Gomez, Gilberto

_ __ CA¢/S'éj' /{/0’ DB'/ff2 C`/_€ 83 MMK 03 0”7§”. i//zz'//§ ' - 70 Fé§,¢/,,.¢ 5 /;105'057 ‘ - . . ' . '\ ./y/L»}”/'" é/.;/.j/ /J ;_/y,z»' dé"”~~,/,///»K//»¢,q,"“. ;>;¢»__/ 4 d t /70 301 /9/3?§,_ b v v ` \ /..)' 010 ,'¢'¢Y~'~W)v ‘/,:;/;r 12 _ ~ 1 ,-2:“/¢»__,§-,.;¢,/5€,.\.,>»¢ ,_'3;; l »-0'7@§@ 207 ,/!.'//”//?,# . /,¢.~?;// w;»;;;;“" '; //f/-.~_f -.» /) f ‘»` ,A jfny,/M /~'Av/ _»;;,"`//»¢L_»';'»»'/" ~/:" 1532er /‘B/./ /:’Ti`»"“ fFZM/Z°/;" 772 Mf@ § `. ` 55”{4"/1';/10;%" /.‘/d 7 §;,.~)V"'/"" cr ,>" vEMé'”?@ 'C"; 24 /.?“ 7 ` ,_//~M 7?1»¢ M/_Q/‘,,,,w/_,; .\é¢ ' ./,¢Q/MJM"- /,//`// ,.¢07/!/¢//, 55er /é"££~"/@//J¢f/“*}VM»M'»' ` f/"`”"'N"‘ `5"7:"\/ 7?_" n `:*'F;<~'/;>~" 070-1057 v '~ F~z»',,.»y/M¢~¢ /’02¢= § wa~je€/;/ ,' :-k /.~./ ,#%waz,}?~.?-z(; /y'c»w/ ./ \ M@M/vz,, . \ . -"UG'24‘\5 AbesAeosfa',Cie*r:< ' C/?U§€";é‘/p§§/ffz 63 32/4&7¢7;» 67 0 ' ` ' 7 z 44 ' l § .Z;‘/ 7% /g 4"4'°' j'<:)/d/c/,¢g_._, . . v /£/ ' __ § v \ /// 370/1507 507/02 ~ ' ."'J'.‘ -" { y F;__' ` l '»_:,. - 5477»7,,7 __/ 27'" _ § q q 615/7001 77 ..,/,~'/;0 5 /%)7/01/ 72 777277 777%27/707 0/:'~ 000 72 //.a 0 7~/~/7 254/504 §//7;_»”~"/`0/ 7“7?<~.»'\/ 005"' YMVMFN éé/f?r£i'>' 1225"75;; » 022/3 /`/‘4»3/70'€7“-’/2; Z¢:>/S: 77 ////JM~/c 7::~»»>.77 272='5: ;/:/ 3§’¢2/§?.0“"/¢3?’:~ //!¢53/2'/¢"`8 @’33~1:1> -`7'§.?` /?¢%7¢€>'//,6.=:;/¢/2 3~'* 70'{¢?"7¢'7’0,0/72~/?702@ 777 '~"-f'~‘?>~*=./ 729 M/// / '4»‘4/ //L//C. //'97 /;`//¢/‘./77?¢/-»' 4§/»`/¢?&“5’//`7-¢: 750 7/‘/ /c//o€e"" /Z é’¢:)/ I,_ \ / 77/0/0'/;‘,1/'“4 /m/{i:*‘/M;‘ 04//0,¢0;/'¥ /'/;"' _0.¢/.3//7¢0€_ 0 T:/y,¢;:“yéé;;\/Y /;¢/,¢/ »-- ;A¢ / 7;WJ ' /40'57’.3,,, /--/7 , 70777)0¢/7 16»~0/0rJ/?A/A 71 0;7?/ - /»"-`». M/¢_§ /7¢;;7¢;;,_/ ;/'0_ 277/0 ,. . »./ ”..f /,/;Y/:;gj;'/T y /.7»€¢,’*"27¢3-¢/ . - z _, l 071/7207 ,»1“2::‘§"“2'-“ 3'§';&‘3 1 1222/2 <‘ /2///0/@¢ f ' /4//;7/!/7?"4 ¢f¢»;/ 470///1,/:0' 1 0"00//¢2»“'” 72 EF*/j,§/ 031/207 077/057 `”* 707 ;';~7$/- f:) 740 2775 Q//zz// § 732 ‘7”~¢?`¢?* 777 " c 0,f¢.£_ -“' 5'~/»2,<_ /¢" 0=/7/'¢/ i‘//z'¢>.#/i/ /”7/2 7/3/72/¢:/ 00sz c_ 77/,/7’/7M z 7 0000"6““=» 007/77e . 741/777 5 727/7777771/ /77 770/70 720 //‘/.-m@~,~? v {M/fZY/M 705 é/f 77l/51 /f/?/,¢;z: 07 005/20 777 706 f€‘z»~»M- W-~.'?';;/ 07 faa/gc l L_ 914 0£ ""”?.'¢:f x ~’__ 4 2152/527 762/73 77:>~,7», 701/7 f%'¢///f 66”/,5777/225¢/3;2 523 767 _/777;27'4/ ~ 7 77 777 720 777 7<- 677 77 1127 M 54 ,\ 22 ../ __ . 1 _' ` \ _ _ /' _" ‘ ""/""'~ , " __ , 7 v ' ,\ (/¢5"'07r7 »:;F‘ 67’ 172 /j/;é’?. ~ 1 ` '~’1777,;{;31" l ;S/¢f'A/}¢¢¢’;;»;.¢.J"“ . / ' . . '." y . 1 »- . ; ‘ , , 1 . > \ )`.,1.": .//');,»1"'/"" `:';57 /2/‘“’12' 2-75~?`~` )3;.::§" 0"0’7>"" ` 1 ' ~. 1 d » , ~ .¢_W` ' 4 . x -w»..`_ \ g ` /§/-_ :3_,..~’;»1'.», /:»;:-,72.'1:~"/' /¢///,7`»¢’,/1" /l//' 15 '.': '~5= ..7?;1,0773,1/`-2»*-.::/. 7701/7%,”7; 777 \ M/%I°j/l;?é,i:=? ` .-"'//"~:" \K/g;,: 7 §//_') /;/» ~/'7 - '/?~'H'r/_Z/’ 7€35?7£`".¢¢‘( \ v /§'3»:7>»/_ 177/7051 /~~1~- ;,v’ng//$ 7 /;~’, 27/,7:>7" /;»-~» gm 714/470 ,/;@'/»072/7:77316773770 M /' //~Y?"/ '>»v/`¢’ `,;¢- /):?»- ,1?~4»;.»_/§');),;¢’/‘1'/ 72 /2”";`“""'/': /;?~7',"_,(7§5‘2; "/"?'»"/‘.¢w 75"$¢/'~1-`“ G'Jv)€'.}"" v'a~- C!'Z.»/,g_)'/,¢_,;dyz //;,F"/?YY"S,- l - _J y,r*“"'*'l»-n-» A/i/ 325 =*;1'/,1'/- 73'»_/ i:';;// /7“777='7'/,00,2_ 5‘/4";//,'7 /7:'07‘:1 ,~N . /7¢'_¢';»07 7/»'*`~` 402 777 751/77 JL/¢@_ -._- ¢:.&gz " M¢ '@¢~»§2 6174£.,;;1 gér~ ` /.¢ j 7 /70;22'-73»~“ 777/7 67/)/720-03~: .,/£4//;9 //2/2’3'/,"/,./¢' F»‘?./Q ..,.~p~p¢»_ ..,......,_, “’___,~,,..4 ,,,...,.._' wm ’ /' "' / _' - , / ' l - ' - 7» 750 , . /’ ' - ,‘ '4 . ' / l ' gF;/}/,f/j.;/y/r 777/65 710 ~"",7;7.,_/ /7=- 725 ;,;»:_).;»-= 730 .7/;1;.7‘; ,7.\@ m',,/;_>;;'- .6/;2:'7;/77~ fg,‘:;`é€,zf_' 571 ,5/_/'7;*/»7;// ?.d &.0/_.4/7`/2'/ ._J\,n/f,;? /’73?;/*£ A’°Z:'/.J!‘r_:¢_/r/ 651:}“/;/ /5;¢",'0 C“Z)»J»/-')"' 7;,/"`“~» /)¢5’/6/,3.»/,0» /;:/~,131,3»7,7,- 711 ‘,773.’ :1:7_;;;,,,3 §- _7 “’ ~ " '“ j _ _`4'/%?/222:) cv/z_% ' 2§"/_/7/§ k _ " 521/7 ?;/272) Ac'///z; z J¢é/Z/{J/?j /)'$/~22{ ‘. 2 ’ l (: / /7¢.;/.//,»‘// /1//`7‘ - /5¢»':0 222 2510 ' /l/'> cf"}/:?%‘/”/;'/f/ 7"7§'/ {/A/’?"j ,£Q¢§“ (Q/f/M//?§ /7£/»»§**/1; f F/'Z"”' ¢?;: 4//‘/»" ` a /` :' .-' _ 7 ": , fix `. /%*?02 //2~1’/;€ -. - 2 ‘ ` , ~ l 2 '» F/ /VQ/ /.)3.€'2`2€> "~ l 5 l l .. 2 ` 5324/2274 §7'%~”7¢1,\/ l 2 5 5 5 //: 2222/2 172 72 //2 _ ) l /Pf.;-' 1‘%’)’12§>'//: 4222"" /f;r@ 2253 W/»%‘/,,, »<’22//" ~2-'2‘/ / /'/~? ” "’~`"..-:-j~’_;.(,f ?;f/U';L,;';§ ”/_ />/.7_;5%_ . / 772/2252 222/122 /2'€2:»'“ //¢2/;,12/22 dev/1271 / 1232 / 2- 21 ~, ./-;,¢~'1'2" 2‘422/¢@/;,22? , '2" »» <=/.'2~//,/ '~" ' "'/~2-* 'f'<>: <“<.‘4~ r/é.#//j‘$j‘ )' %/ cf / F/ ) .¢}’/ /' 6 c, ,C // ./¢~' 0 ' // f _ / / . ~ - 7?%=" /7/¢//2/22' /a¢//2:2, 72> ;/¢-,_, ~/2/_/,/»2;¢/ 222/12 //- 2222 ,€“/" / /: ia""“ /;z-»z“/z~¢» >¢J»/ ,/ 345/1220 f' /»,_/27-“/;/ 143 /"’?`<222‘2 /// {:r.-M‘~ ¢"/2#’.<~4 ./Zr“fd' 1-"2 . ' ' ' 4 , ,~.' , /' /' f » 2’::7~’?2//” / //2/@ / 222/_:” 227~22// /0/1/§ /7/2/~?/;1{,7§ />/O/i//: j/A/é*/ /1_ ‘» » . ' %/1:?:7§5//” 7/:) jug/615 C/€c/ 510/71 6//7 70////¢5'2: % jfézé / ¢5615@¥£@3’45171"?~€/€ 7/£` //;57:'/:% /£:1;/117; //76@//€»_/,7/’/(/ g@//¢;/;/¢,/ '/441% 4151114` 51;5;_/ _/f 69/%’/"#/# /W//// 55 ///..¢f /{/d/.m,//¢{( MJ*H'€?//(Q% (/5€ A/.?-|?~/ . fair z;:f'/,GQ/ 751/1111 5567§‘ 1655111111!716 ér/ ///5'/<;7" 1’€:,117£'1,1/)/10///1,/‘/'5”/ 6/%/5’¢"'¢/ /./.’1///’¢1/1’/ 5"55-6’ ha/, 7 /W///r %¢' 5`/1"1‘£’ 61 501/f 'z` _, 11 ' Mf);/% 1//;1/ `:/11)/’1/;'11/ 775/'£./ §15114&> 616/1 116 S`“:¢/J//(j'? . /.6" /' __5"`1°'“‘*“ ' " \'/)1€ 6*'[1§675'“£/1¢1///1 1;1).;': //11011 § //4¢7¢{ //1 / 5 %3///6% /`6//// jegfj §§¢5§1`¢:2»41 /"?é'!z) . . _, l t _ . L_. » _ ` . j[ _ , . ,..._,.~.~ _1,. |_(_4.,.1,,1~_._ 1..¢»1,~-'-~~<:*¢'1'{ ..,_ ~_ ' ' ` .~'11' ' . \ . . . _._ 11 ;_ 4 q ‘ !- . 1 . d ` ' - %/’§/6/7 1116 ¢/éa/ ~ n ` ` /////{/1,/: /// /4,,4/.6’5 /1;71? j //'1?§//;)/{?1?'“(/?’ )/51(/6//'161// ;/ ;6,1;¢ 751 c ' j;? // 577 14//'/?/'6¢~ 1/;’@/17 776/113 ////,/1//¢ 641 567 %/754 677/6 474/f ///4/6/14//46 §4/// 617 ;4’//§/ / 614 /// j/ /K , 57616' E//%_Lm /_/'/4 /-6? .» V/‘-/// 7[`»6 /€'.$`p/,~`/~ H%/ /€’5).1,’/£//¢’/,. 1164/1676 //1. /6”/ 2 //`¢; 61.1`7/<-6 /é'r6 /C’ 7/ / 11 / .// - Af:y.¢//// /// 616 5k1/6 /.2/11/»11 '1‘_ / 411/d ;% 2//,1,1/*; 131 %1,1:,:;/ fZ:/ 153/1611 ///f ///%@/6.146//“4 0/{@¢1/ //[/ f.//Af/);l/?l //j c /{:/z/AG* “'};/{:c-'j'?!-/ /¢’..’J;»Vr' ][6;;*."/ /',1/~'/%77/[?/8 -,/5 A/&'é‘g.f é%'/_f _S‘¢( ,.1/{/,, july §§ ///1/'//111//6"/ l 516/1 167 //»r j/é’¢?~/e:§// 616/v féc: cig/1141 »/6 ' i’.'/?:€ _é//:/' ¢?f/ ////‘F//M¢;/ /.16/1¢.1,1 f /1;`0! Z/"»é’/j /1‘11') jz//¢:/ § _13’ ¢-'5'~’:3/-> &@JQL §?'/A 577/ff f/;J 615 a ` 1/11;1/4'-/¢1'/6 ¢z>,»; /./ 776/11 -1;7?7/’//2‘?// /,¢6[`/4 456/11 . , . ., - ,1 .» .( ~,1;3_6‘ /!/&6,151£2,/¢;1,4 /:1»4 a/,//,: A/< /`,;;/ ',_1, // /7// 142 " 664/6 661/1626'¢1_>}1 122/111 221 161/21 '){: 121 /¢/Jr¢/(, %6‘/.1;117“/65§,1 11/£:,-// 11 '/z:// §-1"~’-.;/ 7{:€£ ~./»;:'/7"‘ 7/» 1:11/.1/£¢,/ 6 'k .` '%FZ§/?J/;/y. */ C/f/,é//y/r:/ ‘////.://r’§/ ,16?//...11:~1;177" 141 16/¢//1.4.161 /&//4,6/ " Z7) (/15%//673/ /1’{/:”//' /Q;,/, ~ :////<>'1_/,’16161~ 146 ,/6/<':~11:> ` r,/~/cf’ 62 w,7[-//(/ 727/1316 /j//”"'/` 10 /"4:;1714 Z'_c»;///f” 1147 /;//f/g///MO/&? //“Z€ 1 ,1;/1/_/////¢ /r' /11}1/// ///16 /76..1///111 :1,'///4//76'/ 117\;./6///6.7/ /J'~,g;€;. ,;112 414/11 . 164 1 1211 1111 1114 ,1..; 11'__,,,141,1/ ` //611»/1;1'//4/ /3111,1//,1/// 710 /16¢"{.1 ///7////¢ Y/W///,»r /€1'1,1 .19/2;’/6//”/446 1/6){46/121/ 1612,1;11;/,-1/¢ . 7;///4‘6/ 157%¢: (:71411¢.:1 1211 /665<>11 115// 1:;;12~;////¢ //~:6/¢//,145 %;1 566/6 121 !/<2// - é{é‘;/@/? !5{//(/ 134 /7!161/1f fOr1//j/4FJ//n/G; / % j/d(,///§/,SL? :4 `\ f fl`/l;l;y}¢§?f/é //?/?f/‘é;‘/ / 5 "5; 5//"/{1 ff 452 445/7’€4//7/¥/ ////,~égS`C>/JM O/ 3 W§/f; ;/ / g 1 553/75 5/“/€?`/0/1 / v /i£;i§¢ / 750/fw @`F ,%//2 c///v/ 3 /://.;,'/ 5¢1)§ m f//);§/v §F 52 ./-'.<»/1[0'//%. 25 5!/§§ ;,.)//7.5/!7‘ L’ 525 ////} 455 55/”/ ¢,»,./5?'/ /;(-’~ fmij 1177/6 §556,5 fn /7§/4¢§ 5§§ 'J M/C. 526 ’/’35 {b/ 33 {é/»@§é/ 1 565 55 5 7/3 ’3¢¢/53 34 /<§`/f” ` [/» ////”5) /»// ”/éf€ ///~) fé/¢/¢*J //:z»/'/ 5§/¢/'//1~ @,A"c¢“/ 425 643/545 ./Y-z’_g . [.~/ / , f ` /2<;5_/"7 56///56/ 5"/:/// »~ er;’/ 27 A,/@,/// g,//,//° 615/d ¢5):/§ 356/k 5 245/ere !/. ¥7///_ //:7/ §’/»4415_§57‘//////1 ' £/,9 ~ §p”. /,,j/ »/;’//:£3;'_{ [o/’ 576 5641' C'///// ///§///4 A/"fywz;»z 535 ///, /zz/<,>§z .»>¢/ /7/71//¢/ ‘,”§ )/ 2424 /‘4//1/§///§// ////7' /29 CZ¢/x/!? (/ fi;`-"*`Z_/%~"z/ 123 5/) %`}€ 42/5¢//@~ .A@~_,§" /%/')’,¢/¢’//z: / 735 //f/¢/:>V'?/AFZ wm /NA'- y;/,,»¢/ //J//¢» .`/<"'J F¢/////;Q;-~»s--r' ’?/€/ // . /L'!‘// //»"2’4/¢/ L§/ //y//»///z dc,¢_/,€?»~ 2'<7/.1 , M/y'x' 0 3/-?//5,3/ d/*’":" /37”6~’¢//»:.;// I¢»`z" %zz_ lW//J/(/ ;’;“z;?',// /A'/ / /j;$ f d/.z/ b 473 "‘F"" '. 2 159 f w;.// A_¢'/:/2 ///~//z~//;'/ 21 55 2»-»»¢»,¢'/~/~) °//w j///?//,¢" f’/'"c/,¢¢/J¢'%?/f;€ /f 27 fha 2 1//§/5"¢.<. ` yfpf,¢//>///z:/ 72;;" 123 5¢.,»» 7“*//¢“ %»47' // /Z./;?¢»/ f//"'-’é /-'»A/'”' 2€/// /Z~'//z ' /5/7'6/2/&¢~5`5/? _ 7/5//4 c 5¢2&/<:/` /_¢/A /F - ( /yJ/r//tf 472 ¢;éj’//////;“ ' 73 /A /;Vé-"";"fW/,FWZ»`-" »I"/L/;»’ /W J//§ 73 5;“/%%¢¢, ;s "j" /A//) /ZZ¢F /)//2»?¢€¢'//’ €9£/ /'5""//1`/2<"`.//3 _C'¢DA/i*`$:f`.f/./.` 41 l 222'_/?1€4//» .)/w »§vi."?°/z,<'é-/ /~_ f ,.//1;'¢?/€5§?672» fé/Z¢»¢f f‘Z; /7¢'?”»?'47¢//;§/:?}1{2“' ,4?»_5_" ;7/%’;" l %;M.c’//F/;;;'¢~ / ,-"'"£/2/ /Z/é.“ /,7/£0 , //.fMF C/Z}Z~? Mf/%é¢/_ /% ?m' /,;/f < é// //// /é" //7 V/_J ./'/,/¢'/¢~'7/€ /,'§'z//) //Z// C/§f'//" ` / / @¢7///7 //;zr /é/' ,_/ZZ¢¢ /EQ/¢z f /'“'///1“/ //2,» J/ cf fbi ’j // ,z/./Q,_; % 21,4_,¢/7’//"‘{/ {’¢/f'/'f" Mék§ a /%J/@A /_O §%/CL %54;/:;/1/r ,K_Q';'¢/ \"<‘,;)/¢ 624/x /NA§?H,,¢ . j/il¢/§/{),/e /é’/ /7/‘7/115 §/,/;/.,Q fa§<~ 504-§ :77,€@,/1 525 255/2 267/§ €m-»_,¢ % an /54/4////4’/0/7 743 §zz/y//‘Cr jé?//;,f /}?'a?,»__"f;' 545/n /f /’"¢"§ ro/)¢¢ é»// ,F{aé;é;// j/-S.U/KFSF SZ'J’€ v/»‘_s'/,:/CJ"/A/s _ ¢//[_/7 z{/¢i) '1»1. -~, ..._,` . {\"l,‘ §» ‘ v - ~ .' - ,1/{),/_ //)3 §3:_§/) 39 511 , 1/:'>33“ /11¢16(//6/6,/€ 626 6 ~/63/1`/¢:'/1 ./ 614/1116 1161/1511 ' _.6161266__%6 121/661 661 06 /(/: 7/ 1111 6511 1511/1165 /11§_ 1§:1;§/6111:91 3 \ 9 l 435/j 1§/.36,-1~f §.21¢6/16/:/6/1…%§1 1 § 11 /6»3.&25/ 0/015/4/5`60":;? 1111 6/6/17¢/17116) ' _ 6/11 11 116§15 //,§’11161; /1/151,15’ '3 ` ` 1 -` 3 3 /3,/ _//53 336§:»11//`5§131,343 ~19,17<€) 17a/51 61~§§ 1216§ 54/¢./611) (01/66§/ éfc’i 5/1.)6§<1/ 636/1151 1417 §’1/1§//616 ~ 1111 1,;/:1# 6/5//5//111/ /1“1561 ‘3"/:,1,.11/`~ §§ /f/§~/» <,/:rc§/§ =' 1§ 1///11,,»§,/3. jj 766/35 531 §>§/6/6/17/ 5 611/1 621@1/5///1/6§1 611§1§/ 3<‘§,1.6;£,,_(5 1 / . ' '- 6 6/:336’ /§11<"1'};¢:1 ,f/f €’1…> //§.1/1,////2.///1/1/11`§»11/,61 //"/ //=1§) / 7/'_ //"/¢11//11§/ q v ` / %7%/%{// 633"':»'7 /7/(_,3 z:‘é,r,' §'(,/7/ /3////?¢{";~/ 935 749 979 fri/g 9 33 _ 9.,:;<43 _ 5'/75‘715///14/11:- 1111/1611 //6/ 6/_.) '2‘-??;/*:\ /»/1 1 111 9. l33/ 5 /_? ._S`L;/-,,>§;,64 .3 1)/3£”3 £/”"//"(// :'/O ‘/C`/ ./119’11'/1 261//6)// /6/11/6' 7//¢"'3//'! 111/11/ 755%;// , “5'€1 §,/3'; *"`1»» ifég///Z.£/ /1/17£?/ /Z? /}"`f/é)//(//if“ 512 /%1/£§"1/333'33335/// /_/)g /?,QF//°f/F'/ ‘l// /, 1561 1150 /¢461//11 ¢7)" FWCJH§,»M fé' _.€»:/1:12/»,§1" \ 7 , A)y}/i. wf? §"[3'3;1"3//{?/7 w//// %/6313'€3¢3'¢!' / 6,'. 6 7 %611 /14 f/:': 701/1475 ;;/ 0 504// 1117 /0//,’/4111/1944;, /11»,;7/1}1}7,1_ /5/_§' 105007‘1/0 711; jam/1110 516§,1,/1§7` //L,¢/M)f‘*m/r:w 154/0 300/74 1543 "{'/Z.gi z'"!';?.?é/;"/¢;’H/j{` T 377-1593 gm `/%/"{'_ §71@7{¢’%7 53'14/ 14144{//11; /1.14 341/0/// ////0£¢, 7`/ /’v/c/,» éjf/r/{/ 3£/€§: 617 /7/ //Hré> §/1)14 1115 c”M/o/ 175/71 014/7 /_/’/&/// 3 010/7 S;¢¢/ 277/1;;¢ _ 7 /,,/09£/:/1 -//;7 101114/<17 //14 §§>145§§:/71 011/134 //-€"7/014_! 3d1 -/;;' /24¢./@ /, .»'~3"13 010 663 1611/nw 11 731>2»1/' /%4///1 013/7501 67/ /»1/€_<11/"40 7/0714 .7 §/1`?',0; ,5,5$?»%/% }7/,//1 /1,11//// @6; :3” /5£ An 9/, /¢7§/.(/3 6/ 14775@{5, //_; //¢/ 112 §774/17’7 511§}¢/7 /01,»0.€4/7 /// 111/f 772 "111/€§7[€6./1%’ //5‘01//+”’ j 161 5j14 .¢c.§r/m»-, //4/§1‘/ é€~fi»v¢W /7747»// ?7Aj 9 /~// " J:/"a// J_f; 34 //17/ //4/"14 5€`¢¢/0/¢»’1,4'/7/.»6'/,70//907[ IW&AA/,uz .61'///7;7/'£1)/1¢ ` 0 /1/1'71/77 111/1311 1.;»:1,1§'/ 70 7114/0 /¢/1,3'0,4¢, 5/ 0/6/ 11qu - 1 »0’/11/»" 5 /51’/1/ 1550 /~¢1/ /`;`//'.'/£ Y/é/`G:f //7"0,41~ ///4/,10/@_¢:,,¢ "/ é/é§ ,}'? g /1/1§;¢> ,1// ~/7112.1 <:’.7 14/1'71»3-/ -4‘0,4 ;,3-.-‘~ 600 fn// //;///r~¢ 144 c€/(` 9 '_ //;9/1/”/1 7<75'_/..’0,/_ 370 760 NF”>/€/v//”/ /7, ’/7£///‘ 1/,/9,. 370 14 1:1»"///4 7§’1@1$7: §//44;¢ /,é¢jg 4321/04 4/0 77/. 0,/ 0'@// 1;/»77” /, / 99/7//7 100/507 4 744/011/;:4, /// §4¢(/,,,3@ --/3>.4» 44,:/ 19,4,§;4< \QSL M€W " `LVO/ _‘9.€ /£¢111/¢4 """,7"--0@ 1101/7 717/5 €`/’J.z¢ /;/'7 7701 ’0 071""¢ O/[~¢r /`@.1/3 1377.7;)7`0/: 7 7£//71"€/’/ //1'/ ci//c"w¢£ 717 7 /`/1/':)////77/.€'/. '7// 1,§4__} /703 €/6”60/7 MC( ,//_.;M_Mé//V”f//€/é ;7»;/1§ 1,//5?7/1¢// /'35'0' "§0170441 /,4 ‘r/;z// /6/7~‘7€1&;1@@4£;@/?@$%&_£<;[0 ¢;4;9 __3'_» /~/¢'j.@§j //3///0/1711/` /?54£/1 \/§,12.4‘/7/ 99 727 g '/%/011/»/ /)3/ J{/ 63 ‘/5$1/?7»6 " 324 1417/j 19/_7 )/4`//}/.¢7//7’/ //.§// %.!//3‘~7//(_7”1;/`/@/}¢{}7/{ f}/ /".._»: 7/7,‘: ‘f?/~(~ L/:w/Ai§}?? %7%/7)“ f`p fj{¢;:; ~é)/¢’WM /;3"” 67/// gi / . 61%/43,1,/ 7//75.74¥/' /? § /; /377 7;`7`7§1*¥1/ 001/4 /’~1>//4/“ 7 0 2270 F§//’,p /{////(Z[égw¢/: 51 7/ SQ¢¢K'* 777 174}/@;» 1477 %1/_) 60*71//% f//¢/ 14",/;/4/164/(€“/?;;?2177 152/750_/§“71/1_§@3[ WCJP;§¢"/:> ¢'9,‘1[7 c_,¢ § 7 ;/~.1;76 390 é'/¢_§. 445/410 ,} ,»,3,,? 001 "*’~/11:/1/ ~)70 Wé/§` .(»~ ‘. z:,-,`; 1 //7 59/»7/§/ 759 /7/44’€/ c/' 1111 §74¢ -;7‘,04,77<_~.,, // _ /' § j( §§ 25 5¢;>_)¢ -/EQZ g l , , 7L " /C'[?//h/¢_AG/ . C//??j //4////4/ '~”@~<' // /_)/3/4 722 714/475 //://,» F/%j?/Zz~/c,/w¢ 1 77 ~ 77?~72 7///4, 4%.24>§ z/J -- 4 1 ~ - \\\ 4/ v 7/ 1 %/‘////ta/ //// fe .) I"¢'// //{//c: :7§; ///V€ f?:;:/:GZ” fig jr{f’”é,” § da C/ / /? / / / n/ v 1 451 -- 7/47“ 7 < /z)»/ 5< `/,-/,~' 77/¢?§/ /`Q/<»//€ CC//<">’;‘. »2/ `/_”/`//_ <‘/" /z'/€ /z':__’;,/ Mx< /:/‘Z'é% / .l//:»/ ',';" / ////7 44 / /»// 7¢/¢‘:£ ./¢/5/ 49/7 7/"?*’ U"?l` § 0`7" ¢7 cfa/443 ~. §5`/;4/; ' ////_"/¢ 47 //4;, // ill/7 /4 /zv~ /4/ H.ev/ 71/4.: C<> 244 z 4 2/7/ ’/%//7/’/'; /%' /éF/f»€`/’./ QA€////”/ 'J;':: (/¢,/// . 5/7///////£’//?0’7¢( j(> / '~ /,, , 9 /§’/`;/> JFF /, /;OW :’(/é/C 74 M/'-a ¢ /¢ §¢z>z/`/ exh §‘¢_;_,¢-'/ '/"(r _,/17§5§~.:,,7 <_ Fuc 49 1` ;*K;(’_S///¢:/ /6?/')/ 9/7€0¢,57»!”’./ ./<~ 6'4~1 dv,$" ’//‘/»7£/( ( ¢é///,’,;;// 671 ,4’//@/'/¢,¢//""//:/77{ :f/Z/` 52~/,?// /7/ 5@,_,¢4<4 / 7/`/7’/ d./"é£/ 11//{"»‘/ ////4 1477 ' fy -;/»é' ///W#’¢°/¢JA“‘/@?/L / /, / . / ,,{W/// , /»%'4;%¢/ _/.//- /:/:4/"/ (//'/ \¢(M,;>/<.w "/fh@ 1 mdc/wa h/J A_, § _ , 4 ,` j / v / ’l 57 , 117# ' ._ ‘ ' _ ij 6/7¢ 6494'7- l. ` 1 ‘ ~ _ 1 1 / 1321 »//r@¢¢_ :ZO;/ cc, 177 /4//§’ /7¢,/<:§ ~1/~€ %;f<"/- _' './ F/.”// /P/M/g¢/ 772;1/ 7/?'4747:¢7) /V//,y_/ , ,»M//f/’é<.~/// .§/ -, fC?/z'""%j c /7\// /»7,5,4,<» 4 75 ,,»5 @7; // w¢»///_ 4/)/~ @Ac/,>p/..> c//(/ 1'»/:¢¢4;.;< 7’»:’5 /¢Q;-'/w;g //'§ dzw,//:'<`C/on *:/5 4 410/ff 716/vw 1 f€»//W/Z§) . 01§/_/¢37<1+15¢1/€" ` " f 777/4 4,4,/774/ //,47 ` ` /¢/j /§/1'%//'.' \ w/ /)¢§§7; 0 W§//§w%§//WK/ %7§/§ /7/§% // /' §§§'1_ '//§//_€//¢”/ ///z[// §§//A 6/%/ guy 7/?_/¢17// %/¢/[/¢/////L///%§: <01~//'5-€ @’7'/'4 H/Y/¢/?§//' war //7//_ /Y 071/§§ v>/r§ // //S/`A [/§//:%/£Zm€n§/ ¢/ /é/; //4§14; 5 Q§/// /7;&1!.` 6013/7i/¢'//~_/§ .f€///HL/P; L// jc§///t/QW§//.__:-- “',// F/%¢1 §§€ 175 /é§ 515/§/::¢//11 <:"3/[/ %/01/ § firzz@)éw 742 /%/ /§§§1/€/&§§/¢~§/ §§/4 ¢z c§§//¢§rf ¢"///¢/ l // Q¢,I/ r§§f_§ :' //é€///z/ §éz/¢"§/A%V§/ °/§///c/ €<.)§5:/./1~/§/ :/:§//~€ f€§/cé Mf (.I §//‘/ /'C“/§/¢J 1/, f»/-/E,,/F/ /'~;¢'13.'}§¢§ §/ 760 . ._ /Z/;'//¢V//, S/V&/J§§§%A§ %7,/¢/ /W§ f/§,§/r §§§/ /V¢/§( ////1;>45%//4/%1 1111,/ >Y/f§// §/[ y§/@§//z§ /_/ /1»/./ //11-§1» 7%// »/11, 1111/1/§1, 11111211,1 111/111 14 121 1/{141111 211/11 4_ F:E ///w§/éi//Mr § 726 j/%; 567/no 6*/'§!/ »/u/£ ./Q¢°"M§§/;§)/ .//51;7¢<¢6 zo//§§/§/_//§ /MO! /646 /_64/2(1 76 66 2/ d? /94/21011< 1621/7 ‘>/gg;:_c,_[ 6 r¢¢[}_* ' ' y \ 17 y,’ 1221< 6 /// /J/'/Q¢§Q:Q/ 3@/61€1//1/ 74 6211/62122/ .1,/1,622111/22161. 1: 1221 21,2§_».;< 2111, ‘/6// 766/77462/6/) /,652/ /0§€. 74 6 21 //////?‘7€ 662 //)1//§2 116/664 /0/2§1>1'11, '6/"/017 ///1)/0/7./ /6/ §/ 741/64 '~//:.)6/<:/3'2 2/,/)? 460 1761/1166 /1613’26/1= .6'¢/ 6/ §61-’ 63167/:/€6/ /017///61///_%12/ 67/ 7/2'/<‘<21 4c /62!<:11121;/2 662 /6/4, 611/1214 613/46 / w1//21/11,1,_/// 17/7~/6?.$%'/2 11 `/;1/11;3 ////711122/ 664_5/ _/ /// 2/§; 2/275`1??277/1)¢//09 6611;1/212;) /7?;:22121 4 /42/§17266/ 766/26 71/`(/714/(¢% 6/1~',§ 1666/7605 61(1’742/671/221 2166/706 .CV 111 611 6211671/1'6§ /1)6 613 2/ 661/ 66,///1/12121 ’/ 11<71/;/;<’1/21»z 1 y , 1166 726,”67'36//6561`/ 70/§)6¢’/7/.6/22 66 2/ 66 697 § 6!11/ ?/2¢1 /1/;: 722 /712111)/1/1»/2 1117 /212/1/-1,q 27/216,2¢ 1 . g ~' /17’/‘/1/6¢`1/ //7§/55§§2/// §0/§/1`/;/6 1/§<1/ /1_,6//6177£/€$5 55’14/56 116 [6/////1911‘5 746/06 _' 374; 516 66 6//6`5`/66 12a/65 5656,/1<14/1/770,66,// \//_////§66“§ _<1 §{j€c 616 61///716746§¢9»1 17741///`,/1V661/ //7 6 5/// 6§66 / 7///6/ 65 011/175 26 /1).6§<:65;§€_§_ 1 c 55 11.1,9¢1/ §c/ §c/ 5/15’¢7//§ §` / ` /)/`55<6<' //11 §>7466/16;'/ /’/Af661////1'“5 ‘/' 7/' 61 6?17;/ pf/`/?%/ 66/)`1"2" §661/1//5. 5/5‘11<1@6 /; 677/761¢16/6//1174¢) 416 161/1 / 74`% ). /%/@6!/€/ -//§5 566/5/ / 1716 '5§674 46 C///v 61//€§74 6601/1606 ’ (/:»‘€J ` /’///74 525/66//2'1: 7L/’lé 1106/156 741/655 3661/56 674 6/7§. §§ 61"/56`>//,6/7¢17/’ )Z?//€§ §/616 616 611/5<.§63 176/506 666161; 661 41/6///114¢:6.// /7-¢»( 1766 5561/,115@¢/ 05 //Z%)§ 51/5/?6/ S.`ec,,c§ 75 €16/ /765/$§__§,//.%/ /05 /<:16 /6”/5~/61) _//'L/) /6.;/‘/,;§ 26 6 5_:~‘6_1:;6 1171/6 /1/1"/12' ///16 056//66 /`~/6>“5 §66/56 /_66 11//@)- 1496 < /6// 176114/ 16516§6:: 666/604 /’46% “6666 §16 /6///661611 /’ /’7 7106/65 651(‘§)///;/./§5-§`§1£’ §11< 56765/€6/ /-14=5 1144»465/6 ~§(’ //”“` 66/>1_6/: /"§6-6 666 6/146, 2656/176 744€ 012/765 j{//'/ 451§6/ 666 O/ //656//, n/?;¢L:(§6/6 ,_1:6 61 176/516 661 61 /FWrér ’/ :// / \z /@%C._S_ /:/¢// 74ny £(` //O/JC 16 MU{%, ZZGA_WrL/rw/' §66/1"16'7//5 /6; 661 §§5-,;%661'3 56674€66 , lt ’___.~w__ ,":,._,.,,.... -. /%>1//`6)/€/1 l §56€‘¢’6§€( /(§///1/1/ 66/{§906///616/51, ///,1/ 726 z ///6/15/ S»'_€/'?,//z' 674 1165 65////§566 §g/ §`£/,1?<,; “:é] %‘7§6655;6& 1 _. ’CM/VM/Q///L%//W‘F ` //'4/§ /1111'71‘477 fém¢ //776/64@_17<61§11/'1@17¢; //1 §676'.67/ 712/1557176 7 77 766/766 /566 0/.§/`71~) 667 /6/6176/71776" 6/4.7/<'/ 66 jill/676 fiM/€ '%!/616;`»( 777/175 `6”/7’116677 667/nj 675/17 10646§£777¢ '/<'>77/65567/’ 777 77777 1777/117 771 71 7 71 77 1777171117;;7 , {£/4'51/ 6-)¢6//6'77/771'7§76267 r// 677//6/ 771/7/6/ 646 ‘~' 6717714:557'§: ' 1;7/_7;: 416/771 77 77// 777 4 747/7776/ ://7(66//64 555 7;,117/6 § 767/77 777 71 77 777/61 177 7 67/_67/ 777 ///f>:) 7/277 /_6§6/§' 1666/677 `/77/1~§'1§&7 77/'1~ 1//16 5/.75<: /751 765 _._///wa(iz.»z /4 r/ %56 {6/77/77.4_67/74 0é1/6 767/7:§/ /46 <“54 »/6/;6/ 771/1624 /_/266%/* €»71’%76// /`Z//C{/, Z`/ l 767/1§61//,_;:_ j'§/ ` jr 4@177// //. @77'44// ? //7/4»7/7/¢/ L' 5/§%%4¢15/§§ 75§17 111 7//2€ §§11/¢*55 §§" ;§;@" 1~1' 5§//111¢,(///011/ 755 129/€`//`01/£ /11/(/ ////§/I //€ (/§§'§/'_€/ €/#161/ 15§/¢5€€/,1 /YZ€’ ./7/£”:'§§§€ 1115 /§z,)//c§ §z/P//c” ¢?§1¢;'///1§ fc/ Q7/é§ , /55715.’6"7¢’/7 /7/§9/§/;; " /(/ //1§ /./€§_1/ 757*&/ /§%/7€//' ////M M'::'/ 661§')§5§:¢§; /,'§ ,§71/§{/§»¥§,¢/,;/ ’ ///6£’/ /5\€ /:§/駧 //5 111§§§/§/§§//7'1 ;///4§ /§,/1'//‘ //-f/// /1:>€/5_1/1’ " vf//%/z/// €XW§//_F§ 153 ' , f/§/ /;/// Z/; 771 117 ('/51;'7 /§ ry %“17€§7#<<)'/ /ié§W/Z/ éw///§,,// 7 0§§///5*§/5 /§€/51¢,»25 w§/////§ §§ »5§11/ A`//?///z§;§ 7///€§ 1411/§1/ %1//§ §§1/1/5§ ,»//1'41§/¢ _ /‘§, "€§§ /`1§/ 1`/ //,1@/ //,§§,§r//'/¢§L/fr§/// 015 §§ 5//§15§11/ .1/?1§§5§/§/%//'/§5 74§/ 7//15`// 15&//"/:~/‘/ 1§/,1/§/111,§57/,§§. ' L(//Zé’§ //;€ //7/§1/<"/§/ M// 7 65 /51//5, /1'/1§/11§/!4§ ////7' §/§ 561/11§§1§ /é/Gf/?/F/ 1967 /érz"§ 14 - §/ /f/OM/;§¢:-'r /x.,é/cé z§§r/ ~/he’d §§15€/1//§§)5\ I f @é€~/// z/§ 515 01/~€//;§/11¢€ 17 1/10/§15€§ ////Le D¢Q/€w§/§§r‘f /7~5//.» /§1;;/;11§//%€%7/1715‘/§ J/§/§/ /4€ §/~é/z»'¢§§`/r am //»1/_///1/§¢§ {/ /:/¢ %//5.//§?<§€’1//6£§/(€ 67 6 /1¢ 7%’/7§§/§(5;§1<€§ //,l ./1\.%;',' Z€/§Z/`§T<`Z/ 7/7 7/5” A/Dé'* ~"./1`/ ?¢30”3> %/7/§//7€// %’Vl/CG/ /§z///c)/§r/ %/W%§ 7!¢_”' 0§7/€//{/ /§§/ 7/\€ Coz//)%§C/§,-, //61§/ 逧md C<:>@/CF¢/ 5%§7 /7//¢/§/¢ /?0 /’.//707‘"/'¢\/) ~/ (%V/c‘j`f F§“/r/§_§ §§ H§EC/w'/v &§‘1“/(/(/4“a F/é 6 /W/P¢c)w o~/ '////19 l/F§;/,/ /<96/¥7"/ Q/§'§/C// %/5~/€ 4,//§§ fm‘@/§A§/% - ///’5§`1//6”/714€,/€//§§/§& 5€//`/5 7%€ //?/¢) V/-€'§ /C/zc)§///§c/§§é///G/€ G%cé'r .'?l@`/§¢.c/%/M§f V< // 767 //7§§§//§§@ fcc//of/" 55/'¢2( 7./ /1'= `c..’é`§/<<_/ 7 9 %Iéz//é§)[ /`HM/////£ 0/71§§/€ §1”/1//€”///1/1§ /§’//>1/14;§§§/ 77/?;§- / 7:1;7§'§/ §/M ¢é///é"¢/ /¢’§/1\ 1§/;§)/7/€§~§////`“§ §,,///§ /,S€c§<§q>/ 5 i 0//'0` ' ///‘ //_/// 10///7€0/7{/19// (/6'1'/ £6>7015:5 5001//1/} / 757/7§)'%47(/ I707 C@j- ~ / /7/7"6_”/ 0 7%///07£711%1/0 ///7’/1/6/57! // //`714/ 7/76 7/1)72/7/1&7”.“/7_/@ - .;///1/1>7//§ 5/706€€ fdi€cbné//»?; %7/_» 67’@/16¢1/77;: 607/1'§%7/7‘/6107¢,»/// 7/7"` 1261/777 F//////é/// //2.0 117// //7{/0777%”61//% ` /z?W/Z /%/0”’/ IM/M§ [7//0/0/0-:00///¢' /4//’§'<`1/,)7;07/\/6¢~ 6/' /2111/1 ,//"`0',0'0./ /¢02//0:1€/ W 6“/(/720;< //AI£A/aw/,u/ 770/67 //0/7/21:61<.//77/01/ 1000/070 /%7)/"/77/// %77/<':;01 77//5/0%/105€»0%’¢/0/ 77/ 6 /10177f ftl/710 c 070$0’ ~ y é//////f 11/ ,0/0017'///0/¢ §u//?/” ` ¢""// , 4 ZL/z’//¢/, ////2 //*7$1//’10/,5‘ f>: %////°//%0,7' 010 /6,00100115// /1”//7¢1/1/00,1/"/%<~ //// ;///01 ~'~/2 § //0/011 ¢/“0" /z/ ¢11-1//¢ ,/ /7// /1111`~,-.§. ,707/0,:0,7,/:1» mé~r,/ 1120 f,///k,§/AWY/’ 10/7/ /’10// //7’/ /Z%/ /17`/00/1 1//01/<:0<.0/,70::1/7é JC// /0// §/1010'/00:10/7§/ //10 ///'/%/ /0111 0/0<00~ /:'"0"`01/~1/ /77/407010/ /%/ %171,'// 1/017/0107/ 710 405 /é////////r /01`/70§",0/ ///77// 510 476 677/7/// 157§/10¢7/06 §7£@77/////00/{ 667*%//;;41»/1//¢€1€ 717/1,/1: 771 , 717 /0@11¢;11111111 74 ,// 747 %0_`/0771/:: ' //70#0/7[11/6’ %:5/<‘/ 71 1110/1 6//171$'0/77/€”/1010/ 67 5///06/ 74 7///770 501/§477'»0 07 Z.WQW///J/ 6/7/.6////1¢07//1'///// 77./07» j010 ,70'1:,//-' 771 7/ 171 7 17: 177/71 >/ 711 111 71111/. z; 1/,1111717 170/71 %7/<5’ /6'¢//7.1”6:/'4' %%74/17/['77/¢/§/' >/011,:/ 7/2¢/1> %7//,0/6;<” /.§'/<'?L v 7//¢7 6/,7:71/117£ 770'1/6777754"2/, /7//5/)'5' 92/5/?/ 9§7’74’¢) /75/ 77 7<667// '//6?)”51.`661/ 676/122 /7/°,675?25112’ éf@cp /216/7 62/ 277%$/6>§§_,5_/; 64467/7/7/75777!1 56 776/772 7/77467// 6055 661/76 767/25 1// 262~/6,666/6€77/2/’7/7/2, 5005/777 AM 7‘;)2?2166»7725 6107/756'//772577 756 111/61'//6/ 156/76 /)'/647/22/75/ /6’016_221/67“1/7:7/72/ v Té l/ ///67745"077 325/f 556/sz 550 ////1_/ // 62¢'@3)'4; §§75'»*1/1»176<50 /77 66/55€277//(’ t _ 2 46/616<;67 ////6)//€675€$/6%_75¢ //"¢5*//(2/1/ F€W 5771{7 675/560/5’17 .7';1772)/6777€72 6 ' 1 777§~~154216//.5671/€ ,5777616,1.26 506/757 257/2775 15///2' /2)17~/ 2751/56~ . 711/2 >/ 67676 76:67// 677 22777/667677/) ` 522726//%6/ 6/(5‘¢//7//5/77/57///62/)//77/ %61/5 757/4 665 447 ~ 717/0/2% /// 756/795 '%/577/ /5 //_62///76617z 477/_ 663/7//€2///?57 é¢,//K@M/ £5»/ »7/§.'_" 7 .§/577 /15“7 /) /{5% Z%/< 555/574 /§5§5/77 7/%7¢577 /c/ 7/555//?¢/77/5 n /75)”7// 525 Z¢;'577'/57,r »§77/5/7775 5¢/§7[ .§7/177 //§/ §77/‘5 5§/5//51/£? Q§é/;’_§" ' //_55'/( .`7<:75 5;`/ /-/ /f//?//wd:/ 7/7//< /‘_/725 55/:55¢/ 555//’/’77 /%/5) l §§§55§777/ /775 /,55/ 7/57//7/ 5555;5/¢ 5//577755¢ 5`6///£//73'€ /5177,5/’5€ §77»7 ' - 5 / 7//5///57/;/;/ 7/ crm/555 ~'5/;§ 575 /7/7/5/(/ §57;5575 425 /5,/575_7 1557 /”/€ §5/ /5 /75575/5/' 7/57L' §7?7¢’ 77 557//// §57/;//¢;7 775 §C’ §5///§557577 §€’ 65775/7/ 55 777//,5/7 577 55/-/ ' ‘ ' .,57 5;/77~577/ _F / '/7"7§/ 77//7//05/`:57/ 5___§7757% 5557‘7;¢/ §)§/ §/777 ///7 74557/ 5 ///'/57/77777777` 575 -j§///.@?//c*//¢’ //7§557 771/557 §§ 7~57757/§_/:) Vf 7 7%§/7/§’5 /é/~:" ;§2'/ /2:>’ /§’/ F~»////*z<»///f//c?¢/?M//; /777¢/£7 7/5 /§§/77/775 /5§7'/§€`/ /§77/ 555/555 /,`//:'7/<:5 777/77 57 '“ _ ~, - _§¢ 755 n 71 /1/7177/7/ 75 77§§/7$// §5;§77(7775 /755,//7777/5/ 55577575/) . ' . y ." 56/§//515// §/§/7/57/ /57577/ 555/5// /57 757 5(/;57,§ 5/55//57577 ‘/<,'"€75/-'» ///"%’%/5/~/577/5 /§/;“57/2'/ 523/5555§775// /§/7,75 755/ /5// <’”%’¢=,`/c' ; 57§/%/ 575/655 7475 /77¢ §75/7/,77<7 /§5 /.‘Sz55/ ///75_,. /'/1/¢'577/55/ S/"§:/§° :§ §// 777/775 /7/ §/ f¢Aé/<‘//M /5/ 6/5/25£;/¢77 /555755//77 7§7 //7 755 //§7,’ /4/“///777///@5/ <75"77 '/7_.,- ,/§7§?; /'/77~7: , C /:/7_5/)5/'7:7/ /;55 /§//, ‘:/5.‘¢§/ ,77 ///§77 /,//5 //-7 775/575 §<1 .§7/ /'- ///./97§ /5/// ////§:’z` /1//57/'/ /5/ //_'75/75/,» / §/! //c’ /._97751' f////¢.¢// A////§ 7;7775,77/,~7/ '7//5577 5777/ VU§I'§ 577/77 540 /)’:7 677 577/77 /§7/5/77 -/7_7// //// 57///7§/// 3¢_55,';] V§7’ 7§,77),75 7/'7771§ /55 MM5//5 ./7,\,577`:7:/ " 7'7:,/57_7/ 77/7777 777 715/7 //57 7 577/5 757 §/// /7 r// 7//7757~7, 7,~ 797/§/`( 457///7;€ 775 _/7?{/5: §§ $'“/757 ,§77/5//7§ /575 //`/ ///777'/ .,//'75/ ¢,/ 657/775 ¢/5’~_?5/ 43 577:57/5'/ <'-.’ <`§7§ 557 /»§/'//;’ /7 765 /7“/ /,/7 /./ '1£.§5 /c)L//?L "7/ 577// 557/57 r /<.7 ~ ;:'\ ..f / /_ -57»77'5// /V'?l~'~?,r///“’A/ ~//_//i‘ /:F~:-§’/ 575 //55 _).//<"§/ 17§7//5 ///¢’747/7_ :’///§ §§/7575(5 _/7/15<'///7//// 5`/;////`{5 155555¢§;*' ’ a - ` ‘ n ,¢ §§ /¢/éué/M §§ WQ//W/’i/Fé// /§7/(`{ M///é/?Q/ /17/5'/ A.) 6////75} 712 ('551///\'" //%` / §j\j. ' w /%' . 716/516 ?:66'¢/77’7/7/ '//2¢67 ` ///225 ‘?/' 1627/567 él:: " /61/ '6’¢’2//]/777/;/6;12 26261/ // 666:121 §6 666/6 /2// 7/776//7/626€ /6¢:///776 /2_;76 ~ /¢‘/ 777 727 //6/6776276/61/ 277/666 v /’6/6/2/ 1 . G//é.»/// 616 76 / /276€/;’7;57€7;§€0/// 6672/6 ///._: 76776 2211/76 677///26/67 ///661/62:116 z: /21121 '//21=::5 2 : 2537/§ 167 //f’ 29/~6/77~"///1// 22’,15// 62/'6; ,2% /c"¢v‘( `/;/ %" 57/ m rH'E couRT oF chMilNAL APPEALS ' _ o~F TExA-s ' No. Pli11095-12_ _ THE _STATE OF TEXAS v. ANTHONY GRANVILLE, Appellee `o,N sTATE"S\PEfri`IT{,I_oN FJOR DIS'CRETioNARY~:-REVI“EW FROM THE sEVENTH CO'URT 0F AP-PEALS ' ._»WALKE.RYCOUN_TY ` COCHRAN, J., delivered _th'e. o‘pini_on'o_f the Court in which KELLER, P.J., and MEYERS, PRI_cE, WoMAc?I'<,~ JoHNsoN, HERVEY, and ALCALA, JJ.,_ joined. KELLER, P.J., filed a concurring opinion iii'which PRICE;J., joined. KEASLER, J., filed a dissenting opinion. O P IN l Q N This case raises the issue"' of whether a person retains -a legitimate expectation of privacy in the contents of his cell phone when that phone is being temporarily stored in a jail property roorn.l The trial judge granted Anthony Granville’s motion to suppress, concluding j We granted the State Prosecuting Attorney’s (SPA’s) sole ground for review which asks, May law enforcement, With or without probable cause, activate and' search the iGranville Page 2 that the high-school student did not lose his legitimate expectation -of privacy in his cell phone simply because it was being stored in'the jail property room after he had been arrested for a Class C mi`sdemeanor. The court of appeals affirmed that ruling.2 We granted the SPA’s petition for discretionary .review, but we reject its'argument that .a modern-day cell phone is like a pair of pants or a bag of groceries, for which a person losesall privacy protection once it is checked into a jail property room. We therefore affirm the judgment of the court of .appeals. v I. One morning, Anthony Granville was arrested for the Class C- offense of causing a disturbance on the',school bus. His cell phone was taken from him during the booking ' procedure and placed in the jail property room. Later that day, Offlcer Harrell, a Huntsville ' Police “School Resources Officer,” was told that, the day before he was arrested, Mr. Granville had used his cell phone to take a photograph -_of another #student‘urinating in the boys’ bathroom. Ofticer Harrell, who was not involved in arresting Mr. Granville, then drove to the jail and retrieved the cell phone from the jail property room. He examined its contents without first getting.a warrant. The officer turned on the phonc, which had been turned off. He went through it until he found the photograph he was looking for, then took contents of an inventoried cellular phone that was immediately associated with the person at the time of his lawful arrest? ® 2 State v. Granville, 373 S.W.3d 218, 227 (Tex. App.-Amarillo 2012) (fact that defendant’s cell phone was in jail property room did nothing to -“nullif}f’ his “reas`onable expectation of privacy in the phone searched.”). Granville Page 3 the phone to his office, and printed a copy of the photo graph. He kept the phone as evidence. _ Mr. Granville was charged with the state-j ail felony of Improper Photography, and he filed a motion to suppress, arguing that Officer Harrell could not search his cell phone without a warrant. At the hearing on the motion to suppress, both Officer Harrell and the prosecutor contended that if an officer has probable cause, he may search anything in the jail property room that belongs to a jail inmate. There are no exceptions The trial judge tested this hypothesis by asking the prosecutor,~ “-[D]o you agree that there is an expectation of privacy on the information the person has on their cell phone?” The prosecutor responded, /,.»¢*""'°“-M `*~` ,r\" .. N\.""\ . “If` you have it inyour"'possession and not committed a `Ci'rme,`sure_._:’_vw She elaborated further: w I think if you"re in the W_alker County jail you have no expectation of privacy"\: § in the personal effects that you had on you at the time that you were arrested. § .His expectation of privacy is diminished in those effects until he can and“ does exhibit subjective expectations throu h , presumably at the : . if l time of his release from detainment or incarceration \? dog 6,{“_}'”£? 27 -' " " ' ' " CO /6)4.¢5'@ `~} f§r/ci+o£ Defense counsel disagreed:‘ [I]t is clear that everybody in this room has some subjective belief that their cell phone is private and it doesn’t matter if it is lawfully seized by the cops.” The trial judge posed the legal issue nicely: So if 1 get arrested for jay walking out here this afternoon and get put in jail, any officer in town can go out there and go through my phone, cell phone, and might discover that l have a picture of Promctheus chained to a rock in the mountains and an eagle eating his liver out? Y-es, said the State; "“If an officer has probable cause vto believe that you committed a crime ) mci evidencc‘o'f`that“ciiinc'[i"s] on"y"ou`r' pliciié§'the`n, ‘yé's"`hewc_aii`lock_at"'it'.'"OtheWi§e,"ii'o’h`€ ' "`m" can’t look at your phone because he wants to. He has to have probable cause.” Granville ’ Page4 After studying the law, 'the trial judge granted the motion to suppress and entered /\ findings of fact, concluding that the cell phone was the personal property of Anthony Granville; Offi`cer Harrell took possession of it without a warrant; and the officer “searched the'contents of the cell phone until he found the photograph he soug`ht.”3 Based on his factual findings, the trial judge concluded that Anthony Granville had a subj ectivej reasonable, and legitimate expectation of privacy in his cell phone “even when that cell phone [was] in the 10. ll. 12. 13. 14. 3 The trial judge’s complete findings of fact are as follows: Anthony Granville was arrested and jailed for a class C misdemeanor of Disruption of School Transportation. When booked into the Walker County Jail,_Anthony Granville’ s personal effects were taken from him by Walker County Jail personnel and placed into his property. Among the items taken from Anthony Granville by Walker County Jailers was a cell phone. The cell phone taken from Anthony Granville was the personal property of Anthony Granville. After his incarceration, Officer Everett Harrell, a school resource officer at the school Anthony Granville attends, heard from others at the schoolthat Anthony Granville had taken a photograph of another student Believing the taking of the photograph to be a possible criminal offense, Oliicer Harrell went to the Walker County Jail and took possession of Anthony Granville’ s cell phone. The cell phone was off and Oflicer Hairell had to turn it on to manipulate its controls Ofiicer Harrell [s]earched the contents of the cell phone until he found the photograph he sought Officer Hairell seized the cell phone and checked it into property at the Huntsville Police Departrnent. Based on the content of the photograph allegedly taken by Anthony Granville, Anthony Granville was charged with the State Jail Felony‘offense of Improper Visual'Photography. At the time QH.icer Hairell top_l_c_p9ssession of Anthony Granville’s phone, he had no valid se ant ""~"“ Ofi‘icer Hairell had sufficient time to obtain a search warrant for the contents of Anthony Granville’ s cell phone. Officer Harrell took possession of Anthony Granville’ s cell phone and could have held it until a warrant could have been obtained. No exigent circumstances existed that would have necessitated circumventing the search » warrant requirement Granville Page 5 jail inventory of an »accused.” Because -Oflicer Harrell had neither a search warrant nor exigent circumstances to make a warrantless search of that phone, the trial judge granted the motion to suppress.4 The State appealed,.and the court.of appeals affirmcd, finding that (l) a person “has a general, reasonable expectation of privacy in the data contained in or accessible by his cell, now ‘smart’ plione,”5 and (2) a person continues to have a reasonable expectation of privacy in the contents of his cell phone even though it has been placed in a jail property room for 4 The trial judge’s full conclusions of law were as follows: 1 . Oflicer Everett Harrell had no valid search warrant When he seized the cell phone belonging 9 to Anthony Granvillc. ' 2. Ex-i gent circumstances did not exist to lawfully circumvent the necessity of obtaining a search warrant. 3 . The seizure of Anthony Granville’s cell phone was not accomplished as a search'incident to arrest. 4. To the extent"that probable cause was necessary for Oflicer Harrell to search the contents of Anthony Granville’.s cell phone, the Court finds that the State of Texas did not meet its burden iii demonstrating probable cause as it wholly failed in its evidence to show that Oflicer Hairell had in his possession at the time he took possession of Anthony Granville’s cell phone sufficient information to believe that a criminal offense has been committed by Anthony Granville, specifically that he did not state in his testimony that he had information that the photograph was taken without the consent of the student photographed or that the photograph was taken with the intent to invade the student’ s privacy 5 . The Court finds that Anthony Granville had a reasonable expectation of privacy in the contents of his cell phone. 6. The Court finds that Anthony Granville demonstrated subjective expectation of privacy in the contents of the cell phone. 7 . The Court finds that the expectation of privacy in the contents of one’ s cell phone is reasonable and one that society accepts as legitimate, even when that cell phone is in` the jail inventory of an accused. 5 Granville, 373 S.W,3d- at 223. Granville Page 6 safekeeping.6 The court of appeals ended its opinion with a.rhetorical vflourish, noting that “[a]` cell phone is not a pair of pants,” like the pants and shoes whose warrantless seizure from the jail property room and later search and testing we upheld in Oles v. Sz‘ate.7 II. Appellate courts afford almost total deference to a trial judge’s findings of fact in a suppression hearing as long as those factual findings are supported by the record.8 We also- view his factual findings in the light most favorable to his ruling.9 The Fourth Amendment states that “[t]he right of the people to be secure in their perso‘ns, houses,lpapers, and effects, against unreasonable searches and seizures shall not be vidlated.”'° 'The term “papers and »effects” obviously carried a different connotation in the late eighteenth century than it does today. No longer are they stored only in desks, cabinets, satchels, and folders. Our most private information is now frequently stored in- electronic 6 Id.` at 224-27. 7 993 S.W.2d 103 (Tex. Crim».,App. 1999). 8 State v. Duran, 396 S. W. 3d 563, 570 (Tex Crim. App 2013) (“Appellate courts afford almost total deference to the trial judge’ s determination of facts (if those facts are supported by the record) when they review a suppression ruling. ”); see, e g., State v Betts, 397 S. W. 3d 198, 204 (T ex Crim. App. 2013) (deferring to trial judge’ s factual findings and upholding trial judge’ s determination that defendant had reasonable expectation of privacy in his aunt’ s back yard where he kept his dogs). 9 Kothe v. State, 152 S. W. 3d 54, 59 (Tex. Crim. App. 2004) (appellate courts must defer to the trial judge’ s factual findings concerning a person’ s expectation of privacy and view them in the light most favorable to the prevailing party; ultimate legal issue of standing` is reviewed de novo). “’ U.S. CoNsT. amend IV. Granville Page 7 devices such as computers, laptops, iiPads, and cell phones, or in “the cloud” and accessible by those electronic devices.‘l But the “central concern underlying the Fourth Amendment” 1 has remained the same throughout the centuries; it is “the concern about giving police officers‘unbridled discretion to rummage at will among a,person’s private effects.”12 This is v a case about rummaging through a citizen’s electronic private effects-a cell phone~without a warrant. A. Standing: A Cell Phone Owner Has Both a Subjective and Reasonable Expectation of Privacy in -His Cell Phone. A person has “standing” to contend that a search or seizure was unreasonable if (1) he has a subjective expectation of privacy in the place or object searchcd, and (2) society is . ' prepared .to-recognize that expectation as “reasonable” or “legitimate.”13 '-l`he “standing” doctrine ensures that a person may claim only that his own rights have been violated; he cannot assert that he is entitled to benefit because the rights of another have been violated.14 “ See Bryan A. Stillwagon, Notc, Bringing an End to Warrantless Cell Phone Searches, 42 GA. L. REV. 1165, 1194 (2008). 12 An'zona v. Gant, 556 U. S. 332, 345 (2009). - --*---»~--+ ~~~~~~~~~~~~~ '~"*~Mnnesoza v 01son,-495 U. s.- 91-, --=95 97 (1990) (an overnight guest in another S home has a legitimate privacy interest in that premises and thus may challenge its search); Kothe v. State, 152 S. W. 3d at 59 (Tex. Crim. App. 2004) (“Any defendant seeking to suppress evidence obtained in violation of the Fourth Amendment must first show that he personally had a reasonable expectation of privacy that the government invaded. He must prove that he was a “victim” of the unlawful search or seizure. He has no standing to complain about the invasion of someone else’ s personal vrights. ”) (footnotes omitted). 14 Olson, 495 U S. at 95 (“Since the decision in Kalz v. Unit`ed States, 389 U. S. 347 (1967), it has been the law that‘ capacity to claim the protection of the Fourth Amendment depends.. .upon whether the person who claims the protection of the Amendment has a legitimate expectation of Granville Page 8 A person’s constitutional right to be free from unreasonable searches is a personal right that cannot be asserted vicariously.15 Courts have held that (1) a person has a subjective expectation of privacy in the contents of his cel»l_phone,16 and (2) this expectation of privacy is one that society recognizes privacy in the invaded place.”’) (quoting R`akas v. Illinois, 439 _U.S. 128, 143 (1978)). 15 Minnesota v. Carter, 525 U.S. 83, 88 (1998) (“[T]o claim the protection of the Fourth Amendment, a defendant must.demonstrate that ~he. personally has an expectation of privacy in the place searched, and that his expectation is reasonable”). 16 See Uriited States v. Wurie, 612 F. Supp.2d 104, 109 (D. Mass 2012) (“It seems indisputable that a person has a subjective expectation of privacy in the contents of - his or her cell phone.”), rev 'd on other grounds, 728F.3d l (lst Cir. 2013), cen‘. granted,v 82 U.S.L.W. 3104 (U.S. Jan. 17 , 2014) (No. 13-212) (upholding defendant’s privacy interest and holding that warrantless search of cell phone taken from an arrestee was unconstitutional). -As the First Circuit explained in Wurie: _ ' We suspect that the eighty-five percent of Americans who own cell phones and “use the devices to do.much more than make phone calls,” . . . would have some difficulty . with the government’s view that “Wuiie’s cell phone was indistinguishable‘&om , other kinds of personal possessions, like a cigarette package, wallet, pager, or address book, that fall within the search incident to arrest exception to the Fourth Amendment’s warrant requirement In reality, “a modern cell phone is a computer,” and “a computer . . .`is not just another purse or address book.” Id. at 8 (citations omittcd); see also United'States v. DiMarco, __ F.Supp.2d'_, 2013'WL 444764, * 10 (S.D.N.Y. Feb. 5, 2013) (quoting Wurie and stating, “given, the unique and significant information-storing capabilities of the modern cell',phonc, [defendant] did have a privacy interest in '.the_ cell phppejhatlthoHicers found in_ his pocket” when they-arrested him); People v. »aj§l¢§j:;g§_g,$_d;§_l],, 32_§2_~1_&(;919T Ap’p;M j;¢quoting Wurie and “_assuming” that the defendant “had as(in`able"`cxpecmdon of ' Macy in his cellular Telephone’s &HHHBW’); see generally Schlossberg v. `Solesbeez 844 F. Sup ¢2d 1'165, 1170 (D.Ur?"§g_l?l‘(“[P]ersonal electronic devices such as cameras and cell phones cannot be consi ere closed containers” as "these~ devices are capable of holding large volumes of private information . . . . On adain basis citizens may carry with them digital cameras, smart phones,.ipads.(or other tablets) and laptops. These devices often include some combination of email services and intemet browsing. Potential information stored on them includes: phonebook information, appointment calendars, text messages, call logs, photographs, audio and video recordings, web browsing history, electronic documents and user location information, Wayne l arisen &-Rick Ayers, Nat’l lnst. of Standards and Tech;, Guidelines on Cell Phone Forensics 56 (2007), available at http:// csrc. nist. `gov/:publications/ nistpubs/ 800- Granville Page 9 as reasonable and legitimate17 A person’s subjective expectation of privacy in a cell phone that he owns and possesses is supported by decades of cases on “standing.”18 A defendant normally has “standing” to challenge the search of places and objects that he owns. For example, a homeowner has standing to challenge a search of his home.19 And a person generally has 1.01/ sP 800_ .101. pdf.”). 17 See, e.g., United States v. Finley, 477 F.3d 250, 259 (5th Cir. 2007) (rejecting el/Q é:;' government’s position that because cell phone belonged to his employer;'de`fé'r`i"daiit"did"M ?~`é!o:£ "'i _ standing to challenge search of cell phone; defendant had use of phone and took normal precautions V'¢i ‘\ wei side to protect privacy of phone calls and records even though he did not have password protection); 5‘?"&’@ 'f""": Um`ted States v. Lopez~Cri¢z, 730 F.3d;803, 808-09 (9th Cir. 2013) (u_pholding trial judge’sfinding fee @/h»:,,éi/.€.. that defendant who was in possession of cell phones and was using them had a reasonable expectation ‘of privacy in them; no evidence that defendant did not legitimately possess the phones or that he failed to take normal precautions to maintain privacy by abandoning them or_ throwing them away when he was stopped by agents); Q)medi§‘ra¢es v. ' 94 F. Supp.2d 1291, 1299 W (“An owner of a cell phone generally`h._as a reasonable expectation of privacy in th§,elecnomM d on the .. hone.”); .Szaze v. Carr`&i?§`TTS°”NW§z“d~i“rorii~rwir“"znin)u (defendant had a reasonable expectation of privacy in his cell phone); Unz'ted States v. Davis, 787 Fl Supp.2d 1165, 1170 (D. Or. 2011) (finding “[a] person has a reasonable expectation of privacy mhis or her personal cell phone, including call records and text messages” ; U ' edStates v. Gomez, j W(S.D. Fla; 2011) (defendant had a reasonable_e;pl;:at`iaimj his cell phone)_ . H ~-~…,,W ,.,....».i‘-m`mm»m,w-Mm~] "8 `When asked at oral argument about specific evidence that Mr. Granville had a subjective expectation of privacy in his cell phone, defense counsel recalled his law-school memory of res ipsa loquitur, the notion that “the thing speaks for itself.” lt was, after all, a cell phone. Just as one assumes that a person has a subjective privacy interest in his diary, in.his medical records, in his bank records, in the content of his telephone calls, and in the content of his personal computer, one may assume, without further `proof, that a person has a subjective privacy interest iii his cell phone. 19 Alderman v. United States, 394 U.S. 165, 176-80 (1969) (a person’s property interest in his own home was so great as to allow him to object to electronic surveillance of conversations emanating from his home, even though he himself was not a party to the conversations). Granville Page 10 standing to challenge the search or seizure of'a car he owns.z'0 A “legitimate” expectation of privacy acknowledges the lawfulness of the person’s “subjective” expectation of privacy, As the Supreme Court has explained, a “‘legitimate”' expectation of privacy .by definition means more than a subjective expectation of not being discovered A burglar plying his trade in 7 a summer cabin during the off season may have a thoroughly justified subjective expectation of privacy, but it is not one which the law recognizes as “legitimate.” His presence . . . is “wrongful”; his expectation is not “one that society is prepared to recognize as ‘reasonable.’ ” And it would, of ecourse, be merely tauto`logical to fall back on the notion that those expectations of privacy which are legitimate depend primarily on cases deciding exclusionary-rule issues in criminal cases. Legitimation of expectations of privacy by law must have a source outside of the Fourth Amendment, either by reference to concepts of real or personal propertyM l_a_w or to understandings that are recognized and pemme§ One of the main rights attaching to property is the right to exclude others, . . . and one who owns or lawfully possesses or controls property will in all likelihood have a legitimate expectation of privacy by virtue of this right to exclude.21 . The factors that courts use in deciding whether a person has a reasonable expectation of H/,,..""'""i» _,. new . ei-N.Wiw,_m_m-* . 1 ’{I ;€ -.‘r privacy in the place or objecnsearch'e” ihcludcihe foilowing: ""`"""‘~~~‘-~--~`._“, w/ 121/§ if j .,/"”"”“MM § (l) whether the defe dant had a proprietary or possessory interest in the placeo\q:§x ._\ \_ object searched, r---»~e-.._,,.. "--~W.-W 211 United States v. Jones, 132 S. Ct. 1945, 950-53 (2012) (trespass upon car by placing GPS device on its underbelly was an invasion of property rights and constituted a Fourth Amendment search). 21 Rakas v. Illinois, 439 U. S. 128, 143 n. 12 (1978) (citations omitted). - »" commonly stored on businesspersons_sg;ell,phones to governmental view. z d Granville Page 13 privacy, identity theft, or, at a minimum, public embarrassment is enormous.27 B. A_n Arrestee Normally Has an Expectation of Privacy in the Contents of his Cell Phone That Is Being Temporarily Stored in a Jail Pi-'operty Room. Although a person may have a reasonable and legitimate expectation of privacy in the contents of his cell phone, he may lose that expectation under some circumstances, such as if he abandons his cell phone,28 lends it to othersto use, or gives his consent to its search.29 Courts across the country have wrestled with questions of when he might lose hisreasonable expectation of privacy in other situations, perhaps if he is arrested and police perform a search of his cell phone incident to arrest3° or, as here, of his cell phone stored in the jail 27 See, e.g., Newhard -v. Borders, 649 F. Supp.2d 440, 443-44 v(VV.D. Va. 2009) v(former school teacher and his girlhiend sued police for invasion of privacy When defendant was arrested for DUI, officers took cell phone that his girlfriend had lent him, accessed nude photographs of himself and girlhiend in compromising positions, then shared photographs with other ofhcers, which led to public notoriety and loss of his teaching position). 28 See United States -v. -Powell, 732 F.3d 361, .374-75 (5th Cir. 2013) (when -defendant~ passenger disclaimed any personal connection to cell phone found in car, she lacked standing to contest its warrantless search by police othcer); compare United States v. Lopez-Cruz, 730 F. 3d 803, 808-09 (9th Cir. 2013) (arrestee did not abandon his privacy interest in cell phones when he denied ownership of them and said they belonged to a hiend because he was in possession of them and using them when he was stopped by border-patrol agent). 29 See Lopez-Cruz, 730 F.3d at 809-1 1 (defendant consented for border patrol agent to “look through” his cell phone, but scope of that consent did not include answering incoming calls). 30 Because the State did not rely upon the “search incident to arrest”doctrine in the trial court, the court of appeals did not address that doctrine in its opinion. We will not do so either, but we do note that two separate certiorari petitions have been granted by the United States Supreme Court on the issue of whether the cell phone of an arrestee may be searched without a warrant under the “search incidentto arrest” doctrine. Rileyv. California, 82 U S. L. W. 3082 (U. S Jan. 17, 2014) (No. 13-132); United States v. Wurie, 82 U. S. L. W 3104 (U S. Jan. 17, 2014) (No. 13- -212)_. The legal issue in the present case is similar to, but not the same as, that in Riley and Wurie which came to opposite conclusions; the California court of appeals upheld the warrantless search as incident to an -arrest, while the First Circuit held that such a warrantless search violated the Fourth Amendment.. Granville Page 14 property room. Under the Fourth Amendment, police officers may search an arrestee incident to a l lawful arrest.31 The justification for permitting such a warrantless search is (1) the need for Courts across the nation are split on this issue. Compare Smallwood v. State, 1 13 So. 3d 724, 735~38 (Pla. 2013) (condemning warrantless search of cell phone as part of a search incident to arrest); State v. Smith, 920 N.E.2d 949, 956 (Ohio 2009) (same), cert. denied, 131 S. Ct.102 (2010), with Unz`ted States v. Murphy, 552 F.3d 405, 41 1-12 (4th Cir. 2009) (need to preserve evidence justified officers’ warrantless retrieval of call records and text messages horn cell phone of suspected narcotics arrestee), cert. denied, 129 S. Ct. 2016 (2009); UnitedStates v.Finley, 477 F.3d 250, 259-60 (5th Cir. 2007) (although arrestee has a reasonable expectation of privacy in his cell phone and thus had standing to complain about search, warrantless search of cell phone was permissible as incident to arrest). . Even if the State had relied upon the “search incident to 'arrest” doctrine in this case, we note that the majority of recent cases that have considered the issue in the context of a cell-phone search , have held that the search must be contemporaneous (or nearly so) to the arrest itself. See, e.g., Murphy, 552 F.3d at 411 (initial search of cell phone occurred when arrestee handed phone to arresting ofhcer); United States v. Santillan, 571 F.Supp.Zd 1093, 1102 (D. Ariz. 2008).(search of cell phone occurred “mere minutes after the arrest and seizure”); United States v. Currjy, No. 07-100, .2008 WL 219966, *10 (D. Me._ Jan.23, 2008) (not designated for publication) (search of cell phone was “substant:ially contemporaneous” with arrest). Some courts have held that cell-phone searches that were not closely contemporaneous were not made incident to arrest. See, e.g., Unitea' States v. ~ Gz`bson, 2012 WL 1 123146, *10 (N.D. Cal. April 3, 2012) (not designated for publication) (search of cell phone was not'incident to arrest When search took place approximately one to-two hours alter arrest); _United States v. Lasalle, 2007 WL 1390820, *7 (D. Hawaii May 9, 2007) (not designated for publication) (search of cell phone was not incident to arrest where search was conducted “somewhere between two hours and fifteen minutes to three hours and forty-five minutes” after arrest); United States v. Park, 2007 WL 1521573, *7 (N.D. Cal. May 23, 2007) (not designated for publication) (search of cell phone was not incident to arrest when search took place ninety minutes after arrest); see also Uni'ted States v. Chadwick, 433 U.S. 1, 15 (1977) (concluding that search of ` locked trunk ninety minutes after an arrest was too remote in time and place to be incident to the arrest); see generally, Jana L. Knott, ls There an App‘For That? Reexamining the Doctrine of Search Incident to Lawful Arrest in the Context of Cell Phones, 35 OKLA. CITY L. REV. 445, 445-47 (2010). ' - ' 31 United States v. Robinson, 414 U.S. 218, 224-26 (1973) (citing Chimel v. California, 395 U.S. 752, 762-63 (1969) (of`hcer Who had made full-custody arrest for driving a car without a permit could conduct warrantless search of person as part of that arrest; when officer found crumpled cigarette pack in arrestee’s pocket, he could seize the heroin capsules_that he found Within that pack). Granville Page 15 . v officers to seize weapons or other things which might be used to assault on officer or effect an escape, and (2) the need to prevent the loss or destruction of evidence.32 A search is incident to arrest only if it isv “substantially contemporaneous” with the arrest and is confined to the area within the immediate control of the arrestee.33 T.hus, a search incident to arrest cannot normally be justified if the “‘search is remote in time-or place from the arrest’ . . . or no exigency exists.”34 In United States v. Edwards,35 the Supreme Court recognized an exception .to the “substantially contemporaneous” search-incident-to-arrest doctrine and upheld a warrantless search of an arrestee’s clothes at the police station ten hours after the arrest.36 In Edwards, the police took the arrestee’s clothes to look for evidence of paint chips that would match samples that had been taken from the window of the post office during the attempted burglary.37 The police waited these ten hours because “it was late at night” and they had no 32 Id. 33 Vale v. Louisiana, 399 U.S. 30, 33 (1970). 34 United States v. Chadwick, 433 U.S. 1, 15 (1977); see also Schlossberg v. Solesbee, 844 vF. Supp.2d 1163, 1167-71 (D. Or. 2012) (declining to distinguish between electronic devices such as cell phones, digital cameras, and laptops, and holding that 'a warrantless search of the contents of a digital camera as a search incident to arrest violated the Fourth Amendment); United States v. LaSalle, No. 07-00032 SOM, 2007 WL 1390820, *7 (D. Hawaii May 9, 2007) (not designated for publication) (because police officer did not search cell phone contemporaneously with defendant’s arrest, the “search incident to arrest” doctrine did not apply; motion to suppress granted). 35 415 U.s. 800 (1974)._ 36 Id. at 805. 37 Id. at 801-02. Granville Page 16 other clothes forEdwards to wear; “it would certainly have been unreasonable for the police to have stripped [Edwards] of his clothing and left him exposed in his cell throughout the night.”38 The Court cautioned, however, that in upholding this particular search and seizure of an arrestee’s clothing, it had “not conclud[ed] that the Warrant Clause of the Fourth Amendment is never applicable to postarrest seizures of the effects of an arrestee.”39 We relied upon the Edwards ruling and rationale in Oles v. State,40 in holding that the warrantless search of an arrestee’s clothing was not unlawful because the defendant failed to establish a subjective and reasonable expectation of privacy in the clothing he wore when arrested and that had been placed in the jail property room.41 We explained that “arrestees _ do retain some level of privacy interest in the personal effects or belongings taken from them incident to their arrest,”42 but that there is a lesser subjective expectation of privacy and a 38 Id. at 805 . 39 Id. at 808; see id. at n.9 (“Holding the Warrant Clause inapplicable in the circumstances present here does not leave law enforcement officials subject to no restraints.”) (emphasis added). 4° 993 S.W.2d 103 (Tex. Crim. App. 1999). We noted the distinctions between the situation 1in»Oles and that in Edwards, including the facts that (l) Oles’s clothes didn’t show any obvious signs of blood, whereas the clothes in Edwards were “blood-s`pattered”; '(2) Oles ’s clothes were taken eight days after his arrest, whereas the police took Edwards’s clothes just ten hours alter his arrest; (3) there was clear probable cause to. search Edwards’s clothing, Whereas there was not probable cause to believe that Oles’s clothes contained bloodstain evidence relevant to the murder until the clothes had actually been tested. Based upon those distinction, we concluded that “although Edwards and Marquez [v. State, 725 S.W.2d 217 -(Tex. Crim. App. 1987)] provide the foundation for today’s ' ruling, clearly they are not dispositive of the issues presented in the instant case.” Id. at 107-08_. “14.:31 103-11. _ 41 Id. sat 103. Granville Page 17 lesser societal expectation of privacy ~in inventoried propei‘ty.43 Of course, there is a vast difference between the privacy interests'and expectations in clothing that one is wearing when arrested and certain other possessions that one might have with them. Indeed, just a few years after deciding Edwards, the Supreme Court addressed the scenario of a 200-pound footlocker that had been seized when the defendant was arrested leaving a train station, but that was not searched until 90 minutes later and was no longer in the arrestee’s possession.44 The Court held that the evidence obtained from that search must be suppressed because the footlocker “was property not immediately associated with the arrestee” at the time of the search. [O]nce law enforcement officers have reduced luggage or other personal property not immediately associated with the person of the arrestee to their exclusive control, and there is no longer any danger that the arrestee might gain access to the property to seize a weapon or destroy evidence, a search of that property is no longer incident to the arrest.45 In such circumstances, the police may legitimately “seize” the property and hold it while they t 46 seek a search warran But they may'not embark upon a general, evidence-gathering search, 43 Id. at 109-10. 44 United States .v. 'Chadwick, 433'U.S. l, 4 (1977), overruled on other grounds by Cali omia v. Acevedo, 500 U.S. 565 (1991); see United States v. Jhan, 74 F.3d 537, 542 n.2 (4th Cir. 1996) (Chadwick has been overruled only as to closed containers seized horn inside an automobile). 45 Chadwick, 433\U.S. at 15. See also Iliornton v. United States, 541 U.S. 615, 632 (2004) (Scalia, J., concurring) (“When officer safety or imminent evidence concealment or destruction is at issue, officers should not have to make fine judgments in the heat of the moment. But in the context of a general evidence-gathering search, the state interests that might justify any overbreadth are far less compelling.”). ` s 46 Chadwick,-433 U.S. at 13. Granville Page 18 especially of a cell phone which contains “much more personal information . than could ever fit in a wallet, address book, briefcase, or any of the other traditional containers that the government has invoked.”47 With that general background, we turn to the present case. III. In this case, the court of appeals summarized its holding and reasoning as follows: Due-to the potential invasiveness of the search, Granville’s status as a pretrial detainee, the fact that his stay in jail for a class C misdemeanor would be of short duration, the utter lack of any nexus between the cell phone and the crime for which appellant was jailed, and the lack of evidence suggesting that the phone and its contents posed any risk to the jail’s penalogical interest, we conclude that society Would recognize his continued, and reasonable, privacy interest in the instrument despite his temporary detention.48 The SPA argues that the court of appeals erred because an arrestee “has no legitimate expectation of privacy in the personal effects immediately associated with his person at the ' time of lawful arrest.”49 In the SPA’s view, Oles was “incorrect to hold that expectations of privacy in jail are only diminished-rather than nonexistent-and the court of appeals’[s] decision results directly from that holding and the unnecessary analysis performed to decide 47 United States v. Wurie, 728 F.3d l, 9 (lst Cir. 2013) (“Just as customs officers in the early colonies could use writs of assistance to rummage through homes and warehouses, without any showing of probable cause'linked to a- particular place or item sought, the government’s proposed rule would give law enforcement automatic access to ‘a virtual warehouse’ of an individual’s ‘most intimate communications and photographs without probable cause’ if .theindividual is subject to a custodial arrest, even for something as minor as a traffic violation.’_’). 2 48 Granville, 373 S.W.3d at 225. 49 sPA’s Briefat 3.. \;~‘§%;3\§ ~§`q‘~§ &§gi// " s“x\v er %/ §§' §/ /@{/»//"'!»’/lm J/%(j£l%/Vn§_/ 21st u;`;.:§i`r /7~/£/»/ "c¢',,,,’) ,JGwlle Page 19 W"/‘ 2 Mi';? \ -§ . ~ 4 <" raw 4 how 94¢:¢;0 112/w /'2. » y § f that case. ”3° According to the SPA, when §cifizen is arrested for any offense, c§1'1%22;$ falllli 45»_@#"'§ _/ 92“3£~‘§§§¢§ t y ‘. f " r § 322 § /1‘!.4 `!F\<`f:;’ "\¢ § l§?`B%ito wear a seat belt,5l verything that the person possessed at the time of that arrest-purse, fail v /'~` \- i s `t\ ` 22 Y."x \. "\ 233 222 §§ il §§ briefcase» laPtOP ¢Omputer, cell phone, medical records, IRS returns, trade secret 33§/ `a" `*~l. 2 2 2 ;§:` §§ §gx§-Y ‘2;;*,')~`<;¢ \§1 ;_;~"\n <, information-is subject to a warrantless search because all of that citizen’ s privacy interests 2 § iii \\ have completely disappeared We cannot agree with this reasoning \ First, the SPA fails to distinguish between a search incident to arrest and a search of § faa 1 § § an arrestee’ s personal property that has already been inventoried and placed in storage/As F‘»‘L 421 _ nn w__ »\W' » ' ' -~==; &1.11 l _ rt the Supreme Court recently explained in Arizona v. Gant,32 the search incident to an arrest § With * W) §§ §¥l exception to the warrant requirement is premised upon promoting officer safety and ii 2929 il rt preventing the destruction of evidence relating to the crime for-_which the person was arrested.33 Although Gant involved the search of a car, courts have‘discussed its application to other situations in which “the item searched is removed from the suspect’s control between 3 3° Id. at 3-4. 31 See,. e.g., Atwater v. Lago Vista, 532 U.S. 318, 354-55 (2001) (ofhcers could arrest and j ail mother who, along with her children, was not wearing a seat belt in her.truck; officers at jail made her remove her shoes, jewelry, and eyeglasses, and detained her in a jail cell). 32 556 U.S. 332 (2009). ~ 33 Id. at 351. ln Gant, police officers arrested the defendant for driving with a suspended license, handcuffed him, and locked him in the back of a patrol car. Id. at 335. Then the police searched his car and found cocaine in the pocket of a jacket that had been lying in the back seat. The Supreme Court held that this search was unlawful under the “search incident to arrest” exception becausc,'under that exception, officers may search the passenger compartment of a car “only if the arrestee is within reaching distance of the passenger compartment at the time of the search or if it is reasonable to believe that the vehicle contains evidence of the offense of arrest.” Id. at 351. Granville Page 20 the time of his arrest and the time of the search.”54 Some courts have applied Gant in rejecting'the lawfulness of a search of the contents of an arrestee’s cell phone.55 ' 54 United States -v. Shakir, 616 F.3d 315, 318 (3d Cir. 2010) (applying Gant to search of a gym bag that was lying at arrestee’s feet when he was arrested and handcuff`ed; upholding search because defendant Was still close to gym bag, was not fully secure, and handcuffs are not fail-safe in preventing dangerous acts by an arrestee); see also United States v. Perdoma, 621 F.3d 745 , 75 0- 52 (8th Cir. 2010) (applying Gant principles to search incident to arrest in bus terminal). 55 See United States v. Wurie, 728 F.3d 1, 3 (lst Cir. 2013), cert. granted, 82 U.S.L.W. 3104 (U.S. Jan. l_7, 2014) (No. 13-212) (citing Gant .and holding_thatlthe_search:incident:to:anest exception does not authorize the warrantless search of data on a cell phone seized from an arrestee’s _ person, bem-gb-\'/-€r'~’nment has not convinced us that such a search is ever necessary to protect arresting officers or preserve destructible evidence.”); United States v. DiMarco, No. 12 CR 205 (RPP), 2013 WL 444764,*8 & l 1-12 (S.D.N.Y. Feb. 5, 2013) (not designated for publication) (citing _ Gant and concluding that warrantless search of arrestee’s cell phone more than six hours after defendant’s arrest was unlawful; “delayed search” was not incident to arrest nor supported by the ofiicer-saf`ety and evidence-protection justifications of that exception); Unz'tea' States v. Dixon, __ F. Supp.2d __, 2013 WL 6055396, *3 (N.D. Ga. 2013) (citing Gant and concluding that agent’s action of taking arrestee’s cell phone back to his office and searching it was not a search incident to` arrest and was unlawful; motion to suppress granted); Um'ted States v. Brown, No. 12-79-KKC, 2013 WL l 185223, *3 (E.D. Ky. March 20, 2013) (not designated for publication) (citing Gant and upholding initial, brief search of cell phone that was immediately incident to arrest because defendant was “manipulating” cell phone at time ofiicers ordered him outoftruck; defendant could have been warning confederate to escape or requesting assistance from him, or he could have been destroying evidence on cell phone; but once officers determined that “no helpful information was readily available” on arrestee’s phone, officers should have ceased search of phone’s “contact list” and sought a warrant); Anthony v. Oliva, No. ED CV 12-1369-FMO, 2013 WL 1127104, *6-7 (C.D. Cal. Jan. 29, 2013) (not designated for publication) (citing Gant and holding that civil-rights plaintiff had pled a cause of action against police department when officers allegedly wentbeyond legitimate purpose of search incident to arrest and began to ‘Flook” and “navigate” through cell phone); State v. Cooper, No. 66-CR-1 1-2228, 2013 WL 264430, *5 (Minn. Ct. App. Jan. 14, 2013) (not designated ' for publication) (citing Gant and upholding trial court’s suppression of search of cell phone made long after officer had seized it from arrestee, who could not have retrieved it); see also State v. Smith, 920 N.E.2d 949, 955 (Ohio 2009) _(noting, in a case involving the warrantless search of an»arrestee’s cell phone incident to arrest, that: “Once the cell phone -is in police custody, the state has satisfied its immediate interest in collecting and preserving evidence and can take preventive steps to ensure that the data found on the phone are neither lost nor erased. But_v because a person has a high expectation of privacy in a cell phone’s contents, police must then obtain a warrant before intruding into the phone’s contents.”). ‘ v ` ‘ _ Granville Page 21 Second, the SPA makes the false analogy that, if a jail detainee does not have any privacy rights in his jail cell,56 he therefore does not have any privacy rights in his personal property that is being safeguarded in the jail property room. The assumption that prisoners or pretrial detainees are without any Fourth Amendment rights is not supported by the ~w~~,_pw______~_»"___`"__ /___‘4_ -._-.4..-.»....».,. , , _..-. 4 ...~_-»~~`_._.-`,., ""°"" §upreme Court. §§ a unanimous Court noted in 1974: .._.~`.,~_W ___! d_M_,...,.-_»--- m..~_~_`__` `__`___ _Lawful imprisonment necessarily makes unavailable many rights and \ privileges of the ordinary citizen, a “retraction justified by the considerations \§@ underlying our penal system.”. . . But though his rights may be diminished by ’5 the needs and exigencies of the institutional environment, _a prisoner is not n wholly stripped of constitutional protections when he is imprisoned for crime. § There is § iron curtain drawn between the Constitution and the prisons of this ’ country./ - j Oles correctly held that jail detainees enjoy 5a diminished expectation of privacy, not that a detainee has absolutely no reasonable expectation of privacy.58 Furthermore, the security 55 See Hu¢ls'on v. Palmer, 468 U.S. 5 17, 527-36 (1973) (holding “that the Fourth Amendment ' has no applicability to a prison cell” because of the needs of institutional security; “A right of privacy ' in traditional Fourth Amendment terms is fundamentally incompatible with the close and continued surveillance of` inmates and their cells required to ensure institutional security and internal order.”).' §§ . § 57 '} ol]j"v. 'McDonnell, 418 U.S. 539, 555-56 (1974) (citation omitted). 158 Oles, 993 S.W.2d at 108§ see Bell v. Wolfish, 441 U.S. 520, 556-57 (1979) (“It may well be argued that a person confined in a detention facility has no reasonable expectation of privacy with respect to his room or cell and that therefore the Fourth Amendment provides no protection for such a person. . . . ln any case, given the realities of institutional confinement, any reasonable expectation of privacy that a detainee retained necessarilywould be of a diminished scope. Assuming, arguendo, that a pretrial detainee retains such a diminished expectation of privacy after commitment to a custodial facility, we nonetheless find that the room-search rule does not violate the Fourth Amendment.”); see also UnitedStates v. Cohen, 796 F.2d 20, 23~24 (2d.Cir. 1986) (detainee “retains an expectation of privacy within his cell sufficient to challenge the investigatory search ordered by the prosecutor” to get evidence to aid them “in laying additional indictments against a detainee”; search was unrelated to jail-security concerns); Lowe v. State, 416 S.,E.Zd 750, 752 (Ga. Ct. App. 1999) (pretrial detainee had reasonable expectation of privacy in papers in his cell containing his Granville Page 22 rationale and “needs of the institution” that underpin the diminished expectation of privacy in a jail cell is not equally applicable to property that jailers have already inventoried and are safeguarding in the property room.59 Third, the SPA contends that, under Oles, any search of any property in the custody of jail officials is permissible. We disagree with that absolutist position and agree with the court of appeals that the object of the search makes all the difference between this situation and that in Oles.60 There, the police seized and tested a pair of pants and shoes for blood. We noted that the first question was “whether an arrestee retains any expectation of privacy in clothing lawfully taken and inventoried by police incident to an arrest.”61 After analyzing various precedent, we concluded that “arrestees do retain some level of privacy interest in the personal effects or belongings taken from them incident to their arrest,” but that handwriting because search was unrelated to needs of jail and was an attempt to find evidence to bolster State’s case); State v. Neely, 462 N.W.Zd 105, 112 (Neb. 1990) (pretrial detainee retained reasonable expectation of privacy in her luggage while it remained in the jail’s locked inventory). 59 S'ee_, e.g., Illinois v. Lafayette, 462 U.S. 640, 648 (1983) (as part of routine procedure incident to jailing an arrested person, officers may “search any container or article in.[police]' possession, in accordance with established inventory procedures.”; emphasizing that inventory search must be conducted pursuant to established procedures); Florida v. Wells-, 495 U.S. l, 4 (1990) (inventory searches must be conducted pursuant to established inventory procedures, so that they do not become “a' ruse for a general rummaging in order to discover incriminating evidence.”). 6° ln OIe"s, the defendant was'initially` detained at the police station as a witness to a murder. When oliicers discovered that he had an outstanding felony warrant, they arrested him, then inventoried and stored his ":cl'othing.`.. ./Eiglit_"'daysu_!l_a_ter, while the defendant Was still in jail, an investigator took his clothing t_o the medical`»`examiner-"if"see if he. could find any blood. A serologist" discovered blood on the ;defend°a'n't?s’shoes'tl‘rat"iriatched the victim’_s blood. 993 S.W.2d at 105`. 61 Id. at-lOG§"" Granville Page 23 [r]eviewing this search under a totality of the circumstances, there is virtually no evidence that [defendant] harbored a subjective expectation of privacy in his clothing that was in the custody of the police, nor is there evidence that society would deem such a belief reasonable under these circumstances [Defendant] has failed to meet his burden of proof in establishing a legitimate expectation of privacy in his clothing,62 'l`hat is the general doctrine concerning privacy interests in clothing, but clothing does not contain private banking or medical information and records; it does not contain highly personal emails, texts, photographs, videos, or access to a wide variety of other data about the individual citizen, his friends and family. Searching a person’s cell phone is like searching his home desk, computer, bank vault, and medicine cabinet all at once. There is no doubt that the Fourth Amendment protects the subjective and reasonable privacy interest of citizens in their homes and in their personal “papers and effects.” Conversely, clothing, - like the shoes seized and tested in 01es, is displayed every time a citizen walks~out into the world. As_ now-Presiding Judge Keller noted in her concurrence in Oles, The outside of a person’s shoes while being worn are constantly exposed to the public. When [_the defendant] Was arrested and incarcerated, the police obtained lawful possession of his shoes. Given that the outside of the shoes _62 Id. at 1 lO-l 1. In` Oles, we did not state, or even suggest, that a defendant would never have , a reasonable expectation of privacy in any item that was in the custody of the police. Suppose, for example, that the officer in Oles had taken a sealed personal letter out of the defendant’s clothes, opened it, and read it. At least one court has said that the Fourth Amendment would not permit that officer to open and read someone’s else’s mail without a warrant. See United States v. Wall, No. 08- 60016-CR, 2008 WL 5381412, *3 (S.D. Fla. 2008) (not designated for publication) (warrantless search of cell phone made during jail booking was improper; stating that “searching through information stored on a cell phone is analogous to a search of a sealed letter, which requires a warrant.”) (citing United States v. Jacobson, 466 U.S_. 109, 114 (1984) (“Letters and other sealed packages/are in the general class of effects in which the public at large has a legitimate expectation of privacy; warrantless search of such effects are presumptively unreasonable.”). Granville Page 24 are constantly exposed to the public, appellant could not have a reasonable expectation of privacy against a visual inspection of the shoes, on the outsid'e, with the naked eye.63 ' ` Similarly, here, the ofticerscould have reasonably inspected the outside of appellant’s cell phone; they could have tested it for fingerprints or DNA material because portions of the cell phone are routinely exposed to the public. But we do not think that _a citizen, including appellant, has lost his'expectation of privacy in the contents of his cell phone merely because l he has been arrested and his cell phone is in the custody of police for safekeeping. Although some courts have held that a person does not have a reasonable expectation of privacy in the contents of his cell phone when he is subjected to a search incident to arrest,64 citizens themselves have become increasingly concerned about privacy expectations 63 Oles, 993 S.W.2d at 111 (Keller, J., concurring). Judge Keller went on to note that, because the police could also legitimately handle and store the shoes, “even the inside of the shoes would be exposed to the ofticers,” so that the defendant did not have a reasonable expectation of privacy in either the inside or outside of the shoes. Id. ‘ 64 See, e.g.,United States v. Flores-Lopez, 670 F.3d 803, 810 (7th Cir. 2012) (upholding search incident to arrest of cell phone to obtain its phone number but questioning whether a more invasive search would be permissible); United States v. Finley, 477 F.3d250, 259-60 (5th Cir. ~2007;) (stating that a cell phone is just another “container” and upholding its search as incident to arrest); People v. Diaz, 244 P.3d 501, 506-08 (Cal. 201 1) (upholding search of ~cell phone 90 minutes aRer the arrest of narcotics defendant; concluding that a search of an item “immediately associated with the person” at the time of arrest is valid because of “reduced expectations of privacy caused by the arrest,” not the nature of the item seized). ln Diaz, the court recognized that it was contributing to a deepening split between state and federal courts on whether a person has a reasonable expectation of privacy in\ the contents of his cell phone, but left it to the United States Supreme Court to decide if modern technology makes a difference to the traditional ability to search the contents of containers as part of an otherwise legitimate search incident to arrest, z The citizens of Califor`nia disagreed with the California Supreme Court’s holding, and the California Legislature promptly passed a bill requiring police to obtain a search warrant before searching the contents of any ‘;‘fportable electronic devices,’ including cell phones.” Supplemental Brief~in Opposition, Diaz v. California, 132 S;Ct. 94 v(201 1) (No. 10-1231), 2011 WL'4366007, at Granville Page 25 and their cell phones,65 even before the current NSA phone controversy.66 *l(describing Senate Bill 914 (2011)). After the state’s attorneys brought that legislation to the f attention of the United States Supreme Court and urged the Court to deny Diaz ’s writ of;certiorari,` the Court did so, and, one week later, California’s governor vetoed the “cell phone privacy” bill, stating that the “courts are better suited to resolve the complex and case-specific issues relating to constitutional search-and-seizures protections.’~’ Letter from EdmundG. Brown Jr., Governor, to Members of the California State Senate (Oct. 9, 2011), available at http://www.leginfo.ca.gov/pub/l1-lZ/bill/sen/sb_0901-0950/sb_914__vt_2011 1009.html. See also Petition for Certiorari at 6, Riley v. California, No. 13-132,~_ available at http://Www.volokh.com/wp-content/uploads/ 20 1 3/08/Riley-cert-petition-final-1 .pdf. 165 See, e.g., United r` 8 St Cir. 2013), cert. granted 82 U.S.L.W. 3104 (U.S. Jan. 17, 2014) (No. 13-212) (quoting Maeve Duggan & Lee Rainie, Pew Intemet and _ American Life Project, Privacy and Data Marragement on Mobile Devices (Sre_ptnjwz£_l£)) (publishing.poll survey results that “[m] ore than-half of mobile app users have uninstalled or avoided cell phone apps because of privacy concerns,” and “[n]early one third of cell owners have experienced a lost or stolen phone, and 12% have had another person access the contents of their phone in a way that made them feel their privacy was invaded”; “[t]he rise of the smartphone has dramatically altered the relationship between cell owners and their phones when it comes to monitoring and safeguarding their personal information,” said Aaron Smith, a Research Associate with the Project and report co-author. “The wealth of intimate details stored on smartphones makes them akin to, the personal diaries of the past_-the information they contain is hard to replace if lost, and potentially embarrassing in the wrong hands.”), available at http://www.pewinternet. org/Press-Releases/20 l 2/Mobile-Privacy. aspx. 66 Compare Klayman`v. Obama, ___ F.Supp.2d _, 2013 WL 6571596, * 20 (D.D.C. Dec. 16, 2013) (citing numerous`internet data compilations concerning the ubiquity of cell phones and other technological devices and noting, “P»ut simply, people in-2013 have an entirely different relationship with phones than they did thirty-four years ago. As a result, people make calls and send _ 5 text messages now that they would not (really, could not ) have made or sent back when” earlier search and seizure cases were decided). Judge Leon explained, “Records that once would have revealed a few scattered tiles.of information about a person now reveal an entire mosaic_a vibrant and constantly updating picture of the person’s life. Whereas some may assume that these cultural changes will force people to reconcile themselves to an inevitable diminution of privacy that new technology entails, I think it is more likely that these trends have resulted in a greater expectation of privacy and a recognition that society views that expectation as reasonable.” Id. at 21 & n. 59 (noting, “Public opinion polls bear this out. See, e.g., Associated Press, 9/]1 Anm`versary: PollFinds Public Doubts Growing on Federal Surveillance, Privacy, Hous. :Chron., Sept. 11, 2013, at A6 (“Some 56 percent oppose the.NSA’s collection of telephone records for future investigations even though they do not include actual conversations.”)), with ACL Uv. Clapper, _ F. Supp.2d _, 2013 WL 6819708 *20-22 (S.D.N.Y. Dec. 27, 2013) (NSA’s collection of _“bulk telephony metadata” did not violate Fourth Amendment principles; “Some ponder the ubiquity of cellular telephones and how Granville Page 26 In sum, we conclude, as did the court of appeals, that a cell phone is not like a pair of pants or a shoe. Given modern technology and the incredible amount of personal information stored and accessible on a cell phone, we hold that a citizen does not lose his reasonable expectation of privacy in the contents of his cell phone merely because that cell phone is ' being stored in a jail property room. Officer Harrellw§p_u_l`d have seized appellant’s phone and -..___,_._.__..__.... \._ ”.._.._ .» --'--~~“-"~~~- __..~.»-¢\.r............ ._..._..,.._~..,..r ......... ._. held it whdemhne\_$o”uvg"l}t__§*§§§§_§lvl__M“;§I'M£§:Df,.lg;!j.l:;f.;,..§m;.;gwith,.,probable caus<; he could not w “agtiyate.and`s*e,arch¢thecontents¢of.an.in!entorie_c@ellular phone” without one. We answer 1 “No” the SPA ’s so_l_e question for review, and we affirm the judgment of the court of appeals. ¢,=--.=»-..~'»~.-~»-..-.~r Delivered: February 26, 2014 Publish» . - subscribers’ relationships with their telephones have evolved since Smith, While people may ‘have an entirely different relationship with telephones than they did thirty-four years ago,’ this Court observes that their relationship with their telecommunications providers has not changed and is just as frustrating Telephones have far more versatility now than when Smith was decided, but this case only concerns their use as telephones. The fact that there are more calls placed does not undermine the Supreme Court’s finding that a person has no subjective expectation of privacy _in telephony ' metadata.”) (citation to Klay_man omitted). § s ;; xr"¢ ¢»." E‘Zit al v: ..'< -r;\\.,~_i,~ 1»'., ` '¢1"»“~ “\~' ;x"`_> ’.~`\x"' … t '. 5,@':-§ §'~‘»'=`" '\ ' n'_. that ' '\X`M'/`\ a a;':.. l :=l"’~.a a .,~» ;~~ .\,- 1<, »r.~,,vr?»i'. run srif_=s - :‘§ ,..`_ `_ L. rn. ` :`¢:¢n».,s -,i§v>~.¢».,. ,» f »': '. \\\ »' \'.a~, . t ~ , ,Y‘ .» ,\~»..` `-.‘ .~,\ ~ " > ` ( ` ` ‘ »» ~ » .. , . "- "' ' '! v ' - z . " ~ ‘ ` ' ~'»' ' 5 _ y ~ , ft , , ._r ' 4 - , .-,_».W...u»`»~ ,,:_. ~ 4 ' . ~ ' ~. . ' , l l_,.l.;h.v.r -_<" v‘.-_ ',e¢¢ ‘ . ` ' . v 1 ` ' ’ 5 §/év/ b 5 §§ //*" /')77 , ,_M_,_a~_._a…. __ __-__-._a_____, _ __~a 1/’_,4____ /5_ 777 %/Q/ZZ%/»/ §§ /}?”’-5 4-/.;44.47“ //~7; //»1;711.»-4/\' __._, `\ \~>"" b j W/Y/’%f/ f""`w 425 //'55/*/¢£4’._ /"°*W /I/W /?/°%t/"? ,4//£;54,`>- 4/;""7' 447 -~,;4/;,{,41,‘1}? 453 355 f/%/§ /7/144/////\/4 //1/ /'7764: 647-411 444 1444/777 ./B/¢/ 444 44774/ 47 /M/@z//‘ 7977 141/477 447 4244/447 47447 4719/ 411/444 477 544/441 775/1444 §§ :§:;-»* ay;¢¢p {/)75,,,! .4,1-,'_1,-1~![1<;.:,&§;,£ v \.y fe . //71744¢" @L/) ///’5’)/*/£/?¢ 547'5/`/152 pba!7; ¢3//// 1147 a l 5/“//,,17. 74)717;;4 /~55459/4'1< /Z’P 1///71<§ 4274»5474>7’ ?£47.' 7?{%'/44~ 1444 474 4744/11 W 14ij4 %A/J/ 144 744/44 § 72/4 445 774/444 793 §17;:./'144: 1‘7~.7;'. 447/742 1~,/1_/11:4///14/1,/ §;5§/ 7:}/4§?4/1/ 7747%777 417 4@4174"" 442 7221:4'1§1 /34:7/" /)é’ 7%7!a /// ,// i/ 1114£1/41_ /%21' O,L(a /4//'/‘?<` Q,;,<:~»/ /,1 abt/54 LQPQgA/C',¢P .,.;/ / "J’”"¢ 7 17// '“ 674 'Z>" 723/7a // ,;)/~ ". /5515/ < 7.~;- _,~,-;4 1""4?;:1~1~ 7.’.~1:".§`". /-5/£4‘ /<1€,47’17""/57/ 7444»71/1. /,1 75 »1‘>»’ //f~/<’“’ r, 441/741~' 4:;7*7:,:-- fl /` , , ,.. ' ,.'_,4~ 1 / éz'_‘,/_'_l`.'.:;/ 55 4‘.;,1~', ;~: 5'”5'/;5 //x/ /1")"{5 .'3' / \.J ¢7~'/ .:1. /7§;// 441/772 771 ~7 1457 47 ”’ /<’L" i/*'“ /~/' /'/1,11;,7./1"2¢47;€1§ i.“~"'~',f41§%1‘""1444.244177*;€7:'5“ 7 ,.1@;§‘3,7?4:.“14&1?:? T-'?‘.'r';€¢¢;."'?’ ,,7,.~441/455 /’}¢,47_4“4» 77 :__ . , \l »' 5:/§' ¢7¢--/ 41¢»»'177,47:7' f‘<»fw" c. ‘744.114 1575 fri)§a€~i" "’“7 '*' -z" .;:»717- 7 c 5 555 65“7"5'*"7-5'1»;' r;' 44 4:‘~3;~: 1 . 1 f _` 11 ` " 1 11 »a-»""' 4 . , ,_,1 _,, 1 ‘ ,,»~ _r _, *'5 , ~ . 1 '»» 55"“` 741/15411’4£¢1>.'1&1€?§ ¢'-1'5"€_»7? :;114’~;/!47 /55}¢@ 1144 .//>Y-/»~"~»~'¢»»‘”\f’“ 4 ~- - .» Z5:5 543 149/17 1177 /15515/55 ` ` 551.j £555;_'-,). ,`5";€54' _______ m /1'7.7.‘55><:1.1'»75 475 ’7“ 1"7”7<77 L¢///""/"/*/-/' 45`5;§ »~7*515451‘7'1:17" 415 / 1.441/!'147'» Z. /1;37: `/ //~'// _____/ 414/;: 4411/77 647/1542 - 45',45,4,777 21 414/71a /'/'/,744 444 744-113 ram/7 7 ’ ‘5 §£7'/1'/'*'.:/5 1?55;'5'55'/[5 \m£_id 15 ‘5:$‘5,§'/§&1¢`[:5’/0{,),0/\//¥{ xi 443 ‘P~_. _'___ `-5 zwf \ _\-... F__:/,/- ‘) ’\/. 1 - ........ / 555 §"'\_?'»’4/5¢5":¢4~"( //l;'ig; , '-J_r’ 5 f 4 ' : air bill 751/414 !M~' / 05 f;/ 214 /,5/`\,/ /75.€/}5’5!£/.45$,.7&{:4_{::55 3{:1:¥‘ V T / ,_ / 134/‘/ " 4 5 5 5744€9155.555:“5’ \5 1' 55 4§/ ' 1547 ~ 751 t;d’ /?55'5'{‘5"' p/}P.’z "`7 } "‘71/4‘5` §1_ 5555)5`;<7{5)\"1”\5'5555 7 &(,LZU./ (51555:’5!5" ,s;,,g_/ ";“`5`5,35;? f’,"£_ @}'s'!{ 5555!§ 535 ‘\V./a `~"' k_'}\x\’/'J " "‘55 f _. . 1 ` '5 5'/l F/i//ll.~¢rrl,/DYl nr.~. -1 \, \\/ Xanax Addiction Side Effe_cts, Withdrawals, Symptoms & Signs - Park Ro... E)(H”HZVI/ D ZBELOUJ >'E- l\)E$<#/p,@rmm§ 0 http://Www.parkroyalhospital.com/addiction/prescription-drugs/xanaX/signs... l\/lounting financial problems |nability to focus upon tasks at hand Slurred speech 5 l_o\'/vered libido ' Physica| symptoms: Requiring more and greater amounts ot Xanax to achieve the same pleasurable 1feeHngs - Physica| dependence upon the drug Withdrawal symptoms if Xanax is decreased or discontinued 5 E) _"_;,j€*&i- ""~"*“*i ': ~ Prescription Drugs- ~ Effects, Signs & Synnptoms ~ Xanax l ' Ef.fects, Signs & _ Symptorns» - \/icodin `_ - Effects, Signs & Syrnptoms` . '- Oxycoclone - Effects, Signs & ~ Symptoms Afiiliations & Recognition Joint` Co_rnmission Gold Seal_'of Approvai The Jas_on §' Foundation http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/sigris'.'.". Acldiction 4 Symptoms,_ Causes, ' Si?g{ns & Si`de Effects coNTENTs ` Statistics Co»Occurr.ina, Disorders Causes ` §\/I'i’ip:i`.(>i"t'i$iv Effe:ts of Xanax ./~`>.b;zse Effects of \/'\/'iti'idravi/ai Xanax, the trade name of a drug called ”aiprazolam," is a benzodiazepine medication that is prescribed by doctors for short-term management of anxiety or sleep disorders. Xanax produces its calming effects by suppressing the inhibitory"receptors in the brain and f central nervous system to decrease the _, abnormal excitement in the brain that leads to anxiety symptoms. Whiie most ' individuals Who take Xanax follow the doctor's instructions, taking the drug at the proper time at the proper dose and discontinuing usage as indicated. Unfortunately for some, Xanax can become addicting if taken in large quantities over a long period of time. ll ll Known on the street as "bars, planl B'ipolar disorder ° 'Schizophrenia ° Stimulant abuse Causes Addiction is thought to be a disease caused by multiple factors working together. Causes for Xanax addiction may include:v . Genetic:_lndividuals who have a relative who struggles with addiction to Xanax or other substances are more likely to n develop an addiction to Xanax themselves While nota definitive indicator, there is absolutely a greater risk among family members [BF , _\ =iiemisi:z’;: Xanax works by _ decreasing the excitement transmitted via neurotransmitters in the brain. individuals who have an inborn tendency toward increased levels of these neurotransmitters may seek ways to decrease this excitement and may self-medicate with Xanax. Environmenta|: individuals who are born into an unstable home environ'ment, especially if substance abuse is modeled by a parent or guardian, are a_t greater risks for developing substance abuse later in |ife. al: As addiction rarely occurs without the presence of another mental http://Www.parkroyalhospital.ciom/addiction/prescription-drugS/Xanax/Signs. 1 1/1/2014 Xanax Addiction Side'Effeots, Withdrawals, Syrnptoms & Signs - Park Ro... Page 6 of 9 illness/many individuals who struggle with undertreated or undiagnosed mental illnesses may turn to drugs or alcohol in order to manage the symptoms of their disorder. Symptoms Symptoms of Xanax abuse and addiction will vary among individuals depending upon individual genetic makeup, level of . dependence length of addiction, and amount used. Common symptoms of Xanax addiction include the following: ?;“'“'~:liw, :B"I,¢.~¢,-,.‘ ,_mp_t@_,_i§s: lncreased_anxiety Depression 0 Mood swings __ lrritability Behavioral_ symptoms: Doctor shopping Appearing drowsy Lying or stealing to further Xanax habit Stealing or borrowing Xanax from friends and loved ones ,\ Hiding stashes of Xanax in various places around the home, office, and car "Losing" multiple prescriptions for Xanax Lying about amount used Withdrawing from previously enjoyable activities Decline in academic or occupational functioning ¢ Strained interpersonal relationships i.egal~ problems http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/signs. .. 1 1/1/2014