011 § //4¢7¢{ //1 /
5 %3///6% /`6//// jegfj §§¢5§1`¢:2»41 /"?é'!z) .
. _, l t _ . L_. » _ ` .
j[ _ , . ,..._,.~.~ _1,. |_(_4.,.1,,1~_._ 1..¢»1,~-'-~~<:*¢'1'{ ..,_ ~_ ' ' ` .~'11'
' . \ . . . _._ 11 ;_ 4 q ‘ !- .
1 . d ` ' - %/’§/6/7 1116 ¢/éa/ ~
n ` ` /////{/1,/: /// /4,,4/.6’5 /1;71? j //'1?§//;)/{?1?'“(/?’
)/51(/6//'161// ;/ ;6,1;¢ 751 c
' j;? // 577 14//'/?/'6¢~ 1/;’@/17 776/113 ////,/1//¢ 641 567 %/754
677/6 474/f ///4/6/14//46 §4/// 617 ;4’//§/ / 614 /// j/ /K , 57616' E//%_Lm /_/'/4 /-6? .» V/‘-/// 7[`»6 /€'.$`p/,~`/~
H%/ /€’5).1,’/£//¢’/,. 1164/1676 //1. /6”/ 2 //`¢; 61.1`7/<-6 /é'r6 /C’ 7/
/ 11 / .// -
Af:y.¢//// /// 616 5k1/6 /.2/11/»11 '1‘_ / 411/d
;% 2//,1,1/*; 131 %1,1:,:;/ fZ:/ 153/1611 ///f ///%@/6.146//“4 0/{@¢1/
//[/ f.//Af/);l/?l //j c /{:/z/AG* “'};/{:c-'j'?!-/ /¢’..’J;»Vr' ][6;;*."/ /',1/~'/%77/[?/8 -,/5 A/&'é‘g.f é%'/_f
_S‘¢( ,.1/{/,, july §§
///1/'//111//6"/ l 516/1 167 //»r j/é’¢?~/e:§// 616/v féc: cig/1141 »/6 ' i’.'/?:€
_é//:/' ¢?f/ ////‘F//M¢;/ /.16/1¢.1,1 f /1;`0! Z/"»é’/j /1‘11') jz//¢:/ § _13’ ¢-'5'~’:3/-> &@JQL
§?'/A 577/ff f/;J 615 a `
1/11;1/4'-/¢1'/6 ¢z>,»; /./ 776/11 -1;7?7/’//2‘?// /,¢6[`/4 456/11
. , . ., - ,1 .» .( ~,1;3_6‘ /!/&6,151£2,/¢;1,4 /:1»4 a/,//,:
A/< /`,;;/ ',_1, // /7// 142 " 664/6 661/1626'¢1_>}1 122/111 221 161/21 '){: 121 /¢/Jr¢/(,
%6‘/.1;117“/65§,1 11/£:,-// 11 '/z:// §-1"~’-.;/ 7{:€£ ~./»;:'/7"‘ 7/» 1:11/.1/£¢,/ 6 'k
.` '%FZ§/?J/;/y. */ C/f/,é//y/r:/ ‘////.://r’§/ ,16?//...11:~1;177" 141 16/¢//1.4.161 /&//4,6/
" Z7) (/15%//673/ /1’{/:”//' /Q;,/, ~ :////<>'1_/,’16161~ 146 ,/6/<':~11:> ` r,/~/cf’ 62
w,7[-//(/ 727/1316 /j//”"'/` 10 /"4:;1714 Z'_c»;///f” 1147 /;//f/g///MO/&? //“Z€
1 ,1;/1/_/////¢ /r' /11}1/// ///16 /76..1///111 :1,'///4//76'/ 117\;./6///6.7/ /J'~,g;€;.
,;112 414/11 . 164 1 1211 1111 1114 ,1..; 11'__,,,141,1/ `
//611»/1;1'//4/ /3111,1//,1/// 710 /16¢"{.1 ///7////¢ Y/W///,»r /€1'1,1
.19/2;’/6//”/446 1/6){46/121/ 1612,1;11;/,-1/¢ . 7;///4‘6/ 157%¢: (:71411¢.:1
1211 /665<>11 115// 1:;;12~;////¢ //~:6/¢//,145 %;1 566/6 121 !/<2//
- é{é‘;/@/? !5{//(/ 134 /7!161/1f fOr1//j/4FJ//n/G; / % j/d(,///§/,SL? :4
`\
f fl`/l;l;y}¢§?f/é //?/?f/‘é;‘/ / 5 "5; 5//"/{1 ff 452 445/7’€4//7/¥/ ////,~égS`C>/JM O/
3 W§/f; ;/ / g 1 553/75 5/“/€?`/0/1 / v
/i£;i§¢ / 750/fw @`F ,%//2 c///v/ 3 /://.;,'/ 5¢1)§ m f//);§/v §F 52 ./-'.<»/1[0'//%.
25 5!/§§ ;,.)//7.5/!7‘ L’ 525 ////} 455 55/”/ ¢,»,./5?'/ /;(-’~ fmij
1177/6 §556,5 fn /7§/4¢§ 5§§ 'J M/C. 526 ’/’35 {b/ 33 {é/»@§é/ 1 565 55 5 7/3 ’3¢¢/53 34 /<§`/f”
` [/» ////”5) /»// ”/éf€ ///~) fé/¢/¢*J //:z»/'/ 5§/¢/'//1~ @,A"c¢“/ 425 643/545 ./Y-z’_g
. [.~/ / , f `
/2<;5_/"7 56///56/ 5"/:/// »~ er;’/ 27 A,/@,/// g,//,//° 615/d ¢5):/§ 356/k 5 245/ere
!/. ¥7///_ //:7/ §’/»4415_§57‘//////1 ' £/,9 ~ §p”. /,,j/ »/;’//:£3;'_{ [o/’ 576 5641' C'///// ///§///4 A/"fywz;»z 535 ///, /zz/<,>§z .»>¢/ /7/71//¢/
‘,”§ )/ 2424 /‘4//1/§///§// ////7' /29 CZ¢/x/!?
(/
fi;`-"*`Z_/%~"z/ 123 5/) %`}€ 42/5¢//@~
.A@~_,§" /%/')’,¢/¢’//z: / 735 //f/¢/:>V'?/AFZ wm /NA'- y;/,,»¢/ //J//¢» .`/<"'J F¢/////;Q;-~»s--r' ’?/€/
// .
/L'!‘// //»"2’4/¢/ L§/ //y//»///z dc,¢_/,€?»~ 2'<7/.1 , M/y'x' 0 3/-?//5,3/
d/*’":" /37”6~’¢//»:.;// I¢»`z" %zz_
lW//J/(/ ;’;“z;?',// /A'/ / /j;$ f d/.z/ b
473 "‘F"" '.
2
159 f w;.// A_¢'/:/2 ///~//z~//;'/ 21 55 2»-»»¢»,¢'/~/~) °//w j///?//,¢" f’/'"c/,¢¢/J¢'%?/f;€ /f 27
fha 2 1//§/5"¢.<. ` yfpf,¢//>///z:/ 72;;" 123 5¢.,»» 7“*//¢“ %»47'
//
/Z./;?¢»/ f//"'-’é /-'»A/'”' 2€/// /Z~'//z ' /5/7'6/2/&¢~5`5/? _
7/5//4 c 5¢2&/<:/` /_¢/A /F -
( /yJ/r//tf 472
¢;éj’//////;“ ' 73 /A /;Vé-"";"fW/,FWZ»`-"
»I"/L/;»’ /W J//§ 73 5;“/%%¢¢, ;s "j" /A//) /ZZ¢F /)//2»?¢€¢'//’ €9£/ /'5""//1`/2<"`.//3 _C'¢DA/i*`$:f`.f/./.` 41 l
222'_/?1€4//» .)/w »§vi."?°/z,<'é-/ /~_ f ,.//1;'¢?/€5§?672» fé/Z¢»¢f f‘Z; /7¢'?”»?'47¢//;§/:?}1{2“' ,4?»_5_" ;7/%’;"
l
%;M.c’//F/;;;'¢~ / ,-"'"£/2/ /Z/é.“ /,7/£0 , //.fMF C/Z}Z~?
Mf/%é¢/_ /% ?m' /,;/f < é// //// /é" //7 V/_J ./'/,/¢'/¢~'7/€ /,'§'z//) //Z// C/§f'//" `
/ /
@¢7///7 //;zr /é/' ,_/ZZ¢¢ /EQ/¢z f /'“'///1“/ //2,» J/ cf fbi ’j // ,z/./Q,_; % 21,4_,¢/7’//"‘{/ {’¢/f'/'f"
Mék§ a /%J/@A /_O §%/CL %54;/:;/1/r ,K_Q';'¢/ \"<‘,;)/¢ 624/x /NA§?H,,¢
. j/il¢/§/{),/e /é’/ /7/‘7/115 §/,/;/.,Q fa§<~ 504-§ :77,€@,/1 525 255/2 267/§ €m-»_,¢ % an
/54/4////4’/0/7 743 §zz/y//‘Cr jé?//;,f /}?'a?,»__"f;' 545/n /f /’"¢"§ ro/)¢¢ é»// ,F{aé;é;//
j/-S.U/KFSF SZ'J’€ v/»‘_s'/,:/CJ"/A/s _ ¢//[_/7 z{/¢i)
'1»1.
-~,
..._,`
. {\"l,‘
§» ‘ v - ~ .' - ,1/{),/_
//)3 §3:_§/) 39 511 , 1/:'>33“ /11¢16(//6/6,/€ 626 6 ~/63/1`/¢:'/1 ./ 614/1116 1161/1511
' _.6161266__%6 121/661 661 06 /(/: 7/ 1111 6511 1511/1165 /11§_ 1§:1;§/6111:91
3 \ 9 l 435/j 1§/.36,-1~f §.21¢6/16/:/6/1…%§1 1 § 11 /6»3.&25/ 0/015/4/5`60":;?
1111 6/6/17¢/17116) '
_ 6/11 11 116§15
//,§’11161; /1/151,15’ '3 ` ` 1 -`
3 3 /3,/ _//53 336§:»11//`5§131,343 ~19,17<€) 17a/51 61~§§ 1216§ 54/¢./611) (01/66§/
éfc’i 5/1.)6§<1/ 636/1151 1417 §’1/1§//616 ~
1111 1,;/:1# 6/5//5//111/ /1“1561 ‘3"/:,1,.11/`~ §§ /f/§~/» <,/:rc§/§ =' 1§ 1///11,,»§,/3.
jj 766/35 531 §>§/6/6/17/ 5 611/1 621@1/5///1/6§1 611§1§/ 3<‘§,1.6;£,,_(5
1 / . ' '-
6 6/:336’ /§11<"1'};¢:1 ,f/f €’1…> //§.1/1,////2.///1/1/11`§»11/,61 //"/ //=1§)
/
7/'_
//"/¢11//11§/ q
v
` /
%7%/%{// 633"':»'7 /7/(_,3 z:‘é,r,' §'(,/7/ /3////?¢{";~/ 935 749 979
fri/g 9 33 _ 9.,:;<43
_ 5'/75‘715///14/11:- 1111/1611 //6/ 6/_.) '2‘-??;/*:\ /»/1 1 111 9. l33/ 5 /_? ._S`L;/-,,>§;,64
.3 1)/3£”3 £/”"//"(// :'/O ‘/C`/ ./119’11'/1 261//6)// /6/11/6' 7//¢"'3//'! 111/11/ 755%;// , “5'€1 §,/3'; *"`1»»
ifég///Z.£/ /1/17£?/ /Z? /}"`f/é)//(//if“ 512 /%1/£§"1/333'33335/// /_/)g /?,QF//°f/F'/
‘l//
/, 1561 1150 /¢461//11 ¢7)" FWCJH§,»M fé' _.€»:/1:12/»,§1"
\ 7 ,
A)y}/i. wf? §"[3'3;1"3//{?/7 w//// %/6313'€3¢3'¢!'
/ 6,'. 6
7 %611 /14 f/:': 701/1475 ;;/ 0 504// 1117 /0//,’/4111/1944;, /11»,;7/1}1}7,1_ /5/_§' 105007‘1/0
711; jam/1110 516§,1,/1§7` //L,¢/M)f‘*m/r:w 154/0 300/74 1543 "{'/Z.gi z'"!';?.?é/;"/¢;’H/j{`
T 377-1593 gm `/%/"{'_ §71@7{¢’%7 53'14/ 14144{//11; /1.14 341/0/// ////0£¢, 7`/ /’v/c/,» éjf/r/{/
3£/€§: 617 /7/ //Hré> §/1)14 1115 c”M/o/ 175/71 014/7 /_/’/&/// 3 010/7 S;¢¢/ 277/1;;¢ _ 7
/,,/09£/:/1 -//;7 101114/<17 //14 §§>145§§:/71 011/134 //-€"7/014_! 3d1 -/;;' /24¢./@ /,
.»'~3"13 010 663 1611/nw 11 731>2»1/' /%4///1 013/7501 67/ /»1/€_<11/"40 7/0714
.7 §/1`?',0; ,5,5$?»%/% }7/,//1 /1,11//// @6; :3” /5£ An 9/, /¢7§/.(/3 6/ 14775@{5,
//_; //¢/ 112 §774/17’7 511§}¢/7 /01,»0.€4/7 /// 111/f 772 "111/€§7[€6./1%’
//5‘01//+”’ j 161 5j14 .¢c.§r/m»-, //4/§1‘/ é€~fi»v¢W /7747»// ?7Aj
9 /~// " J:/"a// J_f; 34 //17/ //4/"14 5€`¢¢/0/¢»’1,4'/7/.»6'/,70//907[ IW&AA/,uz
.61'///7;7/'£1)/1¢ ` 0 /1/1'71/77 111/1311 1.;»:1,1§'/ 70 7114/0 /¢/1,3'0,4¢, 5/ 0/6/ 11qu -
1 »0’/11/»" 5 /51’/1/ 1550 /~¢1/ /`;`//'.'/£ Y/é/`G:f //7"0,41~ ///4/,10/@_¢:,,¢ "/ é/é§ ,}'?
g /1/1§;¢> ,1// ~/7112.1 <:’.7 14/1'71»3-/ -4‘0,4 ;,3-.-‘~ 600 fn// //;///r~¢ 144 c€/(` 9 '_
//;9/1/”/1 7<75'_/..’0,/_ 370 760 NF”>/€/v//”/ /7, ’/7£///‘ 1/,/9,. 370 14 1:1»"///4 7§’1@1$7:
§//44;¢ /,é¢jg 4321/04 4/0 77/. 0,/ 0'@// 1;/»77” /, / 99/7//7 100/507
4 744/011/;:4, /// §4¢(/,,,3@ --/3>.4» 44,:/ 19,4,§;4< \QSL M€W
" `LVO/ _‘9.€ /£¢111/¢4 """,7"--0@ 1101/7 717/5 €`/’J.z¢ /;/'7 7701 ’0 071""¢ O/[~¢r
/`@.1/3 1377.7;)7`0/: 7 7£//71"€/’/ //1'/ ci//c"w¢£ 717 7 /`/1/':)////77/.€'/. '7// 1,§4__} /703 €/6”60/7
MC( ,//_.;M_Mé//V”f//€/é ;7»;/1§ 1,//5?7/1¢//
/'35'0' "§0170441 /,4 ‘r/;z// /6/7~‘7€1&;1@@4£;@/?@$%&_£<;[0 ¢;4;9 __3'_»
/~/¢'j.@§j //3///0/1711/` /?54£/1 \/§,12.4‘/7/ 99 727 g '/%/011/»/ /)3/ J{/ 63 ‘/5$1/?7»6 " 324 1417/j
19/_7 )/4`//}/.¢7//7’/ //.§// %.!//3‘~7//(_7”1;/`/@/}¢{}7/{ f}/ /".._»: 7/7,‘: ‘f?/~(~ L/:w/Ai§}??
%7%/7)“ f`p fj{¢;:; ~é)/¢’WM /;3"” 67/// gi /
. 61%/43,1,/ 7//75.74¥/' /? § /; /377 7;`7`7§1*¥1/ 001/4 /’~1>//4/“ 7 0 2270
F§//’,p /{////(Z[égw¢/: 51 7/ SQ¢¢K'* 777 174}/@;» 1477 %1/_) 60*71//%
f//¢/ 14",/;/4/164/(€“/?;;?2177 152/750_/§“71/1_§@3[ WCJP;§¢"/:> ¢'9,‘1[7 c_,¢ § 7 ;/~.1;76 390 é'/¢_§.
445/410 ,} ,»,3,,? 001 "*’~/11:/1/ ~)70 Wé/§`
.(»~
‘. z:,-,`;
1 //7 59/»7/§/ 759 /7/44’€/ c/' 1111 §74¢ -;7‘,04,77<_~.,,
// _ /' §
j( §§ 25 5¢;>_)¢ -/EQZ g l , , 7L " /C'[?//h/¢_AG/
. C//??j //4////4/ '~”@~<' // /_)/3/4 722 714/475 //://,» F/%j?/Zz~/c,/w¢
1 77 ~ 77?~72 7///4, 4%.24>§ z/J -- 4 1 ~ -
\\\
4/ v 7/ 1
%/‘////ta/ //// fe .) I"¢'// //{//c: :7§; ///V€ f?:;:/:GZ” fig jr{f’”é,” § da C/
/ /? / / / n/ v 1 451
-- 7/47“ 7 < /z)»/ 5< `/,-/,~' 77/¢?§/ /`Q/<»//€ CC//<">’;‘. »2/ `/_”/`//_ <‘/" /z'/€ /z':__’;,/
Mx< /:/‘Z'é% / .l//:»/ ',';" / ////7 44 / /»// 7¢/¢‘:£ ./¢/5/ 49/7 7/"?*’ U"?l` § 0`7" ¢7 cfa/443 ~.
§5`/;4/; ' ////_"/¢ 47 //4;, // ill/7 /4 /zv~ /4/ H.ev/ 71/4.: C<> 244 z 4
2/7/ ’/%//7/’/'; /%' /éF/f»€`/’./ QA€////”/ 'J;':: (/¢,/// . 5/7///////£’//?0’7¢( j(>
/ '~ /,, ,
9 /§’/`;/> JFF /, /;OW :’(/é/C 74 M/'-a ¢ /¢ §¢z>z/`/ exh §‘¢_;_,¢-'/ '/"(r _,/17§5§~.:,,7 <_ Fuc 49
1` ;*K;(’_S///¢:/ /6?/')/ 9/7€0¢,57»!”’./ ./<~ 6'4~1 dv,$" ’//‘/»7£/( ( ¢é///,’,;;// 671 ,4’//@/'/¢,¢//""//:/77{
:f/Z/` 52~/,?// /7/ 5@,_,¢4<4 / 7/`/7’/ d./"é£/ 11//{"»‘/ ////4 1477 ' fy -;/»é' ///W#’¢°/¢JA“‘/@?/L
/ /, / .
/ ,,{W/// , /»%'4;%¢/ _/.//- /:/:4/"/ (//'/ \¢(M,;>/<.w "/fh@ 1 mdc/wa h/J A_,
§ _ , 4 ,` j / v / ’l 57 , 117#
' ._ ‘ ' _ ij 6/7¢ 6494'7- l. ` 1 ‘ ~
_ 1 1 / 1321 »//r@¢¢_ :ZO;/ cc, 177 /4//§’ /7¢,/<:§ ~1/~€ %;f<"/-
_' './ F/.”// /P/M/g¢/ 772;1/ 7/?'4747:¢7) /V//,y_/ , ,»M//f/’é<.~/// .§/
-, fC?/z'""%j c /7\// /»7,5,4,<» 4 75 ,,»5 @7; // w¢»///_ 4/)/~ @Ac/,>p/..> c//(/
1'»/:¢¢4;.;< 7’»:’5 /¢Q;-'/w;g //'§ dzw,//:'<`C/on *:/5 4 410/ff 716/vw 1 f€»//W/Z§)
. 01§/_/¢37<1+15¢1/€" ` "
f 777/4 4,4,/774/ //,47
` ` /¢/j /§/1'%//'.' \ w/ /)¢§§7; 0 W§//§w%§//WK/ %7§/§ /7/§% // /' §§§'1_
'//§//_€//¢”/ ///z[// §§//A 6/%/ guy 7/?_/¢17// %/¢/[/¢/////L///%§: <01~//'5-€ @’7'/'4
H/Y/¢/?§//' war //7//_ /Y 071/§§ v>/r§ // //S/`A [/§//:%/£Zm€n§/
¢/ /é/; //4§14; 5 Q§/// /7;&1!.` 6013/7i/¢'//~_/§ .f€///HL/P; L// jc§///t/QW§//.__:-- “',// F/%¢1 §§€ 175 /é§ 515/§/::¢//11 <:"3/[/ %/01/ §
firzz@)éw 742 /%/ /§§§1/€/&§§/¢~§/ §§/4 ¢z c§§//¢§rf ¢"///¢/
l // Q¢,I/ r§§f_§ :' //é€///z/ §éz/¢"§/A%V§/ °/§///c/ €<.)§5:/./1~/§/
:/:§//~€ f€§/cé Mf (.I §//‘/ /'C“/§/¢J 1/, f»/-/E,,/F/ /'~;¢'13.'}§¢§
§/ 760 . ._
/Z/;'//¢V//, S/V&/J§§§%A§ %7,/¢/ /W§ f/§,§/r §§§/ /V¢/§(
////1;>45%//4/%1 1111,/ >Y/f§// §/[ y§/@§//z§ /_/ /1»/./ //11-§1» 7%//
»/11, 1111/1/§1, 11111211,1 111/111 14 121 1/{141111 211/11
4_ F:E ///w§/éi//Mr § 726 j/%; 567/no 6*/'§!/ »/u/£ ./Q¢°"M§§/;§)/
.//51;7¢<¢6 zo//§§/§/_//§ /MO! /646 /_64/2(1 76 66 2/ d? /94/21011< 1621/7
‘>/gg;:_c,_[ 6 r¢¢[}_* ' ' y \ 17 y,’ 1221< 6 /// /J/'/Q¢§Q:Q/
3@/61€1//1/ 74 6211/62122/ .1,/1,622111/22161. 1: 1221 21,2§_».;< 2111,
‘/6// 766/77462/6/) /,652/ /0§€. 74 6 21 //////?‘7€ 662 //)1//§2 116/664 /0/2§1>1'11,
'6/"/017 ///1)/0/7./ /6/ §/ 741/64 '~//:.)6/<:/3'2 2/,/)? 460 1761/1166 /1613’26/1=
.6'¢/ 6/ §61-’ 63167/:/€6/ /017///61///_%12/ 67/ 7/2'/<‘<21 4c /62!<:11121;/2
662 /6/4, 611/1214 613/46 / w1//21/11,1,_/// 17/7~/6?.$%'/2 11 `/;1/11;3 ////711122/
664_5/ _/ /// 2/§; 2/275`1??277/1)¢//09 6611;1/212;) /7?;:22121
4 /42/§17266/ 766/26 71/`(/714/(¢% 6/1~',§ 1666/7605 61(1’742/671/221 2166/706
.CV 111 611 6211671/1'6§ /1)6 613 2/ 661/ 66,///1/12121 ’/ 11<71/;/;<’1/21»z
1 y , 1166 726,”67'36//6561`/ 70/§)6¢’/7/.6/22 66 2/ 66 697 § 6!11/
?/2¢1 /1/;: 722 /712111)/1/1»/2 1117 /212/1/-1,q 27/216,2¢
1 .
g
~' /17’/‘/1/6¢`1/ //7§/55§§2/// §0/§/1`/;/6 1/§<1/ /1_,6//6177£/€$5 55’14/56 116
[6/////1911‘5 746/06 _' 374; 516 66 6//6`5`/66 12a/65 5656,/1<14/1/770,66,//
\//_////§66“§ _<1 §{j€c 616 61///716746§¢9»1 17741///`,/1V661/ //7 6 5///
6§66 / 7///6/ 65 011/175 26 /1).6§<:65;§€_§_ 1 c 55 11.1,9¢1/ §c/ §c/ 5/15’¢7//§ §`
/
` /)/`55<6<' //11 §>7466/16;'/ /’/Af661////1'“5 ‘/' 7/' 61 6?17;/ pf/`/?%/ 66/)`1"2"
§661/1//5. 5/5‘11<1@6 /; 677/761¢16/6//1174¢) 416 161/1 / 74`% ).
/%/@6!/€/ -//§5 566/5/ / 1716 '5§674 46 C///v 61//€§74 6601/1606 ’ (/:»‘€J
` /’///74 525/66//2'1: 7L/’lé 1106/156 741/655 3661/56 674 6/7§. §§ 61"/56`>//,6/7¢17/’
)Z?//€§ §/616 616 611/5<.§63 176/506 666161; 661 41/6///114¢:6.// /7-¢»(
1766 5561/,115@¢/ 05 //Z%)§ 51/5/?6/ S.`ec,,c§ 75 €16/ /765/$§__§,//.%/ /05 /<:16 /6”/5~/61) _//'L/)
/6.;/‘/,;§ 26 6 5_:~‘6_1:;6 1171/6 /1/1"/12' ///16 056//66 /`~/6>“5 §66/56 /_66 11//@)-
1496 < /6// 176114/ 16516§6:: 666/604 /’46% “6666 §16 /6///661611
/’
/’7 7106/65 651(‘§)///;/./§5-§`§1£’ §11< 56765/€6/ /-14=5 1144»465/6 ~§(’ //”“`
66/>1_6/: /"§6-6 666 6/146, 2656/176 744€ 012/765
j{//'/ 451§6/ 666 O/ //656//, n/?;¢L:(§6/6 ,_1:6 61 176/516 661 61 /FWrér
’/ :// / \z /@%C._S_ /:/¢// 74ny £(` //O/JC 16 MU{%,
ZZGA_WrL/rw/' §66/1"16'7//5 /6; 661 §§5-,;%661'3 56674€66
, lt ’___.~w__ ,":,._,.,,....
-. /%>1//`6)/€/1 l §56€‘¢’6§€( /(§///1/1/ 66/{§906///616/51, ///,1/ 726 z
///6/15/ S»'_€/'?,//z' 674 1165 65////§566 §g/ §`£/,1?<,; “:é] %‘7§6655;6&
1
_. ’CM/VM/Q///L%//W‘F ` //'4/§ /1111'71‘477 fém¢ //776/64@_17<61§11/'1@17¢; //1 §676'.67/ 712/1557176
7
77 766/766 /566 0/.§/`71~) 667 /6/6176/71776" 6/4.7/<'/ 66
jill/676 fiM/€ '%!/616;`»( 777/175 `6”/7’116677 667/nj 675/17 10646§£777¢ '/<'>77/65567/’
777 77777 1777/117 771 71 7 71 77 1777171117;;7
, {£/4'51/ 6-)¢6//6'77/771'7§76267 r//
677//6/ 771/7/6/ 646 ‘~' 6717714:557'§: ' 1;7/_7;: 416/771 77 77// 777 4 747/7776/
://7(66//64 555 7;,117/6 § 767/77 777 71 77 777/61 177 7 67/_67/ 777
///f>:) 7/277 /_6§6/§' 1666/677 `/77/1~§'1§&7 77/'1~ 1//16 5/.75<: /751 765
_._///wa(iz.»z /4 r/ %56 {6/77/77.4_67/74 0é1/6 767/7:§/ /46 <“54 »/6/;6/ 771/1624
/_/266%/* €»71’%76// /`Z//C{/, Z`/ l 767/1§61//,_;:_ j'§/
` jr 4@177// //. @77'44// ? //7/4»7/7/¢/ L' 5/§%%4¢15/§§ 75§17 111 7//2€ §§11/¢*55 §§" ;§;@" 1~1' 5§//111¢,(///011/
755 129/€`//`01/£ /11/(/ ////§/I //€ (/§§'§/'_€/ €/#161/ 15§/¢5€€/,1 /YZ€’
./7/£”:'§§§€ 1115 /§z,)//c§ §z/P//c” ¢?§1¢;'///1§ fc/ Q7/é§ , /55715.’6"7¢’/7 /7/§9/§/;;
" /(/ //1§ /./€§_1/ 757*&/ /§%/7€//' ////M M'::'/ 661§')§5§:¢§; /,'§ ,§71/§{/§»¥§,¢/,;/
’ ///6£’/ /5\€ /:§/駧 //5 111§§§/§/§§//7'1 ;///4§ /§,/1'//‘ //-f/// /1:>€/5_1/1’
" vf//%/z/// €XW§//_F§ 153 '
, f/§/ /;/// Z/; 771 117 ('/51;'7 /§ ry %“17€§7#<<)'/ /ié§W/Z/ éw///§,,//
7 0§§///5*§/5 /§€/51¢,»25 w§/////§ §§ »5§11/ A`//?///z§;§ 7///€§ 1411/§1/ %1//§ §§1/1/5§ ,»//1'41§/¢
_ /‘§, "€§§ /`1§/ 1`/ //,1@/ //,§§,§r//'/¢§L/fr§/// 015 §§ 5//§15§11/
.1/?1§§5§/§/%//'/§5 74§/ 7//15`// 15&//"/:~/‘/ 1§/,1/§/111,§57/,§§. '
L(//Zé’§ //;€ //7/§1/<"/§/ M// 7 65 /51//5, /1'/1§/11§/!4§ ////7' §/§ 561/11§§1§
/é/Gf/?/F/ 1967 /érz"§ 14 - §/ /f/OM/;§¢:-'r /x.,é/cé z§§r/ ~/he’d §§15€/1//§§)5\
I f
@é€~/// z/§ 515 01/~€//;§/11¢€ 17 1/10/§15€§ ////Le D¢Q/€w§/§§r‘f /7~5//.»
/§1;;/;11§//%€%7/1715‘/§ J/§/§/ /4€ §/~é/z»'¢§§`/r am //»1/_///1/§¢§ {/
/:/¢ %//5.//§?<§€’1//6£§/(€ 67 6 /1¢ 7%’/7§§/§(5;§1<€§ //,l ./1\.%;',' Z€/§Z/`§T<`Z/
7/7 7/5” A/Dé'* ~"./1`/ ?¢30”3> %/7/§//7€// %’Vl/CG/ /§z///c)/§r/ %/W%§ 7!¢_”'
0§7/€//{/ /§§/ 7/\€ Coz//)%§C/§,-, //61§/ 逧md C<:>@/CF¢/ 5%§7 /7//¢/§/¢
/?0 /’.//707‘"/'¢\/) ~/ (%V/c‘j`f F§“/r/§_§ §§ H§EC/w'/v &§‘1“/(/(/4“a F/é 6
/W/P¢c)w o~/ '////19 l/F§;/,/ /<96/¥7"/ Q/§'§/C// %/5~/€ 4,//§§ fm‘@/§A§/%
- ///’5§`1//6”/714€,/€//§§/§& 5€//`/5 7%€ //?/¢) V/-€'§ /C/zc)§///§c/§§é///G/€ G%cé'r
.'?l@`/§¢.c/%/M§f V< // 767 //7§§§//§§@ fcc//of/" 55/'¢2( 7./ /1'= `c..’é`§/<<_/
7 9 %Iéz//é§)[ /`HM/////£ 0/71§§/€ §1”/1//€”///1/1§ /§’//>1/14;§§§/ 77/?;§- /
7:1;7§'§/ §/M ¢é///é"¢/ /¢’§/1\ 1§/;§)/7/€§~§////`“§ §,,///§ /,S€c§<§q>/ 5
i
0//'0`
' ///‘ //_/// 10///7€0/7{/19// (/6'1'/ £6>7015:5 5001//1/} / 757/7§)'%47(/ I707 C@j- ~
/ /7/7"6_”/ 0 7%///07£711%1/0 ///7’/1/6/57! // //`714/ 7/76 7/1)72/7/1&7”.“/7_/@
- .;///1/1>7//§ 5/706€€ fdi€cbné//»?; %7/_» 67’@/16¢1/77;: 607/1'§%7/7‘/6107¢,»/// 7/7"`
1261/777 F//////é/// //2.0 117// //7{/0777%”61//%
` /z?W/Z /%/0”’/ IM/M§ [7//0/0/0-:00///¢' /4//’§'<`1/,)7;07/\/6¢~ 6/' /2111/1 ,//"`0',0'0./ /¢02//0:1€/ W 6“/(/720;< //AI£A/aw/,u/ 770/67 //0/7/21:61<.//77/01/ 1000/070
/%7)/"/77/// %77/<':;01 77//5/0%/105€»0%’¢/0/ 77/ 6 /10177f ftl/710 c 070$0’ ~ y
é//////f 11/ ,0/0017'///0/¢ §u//?/” ` ¢""// ,
4 ZL/z’//¢/, ////2 //*7$1//’10/,5‘ f>: %////°//%0,7' 010 /6,00100115//
/1”//7¢1/1/00,1/"/%<~ //// ;///01 ~'~/2 § //0/011 ¢/“0" /z/ ¢11-1//¢ ,/ /7//
/1111`~,-.§. ,707/0,:0,7,/:1» mé~r,/ 1120 f,///k,§/AWY/’ 10/7/ /’10// //7’/ /Z%/
/17`/00/1 1//01/<:0<.0/,70::1/7é JC// /0// §/1010'/00:10/7§/ //10 ///'/%/ /0111 0/0<00~
/:'"0"`01/~1/ /77/407010/ /%/ %171,'// 1/017/0107/ 710 405 /é////////r /01`/70§",0/
///77// 510 476 677/7/// 157§/10¢7/06 §7£@77/////00/{ 667*%//;;41»/1//¢€1€
717/1,/1: 771 , 717 /0@11¢;11111111 74 ,// 747 %0_`/0771/:: '
//70#0/7[11/6’ %:5/<‘/ 71 1110/1 6//171$'0/77/€”/1010/ 67 5///06/ 74
7///770 501/§477'»0 07 Z.WQW///J/ 6/7/.6////1¢07//1'///// 77./07» j010 ,70'1:,//-' 771 7/
171 7 17: 177/71 >/ 711 111 71111/. z; 1/,1111717 170/71
%7/<5’ /6'¢//7.1”6:/'4' %%74/17/['77/¢/§/' >/011,:/ 7/2¢/1> %7//,0/6;<” /.§'/<'?L v
7//¢7 6/,7:71/117£ 770'1/6777754"2/, /7//5/)'5' 92/5/?/ 9§7’74’¢) /75/ 77 7<667//
'//6?)”51.`661/ 676/122 /7/°,675?25112’ éf@cp /216/7 62/ 277%$/6>§§_,5_/; 64467/7/7/75777!1 56
776/772 7/77467// 6055 661/76 767/25 1// 262~/6,666/6€77/2/’7/7/2, 5005/777 AM
7‘;)2?2166»7725 6107/756'//772577 756 111/61'//6/ 156/76 /)'/647/22/75/ /6’016_221/67“1/7:7/72/
v Té l/ ///67745"077 325/f 556/sz 550 ////1_/ // 62¢'@3)'4; §§75'»*1/1»176<50 /77 66/55€277//(’ t _
2 46/616<;67 ////6)//€675€$/6%_75¢ //"¢5*//(2/1/ F€W 5771{7 675/560/5’17 .7';1772)/6777€72
6 ' 1 777§~~154216//.5671/€ ,5777616,1.26 506/757 257/2775 15///2' /2)17~/ 2751/56~
. 711/2 >/ 67676 76:67// 677 22777/667677/) `
522726//%6/ 6/(5‘¢//7//5/77/57///62/)//77/ %61/5 757/4 665 447 ~
717/0/2% /// 756/795 '%/577/ /5 //_62///76617z 477/_ 663/7//€2///?57 é¢,//K@M/ £5»/
»7/§.'_" 7
.§/577 /15“7 /) /{5% Z%/< 555/574 /§5§5/77 7/%7¢577 /c/ 7/555//?¢/77/5
n /75)”7// 525 Z¢;'577'/57,r »§77/5/7775 5¢/§7[ .§7/177 //§/ §77/‘5 5§/5//51/£? Q§é/;’_§"
' //_55'/( .`7<:75 5;`/ /-/ /f//?//wd:/ 7/7//< /‘_/725 55/:55¢/ 555//’/’77 /%/5)
l §§§55§777/ /775 /,55/ 7/57//7/ 5555;5/¢ 5//577755¢ 5`6///£//73'€ /5177,5/’5€ §77»7
' - 5 /
7//5///57/;/;/ 7/ crm/555 ~'5/;§ 575 /7/7/5/(/ §57;5575 425 /5,/575_7 1557
/”/€ §5/ /5 /75575/5/' 7/57L' §7?7¢’ 77 557//// §57/;//¢;7 775 §C’ §5///§557577 §€’
65775/7/ 55 777//,5/7 577 55/-/ ' ‘ ' .,57 5;/77~577/ _F
/
'/7"7§/ 77//7//05/`:57/ 5___§7757% 5557‘7;¢/ §)§/ §/777 ///7 74557/ 5 ///'/57/77777777` 575
-j§///.@?//c*//¢’ //7§557 771/557 §§ 7~57757/§_/:) Vf 7 7%§/7/§’5 /é/~:" ;§2'/
/2:>’ /§’/ F~»////*z<»///f//c?¢/?M//; /777¢/£7 7/5 /§§/77/775 /5§7'/§€`/
/§77/ 555/555 /,`//:'7/<:5 777/77 57 '“ _ ~, - _§¢ 755
n 71 /1/7177/7/ 75 77§§/7$// §5;§77(7775 /755,//7777/5/ 55577575/) . ' . y
." 56/§//515// §/§/7/57/ /57577/ 555/5// /57 757 5(/;57,§ 5/55//57577
‘/<,'"€75/-'» ///"%’%/5/~/577/5 /§/;“57/2'/ 523/5555§775// /§/7,75 755/ /5// <’”%’¢=,`/c' ;
57§/%/ 575/655 7475 /77¢ §75/7/,77<7 /§5 /.‘Sz55/ ///75_,. /'/1/¢'577/55/ S/"§:/§°
:§ §// 777/775 /7/ §/ f¢Aé/<‘//M /5/ 6/5/25£;/¢77 /555755//77 7§7
//7 755 //§7,’ /4/“///777///@5/ <75"77 '/7_.,- ,/§7§?; /'/77~7: , C /:/7_5/)5/'7:7/
/;55 /§//, ‘:/5.‘¢§/ ,77 ///§77 /,//5 //-7 775/575 §<1 .§7/ /'-
///./97§ /5/// ////§:’z` /1//57/'/ /5/ //_'75/75/,» / §/! //c’ /._97751' f////¢.¢//
A////§ 7;7775,77/,~7/ '7//5577 5777/ VU§I'§ 577/77 540 /)’:7 677 577/77 /§7/5/77
-/7_7// //// 57///7§/// 3¢_55,';] V§7’ 7§,77),75 7/'7771§ /55 MM5//5 ./7,\,577`:7:/
" 7'7:,/57_7/ 77/7777 777 715/7 //57 7 577/5 757 §/// /7 r// 7//7757~7, 7,~
797/§/`( 457///7;€ 775 _/7?{/5: §§ $'“/757 ,§77/5//7§ /575 //`/ ///777'/ .,//'75/ ¢,/
657/775 ¢/5’~_?5/ 43 577:57/5'/ <'-.’ <`§7§ 557 /»§/'//;’ /7 765 /7“/ /,/7 /./ '1£.§5 /c)L//?L
"7/ 577// 557/57 r /<.7 ~
;:'\
..f / /_ -57»77'5// /V'?l~'~?,r///“’A/ ~//_//i‘ /:F~:-§’/ 575 //55 _).//<"§/ 17§7//5 ///¢’747/7_
:’///§ §§/7575(5 _/7/15<'///7//// 5`/;////`{5 155555¢§;*' ’ a - ` ‘ n ,¢
§§ /¢/éué/M §§ WQ//W/’i/Fé// /§7/(`{ M///é/?Q/ /17/5'/ A.) 6////75} 712 ('551///\'" //%`
/
§j\j. '
w /%'
.
716/516 ?:66'¢/77’7/7/ '//2¢67 ` ///225 ‘?/' 1627/567 él::
" /61/ '6’¢’2//]/777/;/6;12 26261/ // 666:121 §6 666/6 /2// 7/776//7/626€ /6¢:///776 /2_;76 ~
/¢‘/ 777 727 //6/6776276/61/ 277/666 v /’6/6/2/ 1 . G//é.»/// 616 76 / /276€/;’7;57€7;§€0/// 6672/6 ///._: 76776 2211/76 677///26/67 ///661/62:116 z: /21121 '//21=::5
2 : 2537/§ 167 //f’ 29/~6/77~"///1// 22’,15// 62/'6; ,2% /c"¢v‘( `/;/ %" 57/
m rH'E couRT oF chMilNAL APPEALS
' _ o~F TExA-s '
No. Pli11095-12_
_ THE _STATE OF TEXAS
v.
ANTHONY GRANVILLE, Appellee
`o,N sTATE"S\PEfri`IT{,I_oN FJOR DIS'CRETioNARY~:-REVI“EW
FROM THE sEVENTH CO'URT 0F AP-PEALS '
._»WALKE.RYCOUN_TY
` COCHRAN, J., delivered _th'e. o‘pini_on'o_f the Court in which KELLER, P.J., and
MEYERS, PRI_cE, WoMAc?I'<,~ JoHNsoN, HERVEY, and ALCALA, JJ.,_ joined. KELLER,
P.J., filed a concurring opinion iii'which PRICE;J., joined. KEASLER, J., filed a
dissenting opinion.
O P IN l Q N
This case raises the issue"' of whether a person retains -a legitimate expectation of
privacy in the contents of his cell phone when that phone is being temporarily stored in a jail
property roorn.l The trial judge granted Anthony Granville’s motion to suppress, concluding
j We granted the State Prosecuting Attorney’s (SPA’s) sole ground for review which asks,
May law enforcement, With or without probable cause, activate and' search the
iGranville Page 2
that the high-school student did not lose his legitimate expectation -of privacy in his cell
phone simply because it was being stored in'the jail property room after he had been arrested
for a Class C mi`sdemeanor. The court of appeals affirmed that ruling.2 We granted the
SPA’s petition for discretionary .review, but we reject its'argument that .a modern-day cell
phone is like a pair of pants or a bag of groceries, for which a person losesall privacy
protection once it is checked into a jail property room. We therefore affirm the judgment of
the court of .appeals.
v I.
One morning, Anthony Granville was arrested for the Class C- offense of causing a
disturbance on the',school bus. His cell phone was taken from him during the booking
' procedure and placed in the jail property room. Later that day, Offlcer Harrell, a Huntsville
' Police “School Resources Officer,” was told that, the day before he was arrested, Mr.
Granville had used his cell phone to take a photograph -_of another #student‘urinating in the
boys’ bathroom. Ofticer Harrell, who was not involved in arresting Mr. Granville, then
drove to the jail and retrieved the cell phone from the jail property room. He examined its
contents without first getting.a warrant. The officer turned on the phonc, which had been
turned off. He went through it until he found the photograph he was looking for, then took
contents of an inventoried cellular phone that was immediately associated with the
person at the time of his lawful arrest?
® 2 State v. Granville, 373 S.W.3d 218, 227 (Tex. App.-Amarillo 2012) (fact that defendant’s
cell phone was in jail property room did nothing to -“nullif}f’ his “reas`onable expectation of privacy
in the phone searched.”).
Granville Page 3
the phone to his office, and printed a copy of the photo graph. He kept the phone as evidence. _
Mr. Granville was charged with the state-j ail felony of Improper Photography, and he
filed a motion to suppress, arguing that Officer Harrell could not search his cell phone
without a warrant. At the hearing on the motion to suppress, both Officer Harrell and the
prosecutor contended that if an officer has probable cause, he may search anything in the jail
property room that belongs to a jail inmate. There are no exceptions The trial judge tested
this hypothesis by asking the prosecutor,~ “-[D]o you agree that there is an expectation of
privacy on the information the person has on their cell phone?” The prosecutor responded,
/,.»¢*""'°“-M `*~`
,r\"
.. N\.""\ .
“If` you have it inyour"'possession and not committed a `Ci'rme,`sure_._:’_vw She elaborated further: w
I think if you"re in the W_alker County jail you have no expectation of privacy"\: §
in the personal effects that you had on you at the time that you were arrested. §
.His expectation of privacy is diminished in those effects until he can and“
does exhibit subjective expectations throu h , presumably at the : . if
l time of his release from detainment or incarceration \? dog 6,{“_}'”£? 27 -'
" " ' ' " CO /6)4.¢5'@ `~} f§r/ci+o£
Defense counsel disagreed:‘ [I]t is clear that everybody in this room has some subjective
belief that their cell phone is private and it doesn’t matter if it is lawfully seized by the cops.”
The trial judge posed the legal issue nicely:
So if 1 get arrested for jay walking out here this afternoon and get put in jail,
any officer in town can go out there and go through my phone, cell phone, and
might discover that l have a picture of Promctheus chained to a rock in the
mountains and an eagle eating his liver out?
Y-es, said the State; "“If an officer has probable cause vto believe that you committed a crime
)
mci evidencc‘o'f`that“ciiinc'[i"s] on"y"ou`r' pliciié§'the`n, ‘yé's"`hewc_aii`lock_at"'it'.'"OtheWi§e,"ii'o’h`€ ' "`m"
can’t look at your phone because he wants to. He has to have probable cause.”
Granville ’ Page4
After studying the law, 'the trial judge granted the motion to suppress and entered
/\
findings of fact, concluding that the cell phone was the personal property of Anthony
Granville; Offi`cer Harrell took possession of it without a warrant; and the officer “searched
the'contents of the cell phone until he found the photograph he soug`ht.”3 Based on his factual
findings, the trial judge concluded that Anthony Granville had a subj ectivej reasonable, and
legitimate expectation of privacy in his cell phone “even when that cell phone [was] in the
10.
ll.
12.
13.
14.
3 The trial judge’s complete findings of fact are as follows:
Anthony Granville was arrested and jailed for a class C misdemeanor of Disruption of
School Transportation.
When booked into the Walker County Jail,_Anthony Granville’ s personal effects were taken
from him by Walker County Jail personnel and placed into his property.
Among the items taken from Anthony Granville by Walker County Jailers was a cell phone.
The cell phone taken from Anthony Granville was the personal property of Anthony
Granville.
After his incarceration, Officer Everett Harrell, a school resource officer at the school
Anthony Granville attends, heard from others at the schoolthat Anthony Granville had taken
a photograph of another student
Believing the taking of the photograph to be a possible criminal offense, Oliicer Harrell went
to the Walker County Jail and took possession of Anthony Granville’ s cell phone.
The cell phone was off and Oflicer Hairell had to turn it on to manipulate its controls
Ofiicer Harrell [s]earched the contents of the cell phone until he found the photograph he
sought
Officer Hairell seized the cell phone and checked it into property at the Huntsville Police
Departrnent.
Based on the content of the photograph allegedly taken by Anthony Granville, Anthony
Granville was charged with the State Jail Felony‘offense of Improper Visual'Photography.
At the time QH.icer Hairell top_l_c_p9ssession of Anthony Granville’s phone, he had no valid
se ant ""~"“
Ofi‘icer Hairell had sufficient time to obtain a search warrant for the contents of Anthony
Granville’ s cell phone.
Officer Harrell took possession of Anthony Granville’ s cell phone and could have held it
until a warrant could have been obtained.
No exigent circumstances existed that would have necessitated circumventing the search
» warrant requirement
Granville Page 5
jail inventory of an »accused.” Because -Oflicer Harrell had neither a search warrant nor
exigent circumstances to make a warrantless search of that phone, the trial judge granted the
motion to suppress.4
The State appealed,.and the court.of appeals affirmcd, finding that (l) a person “has
a general, reasonable expectation of privacy in the data contained in or accessible by his cell,
now ‘smart’ plione,”5 and (2) a person continues to have a reasonable expectation of privacy
in the contents of his cell phone even though it has been placed in a jail property room for
4 The trial judge’s full conclusions of law were as follows:
1 . Oflicer Everett Harrell had no valid search warrant When he seized the cell phone belonging 9
to Anthony Granvillc. '
2. Ex-i gent circumstances did not exist to lawfully circumvent the necessity of obtaining a
search warrant.
3 . The seizure of Anthony Granville’s cell phone was not accomplished as a search'incident to
arrest.
4. To the extent"that probable cause was necessary for Oflicer Harrell to search the contents of
Anthony Granville’.s cell phone, the Court finds that the State of Texas did not meet its
burden iii demonstrating probable cause as it wholly failed in its evidence to show that
Oflicer Hairell had in his possession at the time he took possession of Anthony Granville’s
cell phone sufficient information to believe that a criminal offense has been committed by
Anthony Granville, specifically that he did not state in his testimony that he had information
that the photograph was taken without the consent of the student photographed or that the
photograph was taken with the intent to invade the student’ s privacy
5 . The Court finds that Anthony Granville had a reasonable expectation of privacy in the
contents of his cell phone.
6. The Court finds that Anthony Granville demonstrated subjective expectation of privacy in
the contents of the cell phone.
7 . The Court finds that the expectation of privacy in the contents of one’ s cell phone is
reasonable and one that society accepts as legitimate, even when that cell phone is in` the jail
inventory of an accused.
5 Granville, 373 S.W,3d- at 223.
Granville Page 6
safekeeping.6 The court of appeals ended its opinion with a.rhetorical vflourish, noting that
“[a]` cell phone is not a pair of pants,” like the pants and shoes whose warrantless seizure
from the jail property room and later search and testing we upheld in Oles v. Sz‘ate.7
II.
Appellate courts afford almost total deference to a trial judge’s findings of fact in a
suppression hearing as long as those factual findings are supported by the record.8 We also-
view his factual findings in the light most favorable to his ruling.9
The Fourth Amendment states that “[t]he right of the people to be secure in their
perso‘ns, houses,lpapers, and effects, against unreasonable searches and seizures shall not be
vidlated.”'° 'The term “papers and »effects” obviously carried a different connotation in the
late eighteenth century than it does today. No longer are they stored only in desks, cabinets,
satchels, and folders. Our most private information is now frequently stored in- electronic
6 Id.` at 224-27.
7 993 S.W.2d 103 (Tex. Crim».,App. 1999).
8 State v. Duran, 396 S. W. 3d 563, 570 (Tex Crim. App 2013) (“Appellate courts afford
almost total deference to the trial judge’ s determination of facts (if those facts are supported by the
record) when they review a suppression ruling. ”); see, e g., State v Betts, 397 S. W. 3d 198, 204 (T ex
Crim. App. 2013) (deferring to trial judge’ s factual findings and upholding trial judge’ s
determination that defendant had reasonable expectation of privacy in his aunt’ s back yard where
he kept his dogs).
9 Kothe v. State, 152 S. W. 3d 54, 59 (Tex. Crim. App. 2004) (appellate courts must defer to
the trial judge’ s factual findings concerning a person’ s expectation of privacy and view them in the
light most favorable to the prevailing party; ultimate legal issue of standing` is reviewed de novo).
“’ U.S. CoNsT. amend IV.
Granville Page 7
devices such as computers, laptops, iiPads, and cell phones, or in “the cloud” and accessible
by those electronic devices.‘l But the “central concern underlying the Fourth Amendment”
1
has remained the same throughout the centuries; it is “the concern about giving police
officers‘unbridled discretion to rummage at will among a,person’s private effects.”12 This is v
a case about rummaging through a citizen’s electronic private effects-a cell phone~without
a warrant.
A. Standing: A Cell Phone Owner Has Both a Subjective and Reasonable
Expectation of Privacy in -His Cell Phone.
A person has “standing” to contend that a search or seizure was unreasonable if (1)
he has a subjective expectation of privacy in the place or object searchcd, and (2) society is .
' prepared .to-recognize that expectation as “reasonable” or “legitimate.”13 '-l`he “standing”
doctrine ensures that a person may claim only that his own rights have been violated; he
cannot assert that he is entitled to benefit because the rights of another have been violated.14
“ See Bryan A. Stillwagon, Notc, Bringing an End to Warrantless Cell Phone Searches, 42
GA. L. REV. 1165, 1194 (2008).
12 An'zona v. Gant, 556 U. S. 332, 345 (2009).
- --*---»~--+ ~~~~~~~~~~~~~ '~"*~Mnnesoza v 01son,-495 U. s.- 91-, --=95 97 (1990) (an overnight guest in another S home has
a legitimate privacy interest in that premises and thus may challenge its search); Kothe v. State, 152
S. W. 3d at 59 (Tex. Crim. App. 2004) (“Any defendant seeking to suppress evidence obtained in
violation of the Fourth Amendment must first show that he personally had a reasonable expectation
of privacy that the government invaded. He must prove that he was a “victim” of the unlawful
search or seizure. He has no standing to complain about the invasion of someone else’ s personal
vrights. ”) (footnotes omitted).
14 Olson, 495 U S. at 95 (“Since the decision in Kalz v. Unit`ed States, 389 U. S. 347 (1967),
it has been the law that‘ capacity to claim the protection of the Fourth Amendment depends.. .upon
whether the person who claims the protection of the Amendment has a legitimate expectation of
Granville Page 8
A person’s constitutional right to be free from unreasonable searches is a personal right that
cannot be asserted vicariously.15
Courts have held that (1) a person has a subjective expectation of privacy in the
contents of his cel»l_phone,16 and (2) this expectation of privacy is one that society recognizes
privacy in the invaded place.”’) (quoting R`akas v. Illinois, 439 _U.S. 128, 143 (1978)).
15 Minnesota v. Carter, 525 U.S. 83, 88 (1998) (“[T]o claim the protection of the Fourth
Amendment, a defendant must.demonstrate that ~he. personally has an expectation of privacy in the
place searched, and that his expectation is reasonable”).
16 See Uriited States v. Wurie, 612 F. Supp.2d 104, 109 (D. Mass 2012) (“It seems
indisputable that a person has a subjective expectation of privacy in the contents of - his or her cell
phone.”), rev 'd on other grounds, 728F.3d l (lst Cir. 2013), cen‘. granted,v 82 U.S.L.W. 3104 (U.S.
Jan. 17 , 2014) (No. 13-212) (upholding defendant’s privacy interest and holding that warrantless
search of cell phone taken from an arrestee was unconstitutional). -As the First Circuit explained in
Wurie: _ '
We suspect that the eighty-five percent of Americans who own cell phones and “use
the devices to do.much more than make phone calls,” . . . would have some difficulty
. with the government’s view that “Wuiie’s cell phone was indistinguishable‘&om
, other kinds of personal possessions, like a cigarette package, wallet, pager, or address
book, that fall within the search incident to arrest exception to the Fourth
Amendment’s warrant requirement In reality, “a modern cell phone is a computer,”
and “a computer . . .`is not just another purse or address book.”
Id. at 8 (citations omittcd); see also United'States v. DiMarco, __ F.Supp.2d'_, 2013'WL 444764,
* 10 (S.D.N.Y. Feb. 5, 2013) (quoting Wurie and stating, “given, the unique and significant
information-storing capabilities of the modern cell',phonc, [defendant] did have a privacy interest in
'.the_ cell phppejhatlthoHicers found in_ his pocket” when they-arrested him); People v.
»aj§l¢§j:;g§_g,$_d;§_l],, 32_§2_~1_&(;919T Ap’p;M j;¢quoting Wurie and “_assuming” that the defendant “had
as(in`able"`cxpecmdon of ' Macy in his cellular Telephone’s &HHHBW’); see generally
Schlossberg v. `Solesbeez 844 F. Sup ¢2d 1'165, 1170 (D.Ur?"§g_l?l‘(“[P]ersonal electronic devices
such as cameras and cell phones cannot be consi ere closed containers” as "these~ devices are
capable of holding large volumes of private information . . . . On adain basis citizens may carry
with them digital cameras, smart phones,.ipads.(or other tablets) and laptops. These devices often
include some combination of email services and intemet browsing. Potential information stored on
them includes: phonebook information, appointment calendars, text messages, call logs,
photographs, audio and video recordings, web browsing history, electronic documents and user
location information, Wayne l arisen &-Rick Ayers, Nat’l lnst. of Standards and Tech;, Guidelines
on Cell Phone Forensics 56 (2007), available at http:// csrc. nist. `gov/:publications/ nistpubs/ 800-
Granville Page 9
as reasonable and legitimate17
A person’s subjective expectation of privacy in a cell phone that he owns and
possesses is supported by decades of cases on “standing.”18 A defendant normally has
“standing” to challenge the search of places and objects that he owns. For example, a
homeowner has standing to challenge a search of his home.19 And a person generally has
1.01/ sP 800_ .101. pdf.”).
17 See, e.g., United States v. Finley, 477 F.3d 250, 259 (5th Cir. 2007) (rejecting el/Q é:;'
government’s position that because cell phone belonged to his employer;'de`fé'r`i"daiit"did"M ?~`é!o:£ "'i _
standing to challenge search of cell phone; defendant had use of phone and took normal precautions V'¢i ‘\ wei side
to protect privacy of phone calls and records even though he did not have password protection); 5‘?"&’@ 'f""":
Um`ted States v. Lopez~Cri¢z, 730 F.3d;803, 808-09 (9th Cir. 2013) (u_pholding trial judge’sfinding fee @/h»:,,éi/.€..
that defendant who was in possession of cell phones and was using them had a reasonable
expectation ‘of privacy in them; no evidence that defendant did not legitimately possess the phones
or that he failed to take normal precautions to maintain privacy by abandoning them or_ throwing
them away when he was stopped by agents); Q)medi§‘ra¢es v. ' 94 F. Supp.2d 1291, 1299
W (“An owner of a cell phone generally`h._as a reasonable expectation of privacy in
th§,elecnomM d on the .. hone.”); .Szaze v. Carr`&i?§`TTS°”NW§z“d~i“rorii~rwir“"znin)u
(defendant had a reasonable expectation of privacy in his cell phone); Unz'ted States v. Davis, 787
Fl Supp.2d 1165, 1170 (D. Or. 2011) (finding “[a] person has a reasonable expectation of privacy
mhis or her personal cell phone, including call records and text messages” ; U ' edStates v. Gomez, j
W(S.D. Fla; 2011) (defendant had a reasonable_e;pl;:at`iaimj
his cell phone)_ . H ~-~…,,W
,.,....».i‘-m`mm»m,w-Mm~]
"8 `When asked at oral argument about specific evidence that Mr. Granville had a subjective
expectation of privacy in his cell phone, defense counsel recalled his law-school memory of res ipsa
loquitur, the notion that “the thing speaks for itself.” lt was, after all, a cell phone. Just as one
assumes that a person has a subjective privacy interest in his diary, in.his medical records, in his
bank records, in the content of his telephone calls, and in the content of his personal computer, one
may assume, without further `proof, that a person has a subjective privacy interest iii his cell phone.
19 Alderman v. United States, 394 U.S. 165, 176-80 (1969) (a person’s property interest in
his own home was so great as to allow him to object to electronic surveillance of conversations
emanating from his home, even though he himself was not a party to the conversations).
Granville Page 10
standing to challenge the search or seizure of'a car he owns.z'0
A “legitimate” expectation of privacy acknowledges the lawfulness of the person’s
“subjective” expectation of privacy, As the Supreme Court has explained,
a “‘legitimate”' expectation of privacy .by definition means more than a
subjective expectation of not being discovered A burglar plying his trade in 7
a summer cabin during the off season may have a thoroughly justified
subjective expectation of privacy, but it is not one which the law recognizes
as “legitimate.” His presence . . . is “wrongful”; his expectation is not “one that
society is prepared to recognize as ‘reasonable.’ ” And it would, of ecourse, be
merely tauto`logical to fall back on the notion that those expectations of privacy
which are legitimate depend primarily on cases deciding exclusionary-rule
issues in criminal cases. Legitimation of expectations of privacy by law must
have a source outside of the Fourth Amendment, either by reference to
concepts of real or personal propertyM l_a_w or to understandings that are
recognized and pemme§ One of the main rights attaching to
property is the right to exclude others, . . . and one who owns or lawfully
possesses or controls property will in all likelihood have a legitimate
expectation of privacy by virtue of this right to exclude.21 .
The factors that courts use in deciding whether a person has a reasonable expectation of
H/,,..""'""i»
_,. new . ei-N.Wiw,_m_m-* . 1 ’{I ;€ -.‘r
privacy in the place or objecnsearch'e” ihcludcihe foilowing: ""`"""‘~~~‘-~--~`._“, w/ 121/§ if j
.,/"”"”“MM
§ (l) whether the defe dant had a proprietary or possessory interest in the placeo\q:§x
._\
\_ object searched,
r---»~e-.._,,..
"--~W.-W
211 United States v. Jones, 132 S. Ct. 1945, 950-53 (2012) (trespass upon car by placing GPS
device on its underbelly was an invasion of property rights and constituted a Fourth Amendment
search).
21 Rakas v. Illinois, 439 U. S. 128, 143 n. 12 (1978) (citations omitted).
- »"
commonly stored on businesspersons_sg;ell,phones to governmental view. z d
Granville Page 13
privacy, identity theft, or, at a minimum, public embarrassment is enormous.27
B. A_n Arrestee Normally Has an Expectation of Privacy in the Contents of his Cell
Phone That Is Being Temporarily Stored in a Jail Pi-'operty Room.
Although a person may have a reasonable and legitimate expectation of privacy in the
contents of his cell phone, he may lose that expectation under some circumstances, such as
if he abandons his cell phone,28 lends it to othersto use, or gives his consent to its search.29
Courts across the country have wrestled with questions of when he might lose hisreasonable
expectation of privacy in other situations, perhaps if he is arrested and police perform a
search of his cell phone incident to arrest3° or, as here, of his cell phone stored in the jail
27 See, e.g., Newhard -v. Borders, 649 F. Supp.2d 440, 443-44 v(VV.D. Va. 2009) v(former
school teacher and his girlhiend sued police for invasion of privacy When defendant was arrested for
DUI, officers took cell phone that his girlfriend had lent him, accessed nude photographs of himself
and girlhiend in compromising positions, then shared photographs with other ofhcers, which led to
public notoriety and loss of his teaching position).
28 See United States -v. -Powell, 732 F.3d 361, .374-75 (5th Cir. 2013) (when -defendant~
passenger disclaimed any personal connection to cell phone found in car, she lacked standing to
contest its warrantless search by police othcer); compare United States v. Lopez-Cruz, 730 F. 3d
803, 808-09 (9th Cir. 2013) (arrestee did not abandon his privacy interest in cell phones when he
denied ownership of them and said they belonged to a hiend because he was in possession of them
and using them when he was stopped by border-patrol agent).
29 See Lopez-Cruz, 730 F.3d at 809-1 1 (defendant consented for border patrol agent to “look
through” his cell phone, but scope of that consent did not include answering incoming calls).
30 Because the State did not rely upon the “search incident to arrest”doctrine in the trial court,
the court of appeals did not address that doctrine in its opinion. We will not do so either, but we do
note that two separate certiorari petitions have been granted by the United States Supreme Court on
the issue of whether the cell phone of an arrestee may be searched without a warrant under the
“search incidentto arrest” doctrine. Rileyv. California, 82 U S. L. W. 3082 (U. S Jan. 17, 2014) (No.
13-132); United States v. Wurie, 82 U. S. L. W 3104 (U S. Jan. 17, 2014) (No. 13- -212)_. The legal
issue in the present case is similar to, but not the same as, that in Riley and Wurie which came to
opposite conclusions; the California court of appeals upheld the warrantless search as incident to an
-arrest, while the First Circuit held that such a warrantless search violated the Fourth Amendment..
Granville Page 14
property room.
Under the Fourth Amendment, police officers may search an arrestee incident to a
l
lawful arrest.31 The justification for permitting such a warrantless search is (1) the need for
Courts across the nation are split on this issue. Compare Smallwood v. State, 1 13 So. 3d 724, 735~38
(Pla. 2013) (condemning warrantless search of cell phone as part of a search incident to arrest); State
v. Smith, 920 N.E.2d 949, 956 (Ohio 2009) (same), cert. denied, 131 S. Ct.102 (2010), with Unz`ted
States v. Murphy, 552 F.3d 405, 41 1-12 (4th Cir. 2009) (need to preserve evidence justified officers’
warrantless retrieval of call records and text messages horn cell phone of suspected narcotics
arrestee), cert. denied, 129 S. Ct. 2016 (2009); UnitedStates v.Finley, 477 F.3d 250, 259-60 (5th Cir.
2007) (although arrestee has a reasonable expectation of privacy in his cell phone and thus had
standing to complain about search, warrantless search of cell phone was permissible as incident to
arrest).
. Even if the State had relied upon the “search incident to 'arrest” doctrine in this case, we note
that the majority of recent cases that have considered the issue in the context of a cell-phone search ,
have held that the search must be contemporaneous (or nearly so) to the arrest itself. See, e.g.,
Murphy, 552 F.3d at 411 (initial search of cell phone occurred when arrestee handed phone to
arresting ofhcer); United States v. Santillan, 571 F.Supp.Zd 1093, 1102 (D. Ariz. 2008).(search of
cell phone occurred “mere minutes after the arrest and seizure”); United States v. Currjy, No. 07-100,
.2008 WL 219966, *10 (D. Me._ Jan.23, 2008) (not designated for publication) (search of cell phone
was “substant:ially contemporaneous” with arrest). Some courts have held that cell-phone searches
that were not closely contemporaneous were not made incident to arrest. See, e.g., Unitea' States v.
~ Gz`bson, 2012 WL 1 123146, *10 (N.D. Cal. April 3, 2012) (not designated for publication) (search
of cell phone was not'incident to arrest When search took place approximately one to-two hours alter
arrest); _United States v. Lasalle, 2007 WL 1390820, *7 (D. Hawaii May 9, 2007) (not designated
for publication) (search of cell phone was not incident to arrest where search was conducted
“somewhere between two hours and fifteen minutes to three hours and forty-five minutes” after
arrest); United States v. Park, 2007 WL 1521573, *7 (N.D. Cal. May 23, 2007) (not designated for
publication) (search of cell phone was not incident to arrest when search took place ninety minutes
after arrest); see also Uni'ted States v. Chadwick, 433 U.S. 1, 15 (1977) (concluding that search of `
locked trunk ninety minutes after an arrest was too remote in time and place to be incident to the
arrest); see generally, Jana L. Knott, ls There an App‘For That? Reexamining the Doctrine of
Search Incident to Lawful Arrest in the Context of Cell Phones, 35 OKLA. CITY L. REV. 445, 445-47
(2010). ' - '
31 United States v. Robinson, 414 U.S. 218, 224-26 (1973) (citing Chimel v. California, 395
U.S. 752, 762-63 (1969) (of`hcer Who had made full-custody arrest for driving a car without a permit
could conduct warrantless search of person as part of that arrest; when officer found crumpled
cigarette pack in arrestee’s pocket, he could seize the heroin capsules_that he found Within that pack).
Granville Page 15
. v officers to seize weapons or other things which might be used to assault on officer or effect
an escape, and (2) the need to prevent the loss or destruction of evidence.32 A search is
incident to arrest only if it isv “substantially contemporaneous” with the arrest and is confined
to the area within the immediate control of the arrestee.33 T.hus, a search incident to arrest
cannot normally be justified if the “‘search is remote in time-or place from the arrest’ . . . or
no exigency exists.”34
In United States v. Edwards,35 the Supreme Court recognized an exception .to the
“substantially contemporaneous” search-incident-to-arrest doctrine and upheld a warrantless
search of an arrestee’s clothes at the police station ten hours after the arrest.36 In Edwards,
the police took the arrestee’s clothes to look for evidence of paint chips that would match
samples that had been taken from the window of the post office during the attempted
burglary.37 The police waited these ten hours because “it was late at night” and they had no
32 Id.
33 Vale v. Louisiana, 399 U.S. 30, 33 (1970).
34 United States v. Chadwick, 433 U.S. 1, 15 (1977); see also Schlossberg v. Solesbee, 844
vF. Supp.2d 1163, 1167-71 (D. Or. 2012) (declining to distinguish between electronic devices such
as cell phones, digital cameras, and laptops, and holding that 'a warrantless search of the contents of
a digital camera as a search incident to arrest violated the Fourth Amendment); United States v.
LaSalle, No. 07-00032 SOM, 2007 WL 1390820, *7 (D. Hawaii May 9, 2007) (not designated for
publication) (because police officer did not search cell phone contemporaneously with defendant’s
arrest, the “search incident to arrest” doctrine did not apply; motion to suppress granted).
35 415 U.s. 800 (1974)._
36 Id. at 805.
37 Id. at 801-02.
Granville Page 16
other clothes forEdwards to wear; “it would certainly have been unreasonable for the police
to have stripped [Edwards] of his clothing and left him exposed in his cell throughout the
night.”38 The Court cautioned, however, that in upholding this particular search and seizure
of an arrestee’s clothing, it had “not conclud[ed] that the Warrant Clause of the Fourth
Amendment is never applicable to postarrest seizures of the effects of an arrestee.”39
We relied upon the Edwards ruling and rationale in Oles v. State,40 in holding that the
warrantless search of an arrestee’s clothing was not unlawful because the defendant failed
to establish a subjective and reasonable expectation of privacy in the clothing he wore when
arrested and that had been placed in the jail property room.41 We explained that “arrestees
_ do retain some level of privacy interest in the personal effects or belongings taken from them
incident to their arrest,”42 but that there is a lesser subjective expectation of privacy and a
38 Id. at 805 .
39 Id. at 808; see id. at n.9 (“Holding the Warrant Clause inapplicable in the circumstances
present here does not leave law enforcement officials subject to no restraints.”) (emphasis added).
4° 993 S.W.2d 103 (Tex. Crim. App. 1999). We noted the distinctions between the situation
1in»Oles and that in Edwards, including the facts that (l) Oles’s clothes didn’t show any obvious signs
of blood, whereas the clothes in Edwards were “blood-s`pattered”; '(2) Oles ’s clothes were taken eight
days after his arrest, whereas the police took Edwards’s clothes just ten hours alter his arrest; (3)
there was clear probable cause to. search Edwards’s clothing, Whereas there was not probable cause
to believe that Oles’s clothes contained bloodstain evidence relevant to the murder until the clothes
had actually been tested. Based upon those distinction, we concluded that “although Edwards and
Marquez [v. State, 725 S.W.2d 217 -(Tex. Crim. App. 1987)] provide the foundation for today’s
' ruling, clearly they are not dispositive of the issues presented in the instant case.” Id. at 107-08_.
“14.:31 103-11. _
41 Id. sat 103.
Granville Page 17
lesser societal expectation of privacy ~in inventoried propei‘ty.43 Of course, there is a vast
difference between the privacy interests'and expectations in clothing that one is wearing
when arrested and certain other possessions that one might have with them.
Indeed, just a few years after deciding Edwards, the Supreme Court addressed the
scenario of a 200-pound footlocker that had been seized when the defendant was arrested
leaving a train station, but that was not searched until 90 minutes later and was no longer in
the arrestee’s possession.44 The Court held that the evidence obtained from that search must
be suppressed because the footlocker “was property not immediately associated with the
arrestee” at the time of the search.
[O]nce law enforcement officers have reduced luggage or other personal
property not immediately associated with the person of the arrestee to their
exclusive control, and there is no longer any danger that the arrestee might
gain access to the property to seize a weapon or destroy evidence, a search of
that property is no longer incident to the arrest.45
In such circumstances, the police may legitimately “seize” the property and hold it while they
t 46
seek a search warran But they may'not embark upon a general, evidence-gathering search,
43 Id. at 109-10.
44 United States .v. 'Chadwick, 433'U.S. l, 4 (1977), overruled on other grounds by Cali omia
v. Acevedo, 500 U.S. 565 (1991); see United States v. Jhan, 74 F.3d 537, 542 n.2 (4th Cir. 1996)
(Chadwick has been overruled only as to closed containers seized horn inside an automobile).
45 Chadwick, 433\U.S. at 15. See also Iliornton v. United States, 541 U.S. 615, 632 (2004)
(Scalia, J., concurring) (“When officer safety or imminent evidence concealment or destruction is
at issue, officers should not have to make fine judgments in the heat of the moment. But in the
context of a general evidence-gathering search, the state interests that might justify any overbreadth
are far less compelling.”). `
s 46 Chadwick,-433 U.S. at 13.
Granville Page 18
especially of a cell phone which contains “much more personal information . than could
ever fit in a wallet, address book, briefcase, or any of the other traditional containers that the
government has invoked.”47
With that general background, we turn to the present case.
III.
In this case, the court of appeals summarized its holding and reasoning as follows:
Due-to the potential invasiveness of the search, Granville’s status as a pretrial
detainee, the fact that his stay in jail for a class C misdemeanor would be of
short duration, the utter lack of any nexus between the cell phone and the
crime for which appellant was jailed, and the lack of evidence suggesting that
the phone and its contents posed any risk to the jail’s penalogical interest, we
conclude that society Would recognize his continued, and reasonable, privacy
interest in the instrument despite his temporary detention.48
The SPA argues that the court of appeals erred because an arrestee “has no legitimate
expectation of privacy in the personal effects immediately associated with his person at the
' time of lawful arrest.”49 In the SPA’s view, Oles was “incorrect to hold that expectations of
privacy in jail are only diminished-rather than nonexistent-and the court of appeals’[s]
decision results directly from that holding and the unnecessary analysis performed to decide
47 United States v. Wurie, 728 F.3d l, 9 (lst Cir. 2013) (“Just as customs officers in the early
colonies could use writs of assistance to rummage through homes and warehouses, without any
showing of probable cause'linked to a- particular place or item sought, the government’s proposed
rule would give law enforcement automatic access to ‘a virtual warehouse’ of an individual’s ‘most
intimate communications and photographs without probable cause’ if .theindividual is subject to a
custodial arrest, even for something as minor as a traffic violation.’_’). 2
48 Granville, 373 S.W.3d at 225.
49 sPA’s Briefat 3..
\;~‘§%;3\§ ~§`q‘~§ &§gi//
" s“x\v
er %/
§§' §/ /@{/»//"'!»’/lm J/%(j£l%/Vn§_/ 21st
u;`;.:§i`r /7~/£/»/ "c¢',,,,’) ,JGwlle Page 19
W"/‘ 2 Mi';? \ -§
. ~ 4 <" raw 4 how 94¢:¢;0 112/w /'2. »
y § f that case. ”3° According to the SPA, when §cifizen is arrested for any offense, c§1'1%22;$ falllli 45»_@#"'§ _/ 92“3£~‘§§§¢§
t y ‘. f " r
§ 322 § /1‘!.4 `!F\<`f:;’
"\¢ § l§?`B%ito wear a seat belt,5l verything that the person possessed at the time of that arrest-purse, fail
v /'~` \-
i s `t\ ` 22
Y."x \. "\ 233 222
§§ il §§ briefcase» laPtOP ¢Omputer, cell phone, medical records, IRS returns, trade secret 33§/
`a" `*~l. 2 2 2
;§:` §§ §gx§-Y ‘2;;*,')~`<;¢
\§1 ;_;~"\n <, information-is subject to a warrantless search because all of that citizen’ s privacy interests 2
§ iii
\\ have completely disappeared We cannot agree with this reasoning
\ First, the SPA fails to distinguish between a search incident to arrest and a search of
§ faa
1 § §
an arrestee’ s personal property that has already been inventoried and placed in storage/As F‘»‘L 421 _
nn w__ »\W' » ' ' -~==; &1.11 l _
rt
the Supreme Court recently explained in Arizona v. Gant,32 the search incident to an arrest § With *
W) §§ §¥l
exception to the warrant requirement is premised upon promoting officer safety and ii 2929
il rt
preventing the destruction of evidence relating to the crime for-_which the person was
arrested.33 Although Gant involved the search of a car, courts have‘discussed its application
to other situations in which “the item searched is removed from the suspect’s control between 3
3° Id. at 3-4.
31 See,. e.g., Atwater v. Lago Vista, 532 U.S. 318, 354-55 (2001) (ofhcers could arrest and j ail
mother who, along with her children, was not wearing a seat belt in her.truck; officers at jail made
her remove her shoes, jewelry, and eyeglasses, and detained her in a jail cell).
32 556 U.S. 332 (2009).
~ 33 Id. at 351. ln Gant, police officers arrested the defendant for driving with a suspended
license, handcuffed him, and locked him in the back of a patrol car. Id. at 335. Then the police
searched his car and found cocaine in the pocket of a jacket that had been lying in the back seat. The
Supreme Court held that this search was unlawful under the “search incident to arrest” exception
becausc,'under that exception, officers may search the passenger compartment of a car “only if the
arrestee is within reaching distance of the passenger compartment at the time of the search or if it
is reasonable to believe that the vehicle contains evidence of the offense of arrest.” Id. at 351.
Granville Page 20
the time of his arrest and the time of the search.”54 Some courts have applied Gant in
rejecting'the lawfulness of a search of the contents of an arrestee’s cell phone.55
' 54 United States -v. Shakir, 616 F.3d 315, 318 (3d Cir. 2010) (applying Gant to search of a
gym bag that was lying at arrestee’s feet when he was arrested and handcuff`ed; upholding search
because defendant Was still close to gym bag, was not fully secure, and handcuffs are not fail-safe
in preventing dangerous acts by an arrestee); see also United States v. Perdoma, 621 F.3d 745 , 75 0-
52 (8th Cir. 2010) (applying Gant principles to search incident to arrest in bus terminal).
55 See United States v. Wurie, 728 F.3d 1, 3 (lst Cir. 2013), cert. granted, 82 U.S.L.W. 3104
(U.S. Jan. l_7, 2014) (No. 13-212) (citing Gant .and holding_thatlthe_search:incident:to:anest
exception does not authorize the warrantless search of data on a cell phone seized from an arrestee’s _
person, bem-gb-\'/-€r'~’nment has not convinced us that such a search is ever necessary to protect
arresting officers or preserve destructible evidence.”); United States v. DiMarco, No. 12 CR 205
(RPP), 2013 WL 444764,*8 & l 1-12 (S.D.N.Y. Feb. 5, 2013) (not designated for publication) (citing _
Gant and concluding that warrantless search of arrestee’s cell phone more than six hours after
defendant’s arrest was unlawful; “delayed search” was not incident to arrest nor supported by the
ofiicer-saf`ety and evidence-protection justifications of that exception); Unz'tea' States v. Dixon, __
F. Supp.2d __, 2013 WL 6055396, *3 (N.D. Ga. 2013) (citing Gant and concluding that agent’s
action of taking arrestee’s cell phone back to his office and searching it was not a search incident to`
arrest and was unlawful; motion to suppress granted); Um'ted States v. Brown, No. 12-79-KKC,
2013 WL l 185223, *3 (E.D. Ky. March 20, 2013) (not designated for publication) (citing Gant and
upholding initial, brief search of cell phone that was immediately incident to arrest because
defendant was “manipulating” cell phone at time ofiicers ordered him outoftruck; defendant could
have been warning confederate to escape or requesting assistance from him, or he could have been
destroying evidence on cell phone; but once officers determined that “no helpful information was
readily available” on arrestee’s phone, officers should have ceased search of phone’s “contact list”
and sought a warrant); Anthony v. Oliva, No. ED CV 12-1369-FMO, 2013 WL 1127104, *6-7 (C.D.
Cal. Jan. 29, 2013) (not designated for publication) (citing Gant and holding that civil-rights plaintiff
had pled a cause of action against police department when officers allegedly wentbeyond legitimate
purpose of search incident to arrest and began to ‘Flook” and “navigate” through cell phone); State
v. Cooper, No. 66-CR-1 1-2228, 2013 WL 264430, *5 (Minn. Ct. App. Jan. 14, 2013) (not designated
' for publication) (citing Gant and upholding trial court’s suppression of search of cell phone made
long after officer had seized it from arrestee, who could not have retrieved it); see also State v. Smith,
920 N.E.2d 949, 955 (Ohio 2009) _(noting, in a case involving the warrantless search of an»arrestee’s
cell phone incident to arrest, that: “Once the cell phone -is in police custody, the state has satisfied
its immediate interest in collecting and preserving evidence and can take preventive steps to ensure
that the data found on the phone are neither lost nor erased. But_v because a person has a high
expectation of privacy in a cell phone’s contents, police must then obtain a warrant before intruding
into the phone’s contents.”). ‘ v ` ‘
_ Granville Page 21
Second, the SPA makes the false analogy that, if a jail detainee does not have any
privacy rights in his jail cell,56 he therefore does not have any privacy rights in his personal
property that is being safeguarded in the jail property room. The assumption that prisoners
or pretrial detainees are without any Fourth Amendment rights is not supported by the
~w~~,_pw______~_»"___`"__
/___‘4_ -._-.4..-.»....».,. , , _..-. 4 ...~_-»~~`_._.-`,., ""°""
§upreme Court. §§ a unanimous Court noted in 1974:
.._.~`.,~_W ___! d_M_,...,.-_»--- m..~_~_`__` `__`___
_Lawful imprisonment necessarily makes unavailable many rights and \
privileges of the ordinary citizen, a “retraction justified by the considerations \§@
underlying our penal system.”. . . But though his rights may be diminished by ’5
the needs and exigencies of the institutional environment, _a prisoner is not n
wholly stripped of constitutional protections when he is imprisoned for crime. §
There is § iron curtain drawn between the Constitution and the prisons of this ’
country./ - j
Oles correctly held that jail detainees enjoy 5a diminished expectation of privacy, not that a
detainee has absolutely no reasonable expectation of privacy.58 Furthermore, the security
55 See Hu¢ls'on v. Palmer, 468 U.S. 5 17, 527-36 (1973) (holding “that the Fourth Amendment '
has no applicability to a prison cell” because of the needs of institutional security; “A right of privacy '
in traditional Fourth Amendment terms is fundamentally incompatible with the close and continued
surveillance of` inmates and their cells required to ensure institutional security and internal order.”).'
§§ .
§ 57 '} ol]j"v. 'McDonnell, 418 U.S. 539, 555-56 (1974) (citation omitted).
158 Oles, 993 S.W.2d at 108§ see Bell v. Wolfish, 441 U.S. 520, 556-57 (1979) (“It may well
be argued that a person confined in a detention facility has no reasonable expectation of privacy with
respect to his room or cell and that therefore the Fourth Amendment provides no protection for such
a person. . . . ln any case, given the realities of institutional confinement, any reasonable expectation
of privacy that a detainee retained necessarilywould be of a diminished scope. Assuming, arguendo,
that a pretrial detainee retains such a diminished expectation of privacy after commitment to a
custodial facility, we nonetheless find that the room-search rule does not violate the Fourth
Amendment.”); see also UnitedStates v. Cohen, 796 F.2d 20, 23~24 (2d.Cir. 1986) (detainee “retains
an expectation of privacy within his cell sufficient to challenge the investigatory search ordered by
the prosecutor” to get evidence to aid them “in laying additional indictments against a detainee”;
search was unrelated to jail-security concerns); Lowe v. State, 416 S.,E.Zd 750, 752 (Ga. Ct. App.
1999) (pretrial detainee had reasonable expectation of privacy in papers in his cell containing his
Granville Page 22
rationale and “needs of the institution” that underpin the diminished expectation of privacy
in a jail cell is not equally applicable to property that jailers have already inventoried and are
safeguarding in the property room.59
Third, the SPA contends that, under Oles, any search of any property in the custody
of jail officials is permissible. We disagree with that absolutist position and agree with the
court of appeals that the object of the search makes all the difference between this situation
and that in Oles.60 There, the police seized and tested a pair of pants and shoes for blood.
We noted that the first question was “whether an arrestee retains any expectation of privacy
in clothing lawfully taken and inventoried by police incident to an arrest.”61 After analyzing
various precedent, we concluded that “arrestees do retain some level of privacy interest in
the personal effects or belongings taken from them incident to their arrest,” but that
handwriting because search was unrelated to needs of jail and was an attempt to find evidence to
bolster State’s case); State v. Neely, 462 N.W.Zd 105, 112 (Neb. 1990) (pretrial detainee retained
reasonable expectation of privacy in her luggage while it remained in the jail’s locked inventory).
59 S'ee_, e.g., Illinois v. Lafayette, 462 U.S. 640, 648 (1983) (as part of routine procedure
incident to jailing an arrested person, officers may “search any container or article in.[police]'
possession, in accordance with established inventory procedures.”; emphasizing that inventory
search must be conducted pursuant to established procedures); Florida v. Wells-, 495 U.S. l, 4 (1990)
(inventory searches must be conducted pursuant to established inventory procedures, so that they do
not become “a' ruse for a general rummaging in order to discover incriminating evidence.”).
6° ln OIe"s, the defendant was'initially` detained at the police station as a witness to a murder.
When oliicers discovered that he had an outstanding felony warrant, they arrested him, then
inventoried and stored his ":cl'othing.`.. ./Eiglit_"'daysu_!l_a_ter, while the defendant Was still in jail, an
investigator took his clothing t_o the medical`»`examiner-"if"see if he. could find any blood. A serologist"
discovered blood on the ;defend°a'n't?s’shoes'tl‘rat"iriatched the victim’_s blood. 993 S.W.2d at 105`.
61 Id. at-lOG§""
Granville Page 23
[r]eviewing this search under a totality of the circumstances, there is virtually
no evidence that [defendant] harbored a subjective expectation of privacy in
his clothing that was in the custody of the police, nor is there evidence that
society would deem such a belief reasonable under these circumstances
[Defendant] has failed to meet his burden of proof in establishing a legitimate
expectation of privacy in his clothing,62
'l`hat is the general doctrine concerning privacy interests in clothing, but clothing does not
contain private banking or medical information and records; it does not contain highly
personal emails, texts, photographs, videos, or access to a wide variety of other data about
the individual citizen, his friends and family. Searching a person’s cell phone is like
searching his home desk, computer, bank vault, and medicine cabinet all at once. There is
no doubt that the Fourth Amendment protects the subjective and reasonable privacy interest
of citizens in their homes and in their personal “papers and effects.” Conversely, clothing,
- like the shoes seized and tested in 01es, is displayed every time a citizen walks~out into the
world. As_ now-Presiding Judge Keller noted in her concurrence in Oles,
The outside of a person’s shoes while being worn are constantly exposed to the
public. When [_the defendant] Was arrested and incarcerated, the police
obtained lawful possession of his shoes. Given that the outside of the shoes
_62 Id. at 1 lO-l 1. In` Oles, we did not state, or even suggest, that a defendant would never have
, a reasonable expectation of privacy in any item that was in the custody of the police. Suppose, for
example, that the officer in Oles had taken a sealed personal letter out of the defendant’s clothes,
opened it, and read it. At least one court has said that the Fourth Amendment would not permit that
officer to open and read someone’s else’s mail without a warrant. See United States v. Wall, No. 08-
60016-CR, 2008 WL 5381412, *3 (S.D. Fla. 2008) (not designated for publication) (warrantless
search of cell phone made during jail booking was improper; stating that “searching through
information stored on a cell phone is analogous to a search of a sealed letter, which requires a
warrant.”) (citing United States v. Jacobson, 466 U.S_. 109, 114 (1984) (“Letters and other sealed
packages/are in the general class of effects in which the public at large has a legitimate expectation
of privacy; warrantless search of such effects are presumptively unreasonable.”).
Granville Page 24
are constantly exposed to the public, appellant could not have a reasonable
expectation of privacy against a visual inspection of the shoes, on the outsid'e,
with the naked eye.63 '
` Similarly, here, the ofticerscould have reasonably inspected the outside of appellant’s cell
phone; they could have tested it for fingerprints or DNA material because portions of the cell
phone are routinely exposed to the public. But we do not think that _a citizen, including
appellant, has lost his'expectation of privacy in the contents of his cell phone merely because l
he has been arrested and his cell phone is in the custody of police for safekeeping.
Although some courts have held that a person does not have a reasonable expectation
of privacy in the contents of his cell phone when he is subjected to a search incident to
arrest,64 citizens themselves have become increasingly concerned about privacy expectations
63 Oles, 993 S.W.2d at 111 (Keller, J., concurring). Judge Keller went on to note that,
because the police could also legitimately handle and store the shoes, “even the inside of the shoes
would be exposed to the ofticers,” so that the defendant did not have a reasonable expectation of
privacy in either the inside or outside of the shoes. Id. ‘
64 See, e.g.,United States v. Flores-Lopez, 670 F.3d 803, 810 (7th Cir. 2012) (upholding
search incident to arrest of cell phone to obtain its phone number but questioning whether a more
invasive search would be permissible); United States v. Finley, 477 F.3d250, 259-60 (5th Cir. ~2007;)
(stating that a cell phone is just another “container” and upholding its search as incident to arrest);
People v. Diaz, 244 P.3d 501, 506-08 (Cal. 201 1) (upholding search of ~cell phone 90 minutes aRer
the arrest of narcotics defendant; concluding that a search of an item “immediately associated with
the person” at the time of arrest is valid because of “reduced expectations of privacy caused by the
arrest,” not the nature of the item seized). ln Diaz, the court recognized that it was contributing to
a deepening split between state and federal courts on whether a person has a reasonable expectation
of privacy in\ the contents of his cell phone, but left it to the United States Supreme Court to decide
if modern technology makes a difference to the traditional ability to search the contents of containers
as part of an otherwise legitimate search incident to arrest, z
The citizens of Califor`nia disagreed with the California Supreme Court’s holding, and the
California Legislature promptly passed a bill requiring police to obtain a search warrant before
searching the contents of any ‘;‘fportable electronic devices,’ including cell phones.” Supplemental
Brief~in Opposition, Diaz v. California, 132 S;Ct. 94 v(201 1) (No. 10-1231), 2011 WL'4366007, at
Granville Page 25
and their cell phones,65 even before the current NSA phone controversy.66
*l(describing Senate Bill 914 (2011)). After the state’s attorneys brought that legislation to the f
attention of the United States Supreme Court and urged the Court to deny Diaz ’s writ of;certiorari,`
the Court did so, and, one week later, California’s governor vetoed the “cell phone privacy” bill,
stating that the “courts are better suited to resolve the complex and case-specific issues relating to
constitutional search-and-seizures protections.’~’ Letter from EdmundG. Brown Jr., Governor, to
Members of the California State Senate (Oct. 9, 2011), available at
http://www.leginfo.ca.gov/pub/l1-lZ/bill/sen/sb_0901-0950/sb_914__vt_2011 1009.html. See also
Petition for Certiorari at 6, Riley v. California, No. 13-132,~_ available at
http://Www.volokh.com/wp-content/uploads/ 20 1 3/08/Riley-cert-petition-final-1 .pdf.
165 See, e.g., United r` 8 St Cir. 2013), cert. granted 82 U.S.L.W.
3104 (U.S. Jan. 17, 2014) (No. 13-212) (quoting Maeve Duggan & Lee Rainie, Pew Intemet and _
American Life Project, Privacy and Data Marragement on Mobile Devices (Sre_ptnjwz£_l£))
(publishing.poll survey results that “[m] ore than-half of mobile app users have uninstalled or avoided
cell phone apps because of privacy concerns,” and “[n]early one third of cell owners have
experienced a lost or stolen phone, and 12% have had another person access the contents of their
phone in a way that made them feel their privacy was invaded”; “[t]he rise of the smartphone has
dramatically altered the relationship between cell owners and their phones when it comes to
monitoring and safeguarding their personal information,” said Aaron Smith, a Research Associate
with the Project and report co-author. “The wealth of intimate details stored on smartphones makes
them akin to, the personal diaries of the past_-the information they contain is hard to replace if lost,
and potentially embarrassing in the wrong hands.”), available at
http://www.pewinternet. org/Press-Releases/20 l 2/Mobile-Privacy. aspx.
66 Compare Klayman`v. Obama, ___ F.Supp.2d _, 2013 WL 6571596, * 20 (D.D.C. Dec.
16, 2013) (citing numerous`internet data compilations concerning the ubiquity of cell phones and
other technological devices and noting, “P»ut simply, people in-2013 have an entirely different
relationship with phones than they did thirty-four years ago. As a result, people make calls and send _ 5
text messages now that they would not (really, could not ) have made or sent back when” earlier
search and seizure cases were decided). Judge Leon explained, “Records that once would have
revealed a few scattered tiles.of information about a person now reveal an entire mosaic_a vibrant
and constantly updating picture of the person’s life. Whereas some may assume that these cultural
changes will force people to reconcile themselves to an inevitable diminution of privacy that new
technology entails, I think it is more likely that these trends have resulted in a greater expectation
of privacy and a recognition that society views that expectation as reasonable.” Id. at 21 & n. 59
(noting, “Public opinion polls bear this out. See, e.g., Associated Press, 9/]1 Anm`versary: PollFinds
Public Doubts Growing on Federal Surveillance, Privacy, Hous. :Chron., Sept. 11, 2013, at A6
(“Some 56 percent oppose the.NSA’s collection of telephone records for future investigations even
though they do not include actual conversations.”)), with ACL Uv. Clapper, _ F. Supp.2d _, 2013
WL 6819708 *20-22 (S.D.N.Y. Dec. 27, 2013) (NSA’s collection of _“bulk telephony metadata” did
not violate Fourth Amendment principles; “Some ponder the ubiquity of cellular telephones and how
Granville Page 26
In sum, we conclude, as did the court of appeals, that a cell phone is not like a pair of
pants or a shoe. Given modern technology and the incredible amount of personal information
stored and accessible on a cell phone, we hold that a citizen does not lose his reasonable
expectation of privacy in the contents of his cell phone merely because that cell phone is '
being stored in a jail property room. Officer Harrellw§p_u_l`d have seized appellant’s phone and
-..___,_._.__..__.... \._
”.._.._
.» --'--~~“-"~~~- __..~.»-¢\.r............ ._..._..,.._~..,..r ......... ._.
held it whdemhne\_$o”uvg"l}t__§*§§§§_§lvl__M“;§I'M£§:Df,.lg;!j.l:;f.;,..§m;.;gwith,.,probable caus<; he could not
w
“agtiyate.and`s*e,arch¢thecontents¢of.an.in!entorie_c@ellular phone” without one. We answer
1 “No” the SPA ’s so_l_e question for review, and we affirm the judgment of the court of appeals.
¢,=--.=»-..~'»~.-~»-..-.~r
Delivered: February 26, 2014
Publish» . -
subscribers’ relationships with their telephones have evolved since Smith, While people may ‘have
an entirely different relationship with telephones than they did thirty-four years ago,’ this Court
observes that their relationship with their telecommunications providers has not changed and is just
as frustrating Telephones have far more versatility now than when Smith was decided, but this case
only concerns their use as telephones. The fact that there are more calls placed does not undermine
the Supreme Court’s finding that a person has no subjective expectation of privacy _in telephony
' metadata.”) (citation to Klay_man omitted).
§
s ;;
xr"¢
¢»."
E‘Zit
al
v:
..'<
-r;\\.,~_i,~
1»'.,
` '¢1"»“~ “\~' ;x"`_>
’.~`\x"'
… t '.
5,@':-§ §'~‘»'=`" '\ '
n'_. that '
'\X`M'/`\ a
a;':.. l
:=l"’~.a a
.,~»
;~~ .\,- 1<, »r.~,,vr?»i'.
run
srif_=s -
:Ԥ
,..`_ `_ L. rn. `
:`¢:¢n».,s -,i§v>~.¢».,.
,» f »':
'. \\\ »' \'.a~,
. t ~ ,
,Y‘ .» ,\~»..` `-.‘ .~,\ ~ " > ` ( ` ` ‘ »» ~ »
.. , . "- "' ' '! v ' - z . " ~ ‘ ` ' ~'»'
' 5 _ y ~ , ft , , ._r ' 4 - , .-,_».W...u»`»~
,,:_. ~ 4 ' . ~ ' ~. . ' , l l_,.l.;h.v.r
-_<" v‘.-_ ',e¢¢ ‘ . ` ' . v 1 ` ' ’ 5
§/év/ b 5 §§ //*" /')77
, ,_M_,_a~_._a…. __ __-__-._a_____, _ __~a 1/’_,4____ /5_ 777
%/Q/ZZ%/»/ §§ /}?”’-5 4-/.;44.47“ //~7; //»1;711.»-4/\' __._,
`\
\~>"" b
j W/Y/’%f/ f""`w 425 //'55/*/¢£4’._ /"°*W /I/W /?/°%t/"? ,4//£;54,`>- 4/;""7' 447 -~,;4/;,{,41,‘1}? 453
355
f/%/§ /7/144/////\/4 //1/ /'7764: 647-411 444 1444/777 ./B/¢/ 444 44774/ 47 /M/@z//‘
7977 141/477 447 4244/447 47447 4719/ 411/444 477 544/441 775/1444 §§
:§:;-»* ay;¢¢p {/)75,,,! .4,1-,'_1,-1~![1<;.:,&§;,£ v \.y
fe .
//71744¢" @L/) ///’5’)/*/£/?¢ 547'5/`/152 pba!7; ¢3//// 1147 a
l
5/“//,,17. 74)717;;4 /~55459/4'1< /Z’P 1///71<§ 4274»5474>7’ ?£47.' 7?{%'/44~ 1444 474 4744/11
W 14ij4 %A/J/ 144 744/44 § 72/4 445 774/444 793 §17;:./'144: 1‘7~.7;'. 447/742
1~,/1_/11:4///14/1,/ §;5§/ 7:}/4§?4/1/ 7747%777 417 4@4174"" 442 7221:4'1§1 /34:7/" /)é’ 7%7!a
///
,// i/ 1114£1/41_ /%21' O,L(a /4//'/‘?<` Q,;,<:~»/ /,1 abt/54 LQPQgA/C',¢P .,.;/ / "J’”"¢ 7 17// '“ 674 'Z>" 723/7a // ,;)/~
".
/5515/ < 7.~;- _,~,-;4 1""4?;:1~1~ 7.’.~1:".§`". /-5/£4‘ /<1€,47’17""/57/ 7444»71/1. /,1 75 »1‘>»’ //f~/<’“’ r, 441/741~' 4:;7*7:,:--
fl
/` , , ,.. ' ,.'_,4~ 1
/ éz'_‘,/_'_l`.'.:;/ 55 4‘.;,1~', ;~: 5'”5'/;5 //x/ /1")"{5 .'3' / \.J ¢7~'/ .:1. /7§;// 441/772 771 ~7 1457 47 ”’ /<’L" i/*'“ /~/' /'/1,11;,7./1"2¢47;€1§ i.“~"'~',f41§%1‘""1444.244177*;€7:'5“ 7 ,.1@;§‘3,7?4:.“14&1?:? T-'?‘.'r';€¢¢;."'?’ ,,7,.~441/455 /’}¢,47_4“4» 77 :__
. , \l
»' 5:/§' ¢7¢--/ 41¢»»'177,47:7' f‘<»fw" c. ‘744.114 1575 fri)§a€~i" "’“7 '*' -z" .;:»717- 7 c
5 555 65“7"5'*"7-5'1»;' r;' 44 4:‘~3;~: 1 . 1
f _` 11
` " 1 11 »a-»""' 4 . , ,_,1 _,, 1 ‘ ,,»~ _r _, *'5 , ~ . 1 '»» 55"“`
741/15411’4£¢1>.'1&1€?§ ¢'-1'5"€_»7? :;114’~;/!47 /55}¢@ 1144 .//>Y-/»~"~»~'¢»»‘”\f’“ 4 ~- - .» Z5:5 543 149/17 1177 /15515/55 ` ` 551.j
£555;_'-,). ,`5";€54' _______ m
/1'7.7.‘55><:1.1'»75 475 ’7“ 1"7”7<77 L¢///""/"/*/-/' 45`5;§ »~7*515451‘7'1:17" 415 / 1.441/!'147'» Z. /1;37: `/ //~'//
_____/ 414/;: 4411/77 647/1542 - 45',45,4,777 21 414/71a /'/'/,744 444 744-113 ram/7
7 ’ ‘5 §£7'/1'/'*'.:/5 1?55;'5'55'/[5
\m£_id 15 ‘5:$‘5,§'/§&1¢`[:5’/0{,),0/\//¥{ xi 443 ‘P~_. _'___ `-5 zwf \ _\-...
F__:/,/-
‘)
’\/. 1 - ........
/ 555 §"'\_?'»’4/5¢5":¢4~"( //l;'ig;
, '-J_r’ 5 f 4 ' :
air bill 751/414 !M~' / 05 f;/ 214 /,5/`\,/ /75.€/}5’5!£/.45$,.7&{:4_{::55
3{:1:¥‘ V T / ,_
/
134/‘/ "
4
5 5 5744€9155.555:“5’ \5 1' 55 4§/ ' 1547 ~
751 t;d’ /?55'5'{‘5"' p/}P.’z "`7 } "‘71/4‘5` §1_ 5555)5`;<7{5)\"1”\5'5555 7 &(,LZU./ (51555:’5!5" ,s;,,g_/ ";“`5`5,35;? f’,"£_ @}'s'!{ 5555!§ 535
‘\V./a `~"' k_'}\x\’/'J " "‘55
f _. . 1 `
'5 5'/l F/i//ll.~¢rrl,/DYl
nr.~.
-1 \,
\\/
Xanax Addiction Side Effe_cts, Withdrawals, Symptoms & Signs - Park Ro...
E)(H”HZVI/ D ZBELOUJ >'E- l\)E$<#/p,@rmm§
0
http://Www.parkroyalhospital.com/addiction/prescription-drugs/xanaX/signs...
l\/lounting financial problems
|nability to focus upon tasks at hand
Slurred speech 5
l_o\'/vered libido
' Physica| symptoms:
Requiring more and greater amounts ot
Xanax to achieve the same pleasurable
1feeHngs
- Physica| dependence upon the drug
Withdrawal symptoms if Xanax is
decreased or discontinued 5
E) _"_;,j€*&i- ""~"*“*i ':
~ Prescription Drugs-
~ Effects, Signs &
Synnptoms
~ Xanax l
' Ef.fects, Signs & _
Symptorns»
- \/icodin `_
- Effects, Signs &
Syrnptoms` .
'- Oxycoclone
- Effects, Signs &
~ Symptoms
Afiiliations &
Recognition
Joint`
Co_rnmission
Gold Seal_'of
Approvai
The Jas_on
§' Foundation
http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/sigris'.'.".
Acldiction 4
Symptoms,_ Causes,
' Si?g{ns & Si`de Effects
coNTENTs `
Statistics
Co»Occurr.ina, Disorders
Causes `
§\/I'i’ip:i`.(>i"t'i$iv
Effe:ts of Xanax ./~`>.b;zse
Effects of \/'\/'iti'idravi/ai
Xanax, the trade name of a drug called
”aiprazolam," is a benzodiazepine
medication that is prescribed by doctors
for short-term management of anxiety or
sleep disorders. Xanax produces its
calming effects by suppressing the
inhibitory"receptors in the brain and
f central nervous system to decrease the
_, abnormal excitement in the brain that
leads to anxiety symptoms. Whiie most '
individuals Who take Xanax follow the
doctor's instructions, taking the drug at the
proper time at the proper dose and
discontinuing usage as indicated.
Unfortunately for some, Xanax can
become addicting if taken in large
quantities over a long period of time.
ll ll
Known on the street as "bars, planl B'ipolar disorder
° 'Schizophrenia
° Stimulant abuse
Causes
Addiction is thought to be a disease
caused by multiple factors working
together. Causes for Xanax addiction may
include:v .
Genetic:_lndividuals who have a relative
who struggles with addiction to Xanax or
other substances are more likely to n
develop an addiction to Xanax themselves
While nota definitive indicator, there is
absolutely a greater risk among family
members
[BF , _\ =iiemisi:z’;: Xanax works by _
decreasing the excitement transmitted via
neurotransmitters in the brain. individuals
who have an inborn tendency toward
increased levels of these neurotransmitters
may seek ways to decrease this
excitement and may self-medicate with
Xanax.
Environmenta|: individuals who are born
into an unstable home environ'ment,
especially if substance abuse is modeled
by a parent or guardian, are a_t greater
risks for developing substance abuse later
in |ife.
al: As addiction rarely occurs
without the presence of another mental
http://Www.parkroyalhospital.ciom/addiction/prescription-drugS/Xanax/Signs. 1 1/1/2014
Xanax Addiction Side'Effeots, Withdrawals, Syrnptoms & Signs - Park Ro... Page 6 of 9
illness/many individuals who struggle with
undertreated or undiagnosed mental
illnesses may turn to drugs or alcohol in
order to manage the symptoms of their
disorder.
Symptoms
Symptoms of Xanax abuse and addiction
will vary among individuals depending
upon individual genetic makeup, level of
. dependence length of addiction, and
amount used. Common symptoms of
Xanax addiction include the following:
?;“'“'~:liw, :B"I,¢.~¢,-,.‘
,_mp_t@_,_i§s:
lncreased_anxiety
Depression
0
Mood swings
__ lrritability
Behavioral_ symptoms:
Doctor shopping
Appearing drowsy
Lying or stealing to further Xanax habit
Stealing or borrowing Xanax from friends
and loved ones ,\
Hiding stashes of Xanax in various places
around the home, office, and car
"Losing" multiple prescriptions for Xanax
Lying about amount used
Withdrawing from previously enjoyable
activities
Decline in academic or occupational
functioning
¢ Strained interpersonal relationships
i.egal~ problems
http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/signs. .. 1 1/1/2014