_ __ CA¢/S'éj' /{/0’ DB'/ff2 C`/_€ 83 MMK 03

0”7§”. i//zz'//§ ' -

70 Fé§,¢/,,.¢ 5 /;105'057 ‘ - . . ' . '\
./y/L»}”/'" é/.;/.j/ /J ;_/y,z»' dé"”~~,/,///»K//»¢,q,<g 6 ' j `:- .' ‘ '

`,?00 110/2370 §"Y*?'”’;:Af,,y@j 572>"“. ;>;¢»__/ 4 d t

/70 301 /9/3?§,_ b v v `

\

 

 

 

 

/..)' 010 ,'¢'¢Y~'~W)v ‘/,:;/;r

12 _ ~ 1
,-2:“/¢»__,§-,.;¢,/5€,.\.,>»¢ ,_'3;; l »-0'7@§@

 

207 ,/!.'//”//?,# . /,¢.~?;// w;»;;;;“"
'; //f/-.~_f -.» /) f ‘»` ,A jfny,/M /~'Av/ _»;;,"`//»¢L_»';'»»'/" ~/:" 1532er /‘B/./ /:’Ti`»"“ fFZM/Z°/;" 772 Mf@
§ `. ` 55”{4"/1';/10;%" /.‘/d 7 §;,.~)V"'/"" cr ,>" vEMé'”?@ 'C"; 24 /.?“ 7 ` ,_//~M 7?1»¢ M/_Q/‘,,,,w/_,; .\é¢

' ./,¢Q/MJM"- /,//`// ,.¢07/!/¢//, 55er /é"££~"/@//J¢f/“*}VM»M'»' ` f/"`”"'N"‘ `5"7:"\/ 7?_" n

 

`:*'F;<~'/;>~" 070-1057 v '~ F~z»',,.»y/M¢~¢ /’02¢= § wa~je€/;/ ,' :-k /.~./ ,#%waz,}?~.?-z(; /y'c»w/

./ \
M@M/vz,, .

 

 

 

 

 

 

 

 

\

 

 

 

 

 

. -"UG'24‘\5

AbesAeosfa',Cie*r:< '

 

 

 

 

C/?U§€";é‘/p§§/ffz 63

 

 

 

 

 

 

 

32/4&7¢7;» 67 0 ' ` '
7 z
44 ' l § .Z;‘/ 7% /g 4"4'°' j'<:)/d/c/,¢g_._,
. . v /£/ ' __ § v \ /// 370/1507 507/02
~ ' ."'J'.‘ -" { y F;__' ` l '»_:,. -
5477»7,,7 __/ 27'" _ § q q 615/7001 77 ..,/,~'/;0 5

 

/%)7/01/ 72 777277 777%27/707 0/:'~ 000 72 //.a 0 7~/~/7
254/504 §//7;_»”~"/`0/ 7“7?<~.»'\/ 005"' YMVMFN

 

 

éé/f?r£i'>' 1225"75;; » 022/3 /`/‘4»3/70'€7“-’/2; Z¢:>/S: 77 ////JM~/c 7::~»»>.77 272='5: ;/:/
3§’¢2/§?.0“"/¢3?’:~ //!¢53/2'/¢"`8 @’33~1:1> -`7'§.?` /?¢%7¢€>'//,6.=:;/¢/2 3~'* 70'{¢?"7¢'7’0,0/72~/?702@ 777 '~"-f'~‘?>~*=./
729 M/// / '4»‘4/ //L//C. //'97 /;`//¢/‘./77?¢/-»' 4§/»`/¢?&“5’//`7-¢: 750 7/‘/ /c//o€e"" /Z é’¢:)/ I,_ \

/ 77/0/0'/;‘,1/'“4 /m/{i:*‘/M;‘ 04//0,¢0;/'¥ /'/;"' _0.¢/.3//7¢0€_ 0 T:/y,¢;:“yéé;;\/Y /;¢/,¢/ »-- ;A¢ / 7;WJ '

  
 

/40'57’.3,,, /--/7 , 70777)0¢/7 16»~0/0rJ/?A/A 71 0;7?/ - /»"-`». M/¢_§ /7¢;;7¢;;,_/ ;/'0_ 277/0 ,.

. »./
”..f /,/;Y/:;gj;'/T

 

 

y /.7»€¢,’*"27¢3-¢/ . -
z _, l 071/7207 ,»1“2::‘§"“2'-“ 3'§';&‘3 1 1222/2 <‘ /2///0/@¢ f '

 

  

/4//;7/!/7?"4 ¢f¢»;/ 470///1,/:0' 1 0"00//¢2»“'” 72 EF*/j,§/ 031/207 077/057 <J'W»=./

035/2023 i"»§"/)M 3067¢;“. 00/00/7~0'-' ¢’¢;/7'/5/”'_' 217 /1{<'»;2` Q/dé»f>`”* 707 ;';~7$/-

f:) 740 2775 Q//zz// § 732 ‘7”~¢?`¢?* 777 " c 0,</!7?/'2222»7/72 V/d¢)?f,roN( 707267

77 727/77 72 75 7207/07 ,zw/MIM7 67¢:1,/ 707/777 / '/2./ 777 WF '

_/;%M . 1 / _ , . -.

69%6!077/»// 720 1007 ///07 SFZ//v/M_Z` /7'4 57/%_'5 FZ//W"/”/z“ _§44444`4
337/05 729 696/7 22"') ,45/77¢'/6/ ij ////';:3//2" cfc//zW/, //¢""»2"/ 777 702/c ;_,”/"` ,g>f¢.£_ -“'
5'~/»2,<_ /¢" 0=/7/'¢/ i‘//z'¢>.#/i/ /”7/2 7/3/72/¢:/ 00sz c_ 77/,/7’/7M z 7 0000"6““=» 007/77e

. 741/777 5 727/7777771/ /77 770/70 720 //‘/.-m@~,~? v

{M/fZY/M

705 é/f 77l/51 /f/?/,¢;z: 07 005/20 777 706 f€‘z»~»M-

    

   

W-~.'?';;/ 07 faa/gc

l

L_

914

0£ ""”?.'¢:f

 

 

 

 

 

x ~’__

4 2152/527 762/73 77:>~,7», 701/7 f%'¢///f 66”/,5777/225¢/3;2 523 767 _/777;27'4/

~ 7 77 777 720 777 7<- 677 77 1127 M 54 ,\ 22

 

 

 

 

 

 

 

../

 

 

 

 

__ . 1 _' ` \
_ _ /' _" ‘ ""/""'~ , " __ , 7 v ' ,\
(/¢5"'07r7 »:;F‘ 67’ 172 /j/;é’?. ~ 1 ` '~’1777,;{;31" l ;S/¢f'A/}¢¢¢’;;»;.¢.J"“
. / ' . . '." y .
1 »- . ; ‘ , , 1 . > \ )`.,1.":
.//');,»1"'/"" `:';57 /2/‘“’12' 2-75~?`~` )3;.::§" 0"0’7>"" ` 1 ' ~. 1 d
» , ~ .¢_W` ' 4 . x

 

-w»..`_
\

 

g ` /§/-_ :3_,..~’;»1'.», /:»;:-,72.'1:~"/' /¢///,7`»¢’,/1</'_2’;, `¢:”7"/'”')27*.¢ 2,01/,»@~/ 7;;~»3./;77 :r)/ 72 ,3,»~';»'_,727,,»/ /7:‘22¢”6
v '/ . ‘ l / ` , / /}‘ _ / p. Y

 

. // l ` / ‘ ‘ \\\ j l ' l k
'. /'/'"7"¢‘»““” 277 /'1-"»77;,’“‘ 57/~'//' 257 ,.:’?1:>" /l//' 15 '.': '~5= ..7?;1,0773,1/`-2»*-.::/. 7701/7%,”7; 777

\

 
 

M/%I°j/l;?é,i:=? ` .-"'//"~:" \K/g;,: 7 §//_') /;/» ~/'7 - '/?~'H'r/_Z/’ 7€35?7£`".¢¢‘(

\
v

/§'3»:7>»/_ 177/7051 /~~1~- ;,v’ng//$ 7 /;~’, 27/,7:>7" /;»-~» gm 714/470 ,/;@'/»072/7:77316773770 M
/'

//~Y?"/ '>»v/`¢’ `,;¢- /):?»- ,1?~4»;.»_/§');),;¢’/‘1'/ 72 /2”";`“""'/': /;?~7',"_,(7§5‘2; "/"?'»"/‘.¢w 75"$¢/'~1-`“ G'Jv)€'.}"" v'a~- C!'Z.»/,g_)'/,¢_,;dyz //;,F"/?YY"S,-

l - _J

y,r*“"'*'l»-n-»

A/i/ 325 =*;1'/,1'/- 73'»_/ i:';;// /7“777='7'/,00,2_ 5‘/4";//,'7 /7:'07‘:1 ,~N . /7¢'_¢';»07 7/»'*`~` 402 777 751/77 JL/¢@_ -._- ¢:.&gz "

 

M¢ '@¢~»§2 6174£.,;;1 gér~ ` /.¢ j 7 /70;22'-73»~“ 777/7 67/)/720-03~: .,/£4//;9 //2/2’3'/,"/,./¢' F»‘?./Q
..,.~p~p¢»_ ..,......,_, “’___,~,,..4 ,,,...,.._' wm ’ /' "' / _' - , / ' l - '

- 7» 750 , . /’ ' - ,‘ '4 . ' / l '
gF;/}/,f/j.;/y/r 777/65 710 ~"",7;7.,_/ /7=- 725 ;,;»:_).;»-= 730 .7/;1;.7‘; ,7.\@ m',,/;_>;;'- .6/;2:'7;/77~

fg,‘:;`é€,zf_' 571 ,5/_/'7;*/»7;// ?.d &.0/_.4/7`/2'/ ._J\,n/f,;? /’73?;/*£ A’°Z:'/.J!‘r_:¢_/r/ 651:}“/;/ /5;¢",'0 C“Z)»J»/-')"' 7;,/"`“~»

/)¢5’/6/,3.»/,0» /;:/~,131,3»7,7,- 711 ‘,773.’ :1:7_;;;,,,3 §-
_7 “’ ~ " '“

 

 

 

 

 

 

 

 

 

 

 

 

 

 

j _ _`4'/%?/222:) cv/z_% ' 2§"/_/7/§

k _ " 521/7 ?;/272) Ac'///z; z J¢é/Z/{J/?j /)'$/~22{
‘. 2 ’ l (: / /7¢.;/.//,»‘// /1//`7‘

- /5¢»':0 222 2510 '

 

 

 

   

 

/l/'> cf"}/:?%‘/”/;'/f/ 7"7§'/
{/A/’?"j ,£Q¢§“ (Q/f/M//?§ /7£/»»§**/1; f F/'Z"”' ¢?;: 4//‘/»" ` a /` :' .-' _ 7 ": , fix `.

 

/%*?02 //2~1’/;€ -. - 2 ‘ ` , ~ l 2 '»
F/ /VQ/ /.)3.€'2`2€> "~ l 5 l l .. 2 `
5324/2274 §7'%~”7¢1,\/ l 2 5 5 5
//: 2222/2 172 72 //2 _ ) l
/Pf.;-' 1‘%’)’12§>'//: 4222"" /f;r@ 2253 W/»%‘/,,, »<’22//" ~2-'2‘/ / /'/~? ” "’~`"</I/W‘°

2227/4 /522

. }¢/ //'/’<»` F~':`//r_//;'?‘ /j'»f/?V/”/_//;LI- -/2 f-`.4 -/;;,;/,;.;/ 2255 };2':;=~‘;’* /_";>..-:-j~’_;.(,f ?;f/U';L,;';§ ”/_ />/.7_;5%_ .

 

 

  
   
      

/

772/2252 222/122 /2'€2:»'“ //¢2/;,12/22 dev/1271
/ 1232 / 2- 21 ~, ./-;,¢~'1'2" 2‘422/¢@/;,22? , '2" »» <=/.'2~//,/ '~" ' "'/~2-* 'f'<>: <“<.‘4~
r/é.#//j‘$j‘ )' %/ cf / F/ ) .¢}’/ /' 6 c, ,C // ./¢~' 0
' // f _ / / . ~ -
7?%=" /7/¢//2/22' /a¢//</./ ¢'/€;¢F 7";<'<_" 421{2/2/;1~»7>2:2, 72> ;/¢-,_, ~/2/_/,/»2;¢/ 222/12 //- 2222
,</§'[€ /¢//"" /.f/(_/.f L//*L" /.?;/":? ` 227-a -~/""7 *-/C; /V;'./ C}/:

MM¢/ 255
/Wuly //»0'7

//7/ //‘//_/,’//1//?7 /.¢{527 /%'/£"21 ///c/~/¢//y/,/ // /f';~,./.:}/ T»/,/ / /'2'7»":» "~ /,»¢&'<’./» 531 /e:¢,/'?.;~'/*¢ “9¢'/

~/» 12

       

 

r

 

/Z :,Vé;:/p¢‘.// /;?/:/ //Z'“" 7; ,Q/,‘-’” 7»/-4;'2 `/'?'_U

/£
225 § /2'21§2€<"£¢££ /L £/;`0’¢/'.& ///2: 237 /?/// f‘;'/ ///V,. f--/¢///w/v//Z/Z'/"< ` 0-°9-)" C "/c'~`,<

‘7"”2¢"24»)2 29 222'/ / 272 222/22 22 21 2 222 227 22 »" 7//>€“/" / /: ia""“ /;z-<T»z'/>»z“/z~¢» >¢J»/

,/ 345/1220 f' /»,_/27-“/;/ 143 /"’?`<222‘2 /// {:r.-M‘~ ¢"/2#’.<~4 ./Zr“fd' 1-"2 .
' ' ' 4 , ,~.' , /'
/' f »

2’::7~’?2//”</ /;4;'/ /»-»221/2/¢2/<> / //2/@ / 222/_:” 227~22// /0/1/§
/7/2/~?/;1{,7§ />/O/i//: j/A/é*/ /1_ ‘»

 

 

 

»
. '

 

%/1:?:7§5//” 7/:) jug/615 C/€c/ 510/71 6//7

 

70////¢5'2: % jfézé / ¢5615@¥£@3’45171"?~€/€

 

7/£` //;57:'/:% /£:1;/117; //76@//€»_/,7/’/(/ g@//¢;/;/¢,/ '/441% 4151114` 51;5;_/ _/f
69/%’/"#/# /W//// 55 ///..¢f /{/d/.m,//¢{( MJ*H'€?//(Q% (/5€ A/.?-|?~/ . fair z;:f'/,GQ/

751/1111 5567§‘ 1655111111!716 ér/

 

 

///5'/<;7" 1’€:,117£'1,1/)/10///1,/‘/'5”/ 6/%/5’¢"'¢/ /./.’1///’¢1/1’/ 5"55-6’
ha/, 7 /W///r %¢' 5`/1"1‘£’ 61 501/f 'z` _, 11 '
Mf);/% 1//;1/ `:/11)/’1/;'11/ 775/'£./ §15114&> 616/1 116 S`“:¢/J//(j'?

. /.6" /' __5"`1°'“‘*“ ' " \'/)1€ 6*'[1§675'“£/1¢1///1 1;1).;': //11011 § //4¢7¢{ //1 /
5 %3///6% /`6//// jegfj §§¢5§1`¢:2»41 /"?é'!z) .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

. _, l t _ . L_. » _ ` .
j[ _ , . ,..._,.~.~ _1,. |_(_4.,.1,,1~_._ 1..¢»1,~-'-~~<:*¢'1'{ ..,_ ~_ ' ' ` .~'11'
' . \ . . . _._ 11 ;_ 4 q ‘ !- .

1 . d ` ' - %/’§/6/7 1116 ¢/éa/ ~
n ` ` /////{/1,/: /// /4,,4/.6’5 /1;71? j //'1?§//;)/{?1?'“(/?’
)/51(/6//'161// ;/ ;6,1;¢ 751 c

' j;? // 577 14//'/?/'6¢~ 1/;’@/17 776/113 ////,/1//¢ 641 567 %/754
677/6 474/f ///4/6/14//46 §4/// 617 ;4’//§/ / 614 /// j/ /</<‘11'1'61?7‘” /`4<:) 766 16

 

 

/" !/ f ' ..
/1:963””///;’///{/ /¢1"1*;11//' ,// /; 1 216 %O 3416 714/1573 _)¢,1//<,1/7//’;` ' /7/211',1//~_//54€¢
!’_ 1‘ /'/ /“_'

5//1¢/'///1/&!4’// ,»//,(_/.>K , 57616' E//%_Lm /_/'/4 /-6? .» V/‘-/// 7[`»6 /€'.$`p/,~`/~

H%/ /€’5).1,’/£//¢’/,. 1164/1676 //1. /6”/ 2 //`¢; 61.1`7/<-6 /é'r6 /C’ 7/
/ 11 / .// -
Af:y.¢//// /// 616 5k1/6 /.2/11/»11 '1‘_ / 411/d

;% 2//,1,1/*; 131 %1,1:,:;/ fZ:/ 153/1611 ///f ///%@/6.146//“4 0/{@¢1/

//[/ f.//Af/);l/?l //j c /{:/z/AG* “'};/{:c-'j'?!-/ /¢’..’J;»Vr' ][6;;*."/ /',1/~'/%77/[?/8 -,/5 A/&'é‘g.f é%'/_f

_S‘¢( ,.1/{/,, july §§

 

 

///1/'//111//6"/ l 516/1 167 //»r j/é’¢?~/e:§// 616/v féc: cig/1141 »/6 ' i’.'/?:€

_é//:/' ¢?f/ ////‘F//M¢;/ /.16/1¢.1,1 f /1;`0! Z/"»é’/j /1‘11') jz//¢:/ § _13’ ¢-'5'~’:3/-> &@JQL
§?'/A 577/ff f/;J 615 a `

 

1/11;1/4'-/¢1'/6 ¢z>,»; /./ 776/11 -1;7?7/’//2‘?// /,¢6[`/4 456/11

 
     

. , . ., - ,1 .» .( ~,1;3_6‘ /!/&6,151£2,/¢;1,4 /:1»4 a/,//,:
A/< /`,;;/ ',_1, // /7// 142 " 664/6 661/1626'¢1_>}1 122/111 221 161/21 '){: 121 /¢/Jr¢/(,
%6‘/.1;117“/65§,1 11/£:,-// 11 '/z:// §-1"~’-.;/ 7{:€£ ~./»;:'/7"‘ 7/» 1:11/.1/£¢,/ 6 'k
.` '%FZ§/?J/;/y. */ C/f/,é//y/r:/ ‘////.://r’§/ ,16?//...11:~1;177" 141 16/¢//1.4.161 /&//4,6/
" Z7) (/15%//673/ /1’{/:”//' /Q;,/, ~ :////<>'1_/,’16161~ 146 ,/6/<':~11:> ` r,/~/cf’ 62
w,7[-//(/ 727/1316 /j//”"'/` 10 /"4:;1714 Z'_c»;///f” 1147 /;//f/g///MO/&? //“Z€

1 ,1;/1/_/////¢ /r' /11}1/// ///16 /76..1///111 :1,'///4//76'/ 117\;./6///6.7/ /J'~,g;€;.
,;112 414/11 . 164 1 1211 1111 1114 ,1..; 11'__,,,141,1/ `
//611»/1;1'//4/ /3111,1//,1/// 710 /16¢"{.1 ///7////¢ Y/W///,»r /€1'1,1
.19/2;’/6//”/446 1/6){46/121/ 1612,1;11;/,-1/¢ . 7;///4‘6/ 157%¢: (:71411¢.:1
1211 /665<>11 115// 1:;;12~;////¢ //~:6/¢//,145 %;1 566/6 121 !/<2//

- é{é‘;/@/? !5{//(/ 134 /7!161/1f fOr1//j/4FJ//n/G; / % j/d(,///§/,SL? :4

   

 

 

 

 

`\

f fl`/l;l;y}¢§?f/é //?/?f/‘é;‘/ / 5 "5; 5//"/{1 ff 452 445/7’€4//7/¥/ ////,~égS`C>/JM O/

3 W§/f; ;/ / g 1 553/75 5/“/€?`/0/1 / v
/i£;i§¢ / 750/fw @`F ,%//2 c///v/ 3 /://.;,'/ 5¢1)§ m f//);§/v §F 52 ./-'.<»/1[0'//%.
25 5!/§§ ;,.)//7.5/!7‘ L’ 525 ////} 455 55/”/ ¢,»,./5?'/ /;(-’~ fmij
1177/6 §556,5 fn /7§/4¢§ 5§§ 'J M/C. 526 ’/’35 {b/ 33 </J//W/ /9//€§6/~_

/ `
"~”//»¢:,é/@;~ f/§_/<, § /-,.////y ,>{é/»@§é/ 1 565 55 5 7/3 ’3¢¢/53 34 /<§`/f”
` [/» ////”5) /»// ”/éf€ ///~) fé/¢/¢*J //:z»/'/ 5§/¢/'//1~ @,A"c¢“/ 425 643/545 ./Y-z’_g
. [.~/ / , f `
/2<;5_/"7 56///56/ 5"/:/// »~ er;’/ 27 A,/@,/// g,//,//° 615/d ¢5):/§ 356/k 5 245/ere

!/. ¥7///_ //:7/ §’/»4415_§57‘//////1 ' £/,9 ~ §p”. /,,j/ »/;’//:£3;'_{ [o/’ 576 5641' C'<j;Fc/`£

  

  

 

l l -,¢. 52 2 ‘ -/.WF" 7a '/VQ»'”ZZ/z,-. 32 @</7/2»,» 513/15 r,,,r/;,/¢/¢; ¢¢: §.e/Mw
; _f/j/’

/5>///// ///§///4 A/"fywz;»z 535 ///</Z‘/:>,</§/ /f/> /zz/<,>§z .»>¢/ /7/71//¢/
‘,”§ )/ 2424 /‘4//1/§///§// ////7' /29 CZ¢/x/!?

(/

     

fi;`-"*`Z_/%~"z/ 123 5/) %`}€ 42/5¢//@~

.A@~_,§" /%/')’,¢/¢’//z: / 735 //f/¢/:>V'?/AFZ wm /NA'- y;/,,»¢/ //J//¢» .`/<"'J F¢/////;Q;-~»s--r' ’?/€/
// .

/L'!‘// //»"2’4/¢/ L§/ //y//»///z dc,¢_/,€?»~ 2'<7/.1 , M/y'x' 0 3/-?//5,3/

d/*’":" /37”6~’¢//»:.;// I¢»`z" %zz_
lW//J/(/ ;’;“z;?',// /A'/ / /j;$ f d/.z/ b

473 "‘F"" '.

   

2

 

159 f w;.// A_¢'/:/2 ///~//z~//;'/ 21 55 2»-»»¢»,¢'/~/~) °//w j///?//,¢" f’/'"c/,¢¢/J¢'%?/f;€ /f 27

fha 2 1//§/5"¢.<. ` yfpf,¢//>///z:/ 72;;" 123 5¢.,»» 7“*//¢“ %»47'

//

/Z./;?¢»/ f//"'-’é /-'»A/'”' 2€/// /Z~'//z ' /5/7'6/2/&¢~5`5/? _

7/5//4 c 5¢2&/<:/` /_¢/A /F -
( /yJ/r//tf 472

¢;éj’//////;“ ' 73 /A /;Vé-"";"fW/,FWZ»`-"

»I"/L/;»’ /W J//§ 73 5;“/%%¢¢, ;s "j" /A//) /ZZ¢F /)//2»?¢€¢'//’ €9£/ /'5""//1`/2<"`.//3 _C'¢DA/i*`$:f`.f/./.` 41 l

222'_/?1€4//» .)/w »§vi."?°/z,<'é-/ /~_ f ,.//1;'¢?/€5§?672» fé/Z¢»¢f f‘Z; /7¢'?”»?'47¢//;§/:?}1{2“' ,4?»_5_" ;7/%’;"

l

%;M.c’//F/;;;'¢~ / ,-"'"£/2/ /Z/é.“ /,7/£0 , //.fMF C/Z}Z~?

Mf/%é¢/_ /% ?m' /,;/f < é// //// /é" //7 V/_J ./'/,/¢'/¢~'7/€ /,'§'z//) //Z// C/§f'//" `
/ /
@¢7///7 //;zr /é/' ,_/ZZ¢¢ /EQ/¢z f /'“'///1“/ //2,» J/ cf fbi ’j // ,z/./Q,_; % 21,4_,¢/7’//"‘{/ {’¢/f'/'f"

Mék§ a /%J/@A /_O §%/CL %54;/:;/1/r ,K_Q';'¢/ \"<‘,;)/¢ 624/x /NA§?H,,¢

. j/il¢/§/{),/e /é’/ /7/‘7/115 §/,/;/.,Q fa§<~ 504-§ :77,€@,/1 525 255/2 267/§ €m-»_,¢ % an

/54/4////4’/0/7 743 §zz/y//‘Cr jé?//;,f /}?'a?,»__"f;' 545/n /f /’"¢"§ ro/)¢¢ é»// ,F{aé;é;//

j/-S.U/KFSF SZ'J’€ v/»‘_s'/,:/CJ"/A/s _ ¢//[_/7 z{/¢i)

'1»1.
-~,

..._,`

 

 

     

. {\"l,‘
§» ‘ v - ~ .' - ,1/{),/_

 

 

 

//)3 §3:_§/) 39 511 , 1/:'>33“ /11¢16(//6/6,/€ 626 6 ~/63/1`/¢:'/1 ./ 614/1116 1161/1511

' _.6161266__%6 121/661 661 06 /(/: 7/ 1111 6511 1511/1165 /11§_ 1§:1;§/6111:91
3 \ 9 l 435/j 1§/.36,-1~f §.21¢6/16/:/6/1…%§1 1 § 11 /6»3.&25/ 0/015/<!//11/1/{
J
1461/506 759 /ny€j/?éa¢é //3’3€6§ 616/(¢/111 /
661/1651 ///,;6/ 611/61 §7§/?»”5/§/§5 _:%'7 ~,/FP//'Y"/ §?§311] 616/§
j////§%'/e’w/ /3» /121§¢6/1)“"4/1 911 </61 /6]6/61’: 64’7~555 C'§: /6>4/5`60":;?
1111 6/6/17¢/17116) '
_ 6/11 11 116§15

//,§’11161; /1/151,15’ '3 ` ` 1 -`

3 3 /3,/ _//53 336§:»11//`5§131,343 ~19,17<€) 17a/51 61~§§ 1216§ 54/¢./611) (01/66§/

éfc’i 5/1.)6§<</1,, §1/3 /3/ 7/"6,9)353

¢. ` 56 /15__5 6':'3'65//1127/ 156/111 §§ :::,,,`1 §§/ §§1§1{/§ 15§~,-,§ §1/,,5 910/1 ,, 91/99/
311 .

 

152/141 f 175/550321 6/6¢ 75 /(63'6‘

 

 /,335’»’31'3”i5"9, ,67~//11,//7”1/1/;#/§11//71 c§:§§§ e/‘

 
 

/,Qé 65 56¢2.1§1§11 1115 1111/:11/ , ;[
-;=1»~ 3/3 3//3//'56/15 17M/ €/’¢?511 "/6/ 535 611/91/1/’1§,1,§ 511/15 1»~/
3 _Mf 766/56///1,16 551'6111 752 //;2 .<' 31,@1 //.fc§ ,;;§- 141//11/§)
75=?5 106/526 1/)1:13§// //511`/ 12116§/{ §/11§1»§//11'¢§¢1§1§ 1559//§/
(6://1715.1/16. ¢?J`~ 613 166//@§111/) 52 /§¢1=//; >1/ 636/1151 1417 §’1/1§//616 ~
1111 1,;/:1# 6/5//5//111/ /1“1561 ‘3"/:,1,.11/`~ §§ /f/§~/» <,/:rc§/§ =' 1§ 1///11,,»§,/3.
jj 766/35 531 §>§/6/6/17/ 5 611/1 621@1/5///1/6§1 611§1§/ 3<‘§,1.6;£,,_(5

1 / . ' '-
6 6/:336’ /§11<"1'};¢:1 ,f/f €’1…> //§.1/1,////2.///1/1/11`§»11/,61 //"/ //=1§)

/
7/'_

//"/¢11//11§/ q

  

v

` /
%7%/%{// 633"':»'7 /7/(_,3 z:‘é,r,' §'(,/7/ /3////?¢{";~/ 935 749 979

fri/g 9 33 _ 9.,:;<43
_ 5'/75‘715///14/11:- 1111/1611 //6/ 6/_.) '2‘-??;/*:\ /»/1 1 111 9. l33/ 5 /_? ._S`L;/-,,>§;,64
.3 1)/3£”3 £/”"//"(// :'/O ‘/C`/ ./119’11'/1 261//6)// /6/11/6' 7//¢"'3//'! 111/11/ 755%;// , “5'€1 §,/3'; *"`1»»

ifég///Z.£/ /1/17£?/ /Z? /}"`f/é)//(//if“ 512 /%1/£§"1/333'33335/// /_/)g /?,QF//°f/F'/

‘l//
/, 1561 1150 /¢461//11 ¢7)" FWCJH§,»M fé' _.€»:/1:12/»,§1"

\ 7 ,

 

  

 

  

A)y}/i. wf? §"[3'3;1"3//{?/7 w//// %/6313'€3¢3'¢!'
/ 6,'. 6

     

7 %611 /14 f/:': 701/1475 ;;/ 0 504// 1117 /0//,’/4111/1944;, /11»,;7/1}1}7,1_ /5/_§' 105007‘1/0
711; jam/1110 516§,1,/1§7` //L,¢/M)f‘*m/r:w 154/0 300/74 1543 "{'/Z.gi z'"!';?.?é/;"/¢;’H/j{`
T 377-1593 gm `/%/"{'_ §71@7{¢’%7 53'14/ 14144{//11; /1.14 341/0/// ////0£¢, 7`/ /’v/c/,» éjf/r/{/
3£/€§: 617 /7/ //Hré> §/1)14 1115 c”M/o/ 175/71 014/7 /_/’/&/// 3 010/7 S;¢¢/ 277/1;;¢ _ 7
/,,/09£/:/1 -//;7 101114/<17 //14 §§>145§§:/71 011/134 //-€"7/014_! 3d1 -/;;' /24¢./@ /,

.»'~3"13 010 663 1611/nw 11 731>2»1/' /%4///1 013/7501 67/ /»1/€_<11/"40 7/0714

.7 §/1`?',0; ,5,5$?»%/% }7/,//1 /1,11//// @6; :3” /5£ An 9/, /¢7§/.(/3 6/ 14775@{5,

 

//_; //¢/ 112 §774/17’7 511§}¢/7 /01,»0.€4/7 /// 111/f 772 "111/€§7[€6./1%’
//5‘01//+”’ j 161 5j14 .¢c.§r/m»-, //4/§1‘/ é€~fi»v¢W /7747»// ?7Aj
9 /~// " J:/"a// J_f; 34 //17/ //4/"14 5€`¢¢/0/¢»’1,4'/7/.»6'/,70//907[ IW&AA/,uz
.61'///7;7/'£1)/1¢ ` 0 /1/1'71/77 111/1311 1.;»:1,1§'/ 70 7114/0 /¢/1,3'0,4¢, 5/ 0/6/ 11qu -
1 »0’/11/»" 5 /51’/1/ 1550 /~¢1/ /`;`//'.'/£ Y/é/`G:f //7"0,41~ ///4/,10/@_¢:,,¢ "/ é/é§ ,}'?
g /1/1§;¢> ,1// ~/7112.1 <:’.7 14/1'71»3-/ -4‘0,4 ;,3-.-‘~ 600 fn// //;///r~¢ 144 c€/(` 9 '_
//;9/1/”/1 7<75'_/..’0,/_ 370 760 NF”>/€/v//”/ /7, ’/7£///‘ 1/,/9,. 370 14 1:1»"///4 7§’1@1$7:
§//44;¢ /,é¢jg 4321/04 4/0 77/. 0,/ 0'@// 1;/»77” /, / 99/7//7 100/507
4 744/011/;:4, /// §4¢(/,,,3@ --/3>.4» 44,:/ 19,4,§;4< \QSL M€W
" `LVO/ _‘9.€ /£¢111/¢4 """,7"--0@ 1101/7 717/5 €`/’J.z¢ /;/'7 7701 ’0 071""¢ O/[~¢r

/`@.1/3 1377.7;)7`0/: 7 7£//71"€/’/ //1'/ ci//c"w¢£ 717 7 /`/1/':)////77/.€'/. '7// 1,§4__} /703 €/6”60/7

MC( ,//_.;M_Mé//V”f//€/é ;7»;/1§ 1,//5?7/1¢//
/'35'0' "§0170441 /,4 ‘r/;z// /6/7~‘7€1&;1@@4£;@/?@$%&_£<;[0 ¢;4;9 __3'_»

/~/¢'j.@§j //3///0/1711/` /?54£/1 \/§,12.4‘/7/ 99 727 g '/%/011/»/ /)3/ J{/ 63 ‘/5$1/?7»6 " 324 1417/j
19/_7 )/4`//}/.¢7//7’/ //.§// %.!//3‘~7//(_7”1;/`/@/}¢{}7/{ f}/ /".._»: 7/7,‘: ‘f?/~(~ L/:w/Ai§}??

%7%/7)“ f`p fj{¢;:; ~é)/¢’WM /;3"” 67/// gi /
. 61%/43,1,/ 7//75.74¥/' /? § /; /377 7;`7`7§1*¥1/ 001/4 /’~1>//4/“ 7 0 2270

F§//’,p /{////(Z[égw¢/: 51 7/ SQ¢¢K'* 777 174}/@;» 1477 %1/_) 60*71//%

f//¢/ 14",/;/4/164/(€“/?;;?2177 152/750_/§“71/1_§@3[ WCJP;§¢"/:> ¢'9,‘1[7 c_,¢ § 7 ;/~.1;76 390 é'/¢_§.

 

   
    
 

445/410 ,} ,»,3,,? 001 "*’~/11:/1/ ~)70 Wé/§`

  
 

 

 

.(»~

‘. z:,-,`;

1 //7 59/»7/§/ 759 /7/44’€/ c/' 1111 §74¢ -;7‘,04,77<_~.,,
// _ /' §
j( §§ 25 5¢;>_)¢ -/EQZ g l , , 7L " /C'[?//h/¢_AG/
. C//??j //4////4/ '~”@~<' // /_)/3/4 722 714/475 //://,» F/%j?/Zz~/c,/w¢
1 77 ~ 77?~72 7///4, 4%.24>§ z/J -- 4 1 ~ -

 

 

 
 
    

\\\

 

4/ v 7/ 1
%/‘////ta/ //// fe .) I"¢'// //{//c: :7§; ///V€ f?:;:/:GZ” fig jr{f’”é,” § da C/
/ /? / / / n/ v 1 451
-- 7/47“ 7 < /z)»/ 5< `/,-/,~' 77/¢?§/ /`Q/<»//€ CC//<">’;‘. »2/ `/_”/`//_ <‘/" /z'/€ /z':__’;,/
Mx< /:/‘Z'é% / .l//:»/ ',';" </ ///'"7 l//@/¢ 7/’<"»¢ W'/ id §'{/7§’; 5//.’4»?/‘/// Mf//%"
"'"""*~'--.y

7£///¢"[/»4_/ _£ V‘/F//’;' :f)‘/ /(/ :// 425 oéé’/VJLM”
./ j // /

*:§‘/" .

 

 

 

' * 'l";z

”:._£;% ."

. ' f ‘ / “ ' <.
%i/i;°,;;,,»>/ ////7 44 / /»// 7¢/¢‘:£ ./¢/5/ 49/7 7/"?*’ U"?l` § 0`7" ¢7 cfa/443 ~.
§5`/;4/; ' ////_"/¢ 47 //4;, // ill/7 /4 /zv~ /4/ H.ev/ 71/4.: C<> 244 z 4

2/7/ ’/%//7/’/'; /%' /éF/f»€`/’./ QA€////”/ 'J;':: (/¢,/// . 5/7///////£’//?0’7¢( j(>

/ '~ /,, ,
9 /§’/`;/> JFF /, /;OW :’(/é/C 74 M/'-a ¢ /¢ §¢z>z/`/ exh §‘¢_;_,¢-'/ '/"(r _,/17§5§~.:,,7 <_ Fuc 49

1` ;*K;(’_S///¢:/ /6?/')/ 9/7€0¢,57»!”’./ ./<~ 6'4~1 dv,$" ’//‘/»7£/( ( ¢é///,’,;;// 671 ,4’//@/'/¢,¢//""//:/77{

:f/Z/` 52~/,?// /7/ 5@,_,¢4<4 / 7/`/7’/ d./"é£/ 11//{"»‘/ ////4 1477 ' fy -;/»é' ///W#’¢°/¢JA“‘/@?/L
/ /, / .
/ ,,{W/// , /»%'4;%¢/ _/.//- /:/:4/"/ (//'/ \¢(M,;>/<.w "/fh@ 1 mdc/wa h/J A_,
§ _ , 4 ,` j / v / ’l 57 , 117#
' ._ ‘ ' _ ij 6/7¢ 6494'7- l. ` 1 ‘ ~

  
  

 

 
 
 
 

_ 1 1 / 1321 »//r@¢¢_ :ZO;/ cc, 177 /4//§’ /7¢,/<:§ ~1/~€ %;f<"/-
_' './ F/.”// /P/M/g¢/ 772;1/ 7/?'4747:¢7) /V//,y_/ , ,»M//f/’é<.~/// .§/

-, fC?/z'""%j c /7\// /»7,5,4,<» 4 75 ,,»5 @7; // w¢»///_ 4/)/~ @Ac/,>p/..> c//(/
1'»/:¢¢4;.;< 7’»:’5 /¢Q;-'/w;g //'§ dzw,//:'<`C/on *:/5 4 410/ff 716/vw 1 f€»//W/Z§)
. 01§/_/¢37</' odd //}/,' ,Yd'/v//-/¢ 57§/€»7/@4'/ 774 /é€ .4/'_/;;’/ '/7/ 7//474»4/27@/4 » `

.j _ f '_(/, /77/4/7//3.4/ )*See' 6><1+15¢1/€" ` "

f 777/4 4,4,/774/ //,47

 

 

 

     
 
  

 

 

 

 

` ` /¢/j /§/1'%//'.' \ w/ /)¢§§7; 0 W§//§w%§//WK/ %7§/§ /7/§% // /' §§§'1_
'//§//_€//¢”/ ///z[// §§//A 6/%/ guy 7/?_/¢17// %/¢/[/¢/////L///%§: <01~//'5-€ @’7'/'4
H/Y/¢/?§//' war //7//_ /Y 071/§§ v>/r§ // //S/`A [/§//:%/£Zm€n§/

¢/ /é/; //4§14; 5 Q§/// /7;&1!.` 6013/7</2- 7%§/11~'§/§ /,W/§/ I//§/ 1175
////~,4§ jew/§§ §z/_/// ///;: (/./////§//F é/</ (_§§/ez§§//M§L /';§7 /§ §/J`§
/S Q//§Wr{@ Q¢_F /1:/7//// §/%'r,»/c. /7/1///2;//~ /Z§§/ /1 //‘§ war §///§'§/
!/w//%»/§///§§// /1'//'/1»§1/;/€,1//¢/ /7§////»§ 1425 »éé‘w/ 0//' /,'5 /§/5 ~/.1/1/
"/1'/ §/1/¢/¢ ///~ `r/ §7/ 7//»¢7/4////€% '(/./ {§§/ /M§/é/ §/ §"%S§.,z/ 6///<;/ '-
/.
/§/ /§ /§/§ f /§§///f §Vf// 77§%§§§ 4/¢/ //¢/,§1///-/// é/'/ I€”/
/L)/////r é’/z'///// Cd/v///§//117*i ////€ ////§§ /i.//§/ 117/§§ /§/)//1/4/`_5 (c//
17/1»§/) Z>i/¢'//~_/§ .f€///HL/P; L// jc§///t/QW§//.__:-- “',// F/%¢<?L /é§/g§
.2/1 5~1,1/§»,§./ 1111 11141`11/11/§1 111/) /@/11¢;,121 111/

'10 497/y

 

////¢:’§§///////';~1§/1: )// '1»)7//¢1 C§§_r§§/’ §r h§’z¢/<J/w 75§//1,
§§ //'/n/ér/¢/z#r §%/?:/§ §/ /_/'§ r/////§//f '_ §///////W/Z § W¢///é»»/`/"`
jj/M/ /§//11,_1/»41>1 §§€ 175 /é§ 515/§/::¢//11 <:"3/[/ %/01/ §
firzz@)éw 742 /%/ /§§§1/€/&§§/¢~§/ §§/4 ¢z c§§//¢§rf ¢"///¢/

l // Q¢,I/ r§§f_§ :' //é€///z/ §éz/¢"§/A%V§/ °/§///c/ €<.)§5:/./1~/§/
:/:§//~€ f€§/cé Mf (.I §//‘/ /'C“/§/¢J 1/, f»/-/E,,/F/ /'~;¢'13.'}§¢§
§/ 760 . ._

/Z/;'//¢V//, S/V&/J§§§%A§ %7,/¢/ /W§ f/§,§/r §§§/ /V¢/§(
////1;>45%//4/%1 1111,/ >Y/f§// §/[ y§/@§//z§ /_/ /1»/./ //11-§1» 7%//
»/11, 1111/1/§1, 11111211,1 111/111 14 121 1/{141111 211/11

4_ F:E ///w§/éi//Mr § 726 j/%; 567/no 6*/'§!/ »/u/£ ./Q¢°"M§§/;§)/

.//51;7¢<¢6 zo//§§/§/_//§ /MO! </-/f 017/1/_///€§/.§ //;£ //1/, 14

MLM, %///<1»// //1///’¢//§§ /é/ §§¢'/51<),§ §§ /L§ 7.///;/
/1/1///U/ %144% //h§///’/ 641/sz§ %’/§/§7'! //f/§§%//§§ (/1,-,/§§1/

 

 

.06'//6.; 666/2416 5666//6///4_ 16660/”6/6¢776///2)17 . /§;'/ 2/€ 66/
1619/16§<’,1717: /7///,1//11'6 /,122: //¢1/221 111/671 66 72 G?//Q} /2~/?)
//2`171“21027/Jf@)/221//65527//¢/ 4762/ J///// 766/,,/ 66/ 6211,6<¢#/1,1§ 1

766/1711~<7(26//4 /”¢1’ 6451>/646 /_64/2(1 76 66 2/ d? /94/21011< 1621/7
‘>/gg;:_c,_[ 6 r¢¢[}_* ' ' y \ 17 y,’ 1221< 6 /// /J/'/Q¢§Q:Q/
3@/61€1//1/ 74 6211/62</7/62162/42111 766/764’6102 §4762/74' 66617/426 '

y 66666/676//1/706/ 674/17 11/’6614621,1 < 176/42 26 /’~6¢1¢[ ¢[1/// 1112/6

n 664//7`1172 4601/616/;1»67662 677/112/0/17/ 62W 61 612/11 121 722
/"7/§ - '~ 1917 6/0€14/ 6466 026/2676 615 ,` 2112/1146~,1//¢, 1112/617
66721.61'/1'//11/ /64521126/ §6>122/ .1,/1,622111/22161. 1: 1221 21,2§_».;< 2111,
‘/6// 766/77462/6/) /,652/ /0§€. 74 6 21 //////?‘7€ 662 //)1//§2 116/664 /0/2§1>1'11,
'6/"/017 ///1)/0/7./ /6/ §/ 741/64 '~//:.)6/<:/3'2 2/,/)? 460 1761/1166 /1613’26/1=

.6'¢/ 6/ §61-’ 63167/:/€6/ /017///61///_%12/ 67/ 7/2'/<‘<</1~1421///%4//€”21§2~4/2

_ 60 `777/§¢ /¢/ 576/624 ~/6466676176/411: 11221//0/66 1722/5672/1,,, 63576731

- //6 6/ 6’/4/66'6/)6) 7/616/6/72»4 766/614/¢; 1666/1461/62171621 < 661/1:/1'
61 1111/ks 1446 421/f 2221/212 6/€55~ f22/2/ 1411/n '1/,~2// 62/ //12111‘

[//‘7 6/7/6/6))7 76 646 17/6)1////6: 17/1)//1;/2////)/)///27// 1731/71/6<5 310/2

/ ;] f
666/j //4/6176///7/641 64/42611`/11111$_ 64/6€2¢46/17€ < 22 141/141 j
/4'1//65 616/96/166/) 2162/562 647 1:, 3261,62/11/2 412117_/2 602

7 ///7/7;¢/ 14 %L€ _/21/1=6#’/74 1166 § CF///.760142 /21»70/// 6661 f '
4164/2622 26 7/1V461/ 1`,§ 242 79116/1// /1’//1~11,>21 4c /62!<:11121;/2
662 /6/4, 611/1214 613/46 / w1//21/11,1,_/// 17/7~/6?.$%'/2 11 `/;1/11;3 ////711122/
664_5/ _/ /// 2/§; 2/275`1??277/1)¢//09 6611;1/212;) /7?;:22121

4 /42/§17266/ 766/26 71/`(/714/(¢% 6/1~',§ 1666/7605 61(1’742/671/221 2166/706

.CV 111 611 6211671/1'6§ /1)6 613 2/ 661/ 66,///1/12121 ’/ 11<71/;/;<’1/21»z

1 y , 1166 726,”67'36//6561`/ 70/§)6¢’/7/.6/22 66 2/ 66 697 § 6!11/

?/2¢1 /1/;: 722 /712111)/1/1»/2 1117 /212/1/-1,q 27/216,2¢

 

   

 

 

 

 

 

1 .
g

 

~' /17’/‘/1/6¢`1/ //7§/55§§2/// §0/§/1`/;/6 1/§<1/ /1_,6//6177£/€$5 55’14/56 116
[6/////1911‘5 746/06 _' 374; 516 66 6//6`5`/66 12a/65 5656,/1<14/1/770,66,//
\//_////§66“§ _<1 §{j€c 616 61///716746§¢9»1 17741///`,/1V661/ //7 6 5///
6§66 / 7///6/ 65 011/175 26 /1).6§<:65;§€_§_ 1 c 55 11.1,9¢1/ §c/ §c/ 5/15’¢7//§ §`
/
` /)/`55<6<' //11 §>7466/16;'/ /’/Af661////1'“5 ‘/' 7/' 61 6?17;/ pf/`/?%/ 66/)`1"2"
§661/1//5. 5/5‘11<1@6 /; 677/761¢16/6//1174¢) 416 161/1 / 74`% ).

 

/%/@6!/€/ -//§5 566/5/ / 1716 '5§674 46 C///v 61//€§74 6601/1606 ’ (/:»‘€J
` /’///74 525/66//2'1: 7L/’lé 1106/156 741/655 3661/56 674 6/7§. §§ 61"/56`>//,6/7¢17/’
)Z?//€§ §/616 616 611/5<.§63 176/506 666161; 661 41/6///114¢:6.// /7-¢»(
1766 5561/,115@¢/ 05 //Z%)§ 51/5/?6/ S.`ec,,c§ 75 €16/ /765/$§__§,//</ é _
//6§//” 666/61 //1%`56/; 06 6/€:6/1/5 /§;7[/1,< 616 6 6/15§115<=_ "
§1_§/%§§ 116”!§//,6 , ?Z?[ Z// ?// 111 55/3/, 567/1 1166§1/
FZ§§/ w 3/5>.%/ /05 /<:16 /6”/5~/61) _//'L/<o /3 2/5//(’64;6¢, <`,
1161/61/ /66 666 jé,Ao 1 666 626 11/7/2'/7`96 111/<1/1,<12@>)
/6.;/‘/,;§ 26 6 5_:~‘6_1:;6 1171/6 /1/1"/12' ///16 056//66 /`~/6>“5 §66/56 /_66 11//@)-
1496 < /6// 176114/ 16516§6:: 666/604 /’46% “6666 §16 /6///661611
/’
/’7 7106/65 651(‘§)///;/./§5-§`§1£’ §11< 56765/€6/ /-14=5 1144»465/6 ~§(’ //”“`
66/>1_</ 16 //,/§15/'/711 661/6/5'§1»1;1///11 6116§6(6 666/666 1611/61
j i§/1”1/1¢6§!/6’ §§171 g/661>6/: /"§6-6 666 6/146, 2656/176 744€ 012/765
j{//'/ 451§6/ 666 O/ //656//, n/?;¢L:(§6/6 ,_1:6 61 176/516 661 61 /FWrér

’/ :// / \z /@%C._S_ /:/¢// 74ny £(` //O/JC 16 MU{%,

ZZGA_WrL/rw/' §66/1"16'7//5 /6; 661 §§5-,;%661'3 56674€66

 
 
  

 

 

 

 

  

 

, lt ’___.~w__ ,":,._,.,,....

-. /%>1//`6)/€/1 l §56€‘¢’6§€( /(§///1/1/ 66/{§906///616/51, ///,1/ 726 z
///6/15/ S»'_€/'?,//z' 674 1165 65////§566 §g/ §`£/,1?<,; “:é] %‘7§6655;6&

 

 

 

1

 

_. ’CM/VM/Q///L%//W‘F ` //'4/§<///(/ /}//(”//!/714'/%6)7///"§~ 656/7 f/ZLC

(g:[.// 6/74471> /1111'71‘477 fém¢ //776/64@_17<61§11/'1@17¢; //1 §676'.67/ 712/1557176
7

77 766/766 /566 0/.§/`71~) 667 /6/6176/71776" 6/4.7/<'/ 66

jill/676 fiM/€ '%!/616;`»( 777/175 `6”/7’116677 667/nj 675/17 10646§£777¢ '/<'>77/65567/’

777 77777 1777/117 771 71 7 71 77 1777171117;;7

, {£/4'</617/'%64777/“67716¢6/ 6%*//¢(€’7/ 0//66657/-/77 7£/'0/7*§//7'/ 4717,//4)7//.:55 !61671/{
721£ /%/f;w%¢w?§y 66// /1,766)76 //645/€//5/ /UA) />51/ 6-)¢6//6'77/771'7§76267 r//
677//6/ 771/7/6/ 646 ‘~' 6717714:557'§: ' 1;7/_7;: 416/771 77 77// 777 4 747/7776/
://7(66//64 555 7;<///4 //77 /667 '/,7777677 67 77/’ //6 677/)5//477//07;76
7///7/ 117 777 /117 7/>,117/6 § 767/77 777 71 77 777/61 177 7 67/_67/ 777
///f>:) 7/277 /_6§6/§' 1666/677 `/77/1~§'1§&7 77/'1~ 1//16 5/.75<: /751 765

_._///wa(iz.»z /4 r/ %56 {6/77/77.4_67/74 0é1/6 767/7:§/ /46 <“54 »/6/;</61‘§ /5/¢7

'//67//17_/r17:~@/ /667<',.1/1 /7/ 671/ ///6'7;16//1/6/ //7/77<',_6//7:67/6 36 ?///’)L
1//76 §771;66¢ /§! //7 677/_/ 71 447 6/6/'4'@/77.7» . y 57 6 /6/1/<;1/ /O</

5 /’54//{7¢6 /J’?§/`Q? / 7, 7/ /L/// 4116/774- 44§6.7/7'76;7

z 677/7 117/z 1676/6 671/71 /747‘7/67/6776177) 21 //17 411 711 71 777
' `%/z/ /1/67{€ 757/ng 066//679,./~/7» / 477// 766/1677 1717/1 316/2 ,c/ /2976671:
// /
/X477/r ////47/77776 717 §/7/6/ 66 ¢/J`€ /`/ 4174/7[/1741.76 677 6@7777
up/ié/Mé/y /<' 7941@_§774117 , 557/775 /6276/`/-/77 /7»7/ 171 517 /055.¢,/`/7 716
//LZ ////11/77£146/)7 “;6;7/// //)57174/_/717 551/1116 c//.// 774/1771,<>6/ 771/1624

/_/266%/* €»71’%76// /`Z//C{/, Z`/ l 767/1§61//,_;:_ j'§/

 

 

   

 

 

 

` jr 4@177// //. @77'44// </_// 67 <1/5/4/4/1 /§6:677:5"/7"
. 277 76/.67/7/72 /_/7177/ 66 6 c 317/7117 611/177 77/7_/ 667 6

5 /6/5’/;16 /16.6/’4:1_7» 467/6651 75 4 777/777¢;/7/ 76/66/1’7:`0/.‘6 657 566 /:67/7,~1
%jé'/é [&)6/51(/0/6 /_S 677>? //7/4»7/7/¢/ L<///é//M ‘7¢/26 /626’6/6/7;6_ c/""/pé

 

 

 

'§)0--

 

. W§§/j,s' @1./ 515 1) /7/!<:’ fw/‘fé”;/)// jW§§éM/// 7/7€ 1311/7 //1=/€147
7 §§ k 1;>' 5/§%%4¢15/§§ 75§17 111 7//2€ §§11/¢*55 §§" ;§;@" 1~1' 5§//111¢,(///011/
755 129/€`//`01/£ /11/(/ ////§/I //€ (/§§'§/'_€/ €/#161/ 15§/¢5€€/,1 /YZ€’
./7/£”:'§§§€ 1115 /§z,)//c§ §z/P//c” ¢?§1¢;'///1§ fc/ Q7/é§ , /55715.’6"7¢’/7 /7/§9/§/;;
" /(/ //1§ /./€§_1/ 757*&/ /§%/7€//' ////M M'::'/ 661§')§5§:¢§; /,'§ ,§71/§{/§»¥§,¢/,;/
’ ///6£’/ /5\€ /:§/é§§ //5 111§§§/§/§§//7'1 ;///4§ /§,/1'//‘ //-f/// /1:>€/5_1/1’
" vf//%/z///</ 7;§9 //%§%/////1//€ /é€ .)oé/ (/’¢;1/5` ////` /'/V /11> €XW§//_F§ 153 '
, f/§/ /;/// Z/; 771 117 ('/51;'7 /§ ry %“17€§7#<<)'/ /ié§W/Z/ éw///§,,//
7 0§§///5*§/5 /§€/51¢,»25 w§/////§ §§ <//4§/('/ /%/`11( 7%/ 5§§§7(~/7§
` 47 //7/;/ /0 /§§§/1,/§1§ 715 //<:’/é §§// //~y§ r/z////f /§' //14#/: 1//1;§‘1;//`
I[)`;?g§/ 15/!(///,'>»5§11/ A`//?///z§;§ 7///€§ 1411/§1/ %1//§ §§1/1/5§ ,»//1'41§/¢
_ /‘§, "€§§ /`1§/ 1`/ //,1@/ //,§§,§r//'/¢§L/fr§/// 015 §§ 5//§15§11/
.1/?1§§5§/§/%//'/§5 74§/ 7//15`// 15&//"/:~/‘/ 1§/,1/§/111,§57/,§§. '

 

L(//Zé’§ //;€ //7/§1/<"/§/ M// 7 65 /51//5, /1'/1§/11§/!4§ ////7' §/§ 561/11§§1§
/é/Gf/?/F/ 1967 /érz"§ 14 - §/ /f/OM/;§¢:-'r /x.,é/cé z§§r/ ~/he’d §§15€/1//§§)5\
I f
@é€~/// z/§ 515 01/~€//;§/11¢€ 17 1/10/§15€§ ////Le D¢Q/€w§/§§r‘f /7~5//.»
/§1;;/;11§//%€%7/1715‘/§ J/§/§/ /4€ §/~é/z»'¢§§`/r am //»1/_///1/§¢§ {/
/:/¢ %//5.//§?<§€’1//6£§/(€ 67 6 /1¢ 7%’/7§§/§(5;§1<€§ //,l ./1\.%;',' Z€/§Z/`§T<`Z/
7/7 7/5” A/Dé'* ~"./1`/ ?¢30”3> %/7/§//7€// %’Vl/CG/ /§z///c)/§r/ %/W%§ 7!¢_”'
0§7/€//{/ /§§/ 7/\€ Coz//)%§C/§,-, //61§/ é€§md C<:>@/CF¢/ 5%§7 /7//¢/§/¢
/?0 /’.//707‘"/'¢\/) ~/ (%V/c‘j`f F§“/r/§_§ §§ H§EC/w'/v &§‘1“/(/(/4“a F/é 6
/W/P¢c)w o~/ '////19 l/F§;/,/ /<96/¥7"/ Q/§'§/C// %/5~/€ 4,//§§ fm‘@/§A§/%
- ///’5§`1//6”/714€,/€//§§/§& 5€//`/5 7%€ //?/¢) V/-€'§ /C/zc)§///§c/§§é///G/€ G%cé'r
.'?l@`/§¢.c/%/M§f V< // 767 //7§§§//§§@ fcc//of/" 55/'¢2( 7./ /1'= `c..’é`§/<<_/
7 9 %Iéz//é§)[ /`HM/////£ 0/71§§/€ §1”/1//€”///1/1§ /§’//>1/14;§§§/ 77/?;§- /
7:1;7§'§/ §/M ¢é///é"¢/ /¢’§/1\ 1§/;§)/7/€§~§////`“§ §,,///§ /,S€c§<§q>/ 5

i

 

 

 

0//'0`

 

' ///‘ //_/// 10///7€0/7{/19// (/6'1'/ £6>7015:5 5001//1/} / 757/7§)'%47(/ I707 C@j- ~
/ /7/7"6_”/ 0 7%///07£711%1/0 ///7’/1/6/57! // //`714/ 7/76 7/1)72/7/1&7”.“/7_/@
- .;///1/1>7//§ 5/706€€ fdi€cbné//»?; %7/_» 67’@/16¢1/77;: 607/1'§%7/7‘/6107¢,»/// 7/7"`

1261/777 F//////é/// //2.0 117// //7{/0777%”61//%

 

` /z?W/Z /%/0”’/ IM/M§ [7//0/0/0-:00///¢' /4//’§'<`1/,)7;07/\/6¢~ 6/' /2111/1</§1.02
6 M/jfei> ,//"`0',0'0./ /¢02//0:1€/ W 6“/(/720;< //AI£A/aw/,u/ 770/67 //0/7/21:61<.//77/01/ 1000/070
/%7)/"/77/// %77/<':;01 77//5/0%/105€»0%’¢/0/ 77/ 6 /10177f ftl/710 c 070$0’ ~ y
é//////f 11/ ,0/0017'///0/¢ §u//?</ /7;0 /17/171/714 4205 5:0/ /7/0»0117// 0‘/
2/7/1/ 711 717 27111,11/11// 411/1171 4 //1117/'/71 7
. 7 7%11111711117/11111 771 71 1111/771
/ 777/41 /< ///7/<~ /01/7 7L /1/1/%/ 7702 /7/7¢0/)"/01%/7/17/ </ 00;/ 1076/1)/ 5 4
. 717 71 711 111/777 711 771/7 71 111 77 71 171/117 117
6/’// 1/,/ // /70//7" 60//2:<\/1/601,_010 //§?1?17¢;7/¢10 f/M 4161/077 /1,9/1///"3/)2

 

 

  

 

 

/;//0%,/1// 45'£¢;0/ ///////// /;/ 1007/0//6'///?».) /7/6‘61/¢;>/” ` ¢""// ,
4 ZL/z’//¢/, ////2 //*7$1//’10/,5‘ f>: %////°//%0,7' 010 /6,00100115//

/1”//7¢1/1/00,1/"/%<~ //// ;///01 ~'~/2 § //0/011 ¢/“0" /z/ ¢11-1//¢ ,/ /7//
/1111`~,-.§. ,707/0,:0,7,/:1» mé~r,/ 1120 f,///k,§/AWY/’ 10/7/ /’10// //7’/ /Z%/
/17`/00/1 1//01/<:0<.0/,70::1/7é JC// /0// §/1010'/00:10/7§/ //10 ///'/%/ /0111 0/0<00~
/:'"0"`01/~1/ /77/407010/ /%/ %171,'// 1/017/0107/ 710 405 /é////////r /01`/70§",0/
///77// 510 476 677/7/// 157§/10¢7/06 §7£@77/////00/{ 667*%//;;41»/1//¢€1€
717/1,/1: 771 , 717 /0@11¢;11111111 74 ,// 747 %0_`/0771/:: '
//70#0/7[11/6’ %:5/<‘/ 71 1110/1 6//171$'0/77/€”/1010/ 67 5///06/ 74
7///770 501/§477'»0 07 Z.WQW///J/ 6/7/.6////1¢07//1'///// 77./07» j010 ,70'1:,//-' 771 7/
171 7 17: 177/71 >/ 711 111 71111/. z; 1/,1111717 170/71
%7/<5’ /6'¢//7.1”6:/'4' %%74/17/['77/¢/§/' >/011,:/ 7/2¢/1> %7//,0/6;<” /.§'/<'?L v
7//¢7 6/,7:71/117£ 770'1/</\~7111 ’%7 /z /111 1712/7 00§¢/1-:11/, 110<111/‘~

  

 

 

 

`.`-7/'62=»

 

\ 7 .

v 52’1’//`7%772 ///7 767/7 626 67/ 2077.22_74'7:226/ 67176/(2/ 675 6'/67/7£€2/§ 772 l v
' 2'/1/7//7766//67§@§” //”47/77//5_ /55`27/. 27‘256//2/ 656¢’//157!5 ~/:26% 67“%75/722¢/
66,666666666766/ 67 76 766 §66666666 67 6766266 776/6
77/?/'67//27,4/ 2762 /2? 176;7’$62;2 465 .6'67266 //672~/655 ¢/[f 61/67[5.72/6
f%€ /7/7762' 715 26177/2/21762 66/1’6`.7%677///6/ 75 774///2’2;/ 277 /“/6726.7 1776
_6’61<._76 ),.566€677 / f 1/ /;6_/7567 /§6755`7/;:/ <`76_; 565;/?5/ 2/6/ /67,6 )
1 y 6 _
475/§§ 627/727 //7///21;7/ 76 427/666255 /2/ 62/27»76¢“'@/€ 57/225<§ //7/7;///§§//_/_7_‘1_:;_¢1
625 _'/4’65//6477775 //`105/7/26/ {/'77 725/777 777 47%77/ 4054772/717775 755//
/177/257677 /76761' f /0/15:5§266662 //76’//7"75 )/ //.f M //6/677777:///65/ 5°7§/"76//?33,,
/;//76» §§7(5/575// 266 676/4- 692~766:6./6 l 676$ //,767 463 166 77607'76'67/ 2777
467/467 77 6// 5:7/75;7<676 /77//.6_//;/ /7/2{ 65?77 504 46 7567//26/ 77/7;§£2_4/`
7@£6£6/ 67/67676117/»~ 656)714/72/ 75 1[/;6617/2~761/7/1/)/////6/7//¢ /
. £Q¢,/// ?V_;; 75 /5/.; 5 2766 672/76 _ ,.”~`-~-`/6,/:’267?) /;s/ 662
7'%/’/,%6"/75/6/” gy/-;,MM / @`/ 277// 'c`/) lé/é%//66/75 "267/751/ y////q
72/; ' '/(7{~ ~ 561/477 7"'- /»;7]616601` 4/77’7 472 .5`67277 //{/% 756/26/2/2 66
167/666 626 616 6666626/ 67666 666627 6666~/_ ) - '
;W 756 2777/7252%261171 //2 46/% 2466// 7/,457 676//(6//6//2/
§17€'6/61//7'0`£ d/ /:/70/7'7 /"1>6777754"2/, /7//5/)'5' 92/5/?/ 9§7’74’¢) /75/ 77 7<667//
'//6?)”51.`661/ 676/122 /7/°,675?25112’ éf@cp /216/7 62/ 277%$/6>§§_,5_/; 64467/7/7/75777!1 56
776/772 7/77467// 6055 661/76 767/25 1// 262~/6,666/6€77/2/’7/7/2, 5005/777 AM
7‘;)2?2166»7725 6107/756'//772577 756 111/61'//6/ 156/76 /)'/647/22/75/ /6’016_221/67“1/7:7/72/
v Té l/ ///67745"077 325/f 556/sz 550 ////1_/ // 62¢'@3)'4; §§75'»*1/1»176<50 /77 66/55€277//(’ t _
2 46/616<;67 ////6)//€675€$/6%_75¢ //"¢5*//(2/1/ F€W 5771{7 675/560/5’17 .7';1772)/6777€72
6 ' 1 777§~~154216//.5671/€ ,5777616,1.26 506/757 257/2775 15///2' /2)17~/ 2751/56~
. 711/2 >/ 67676 76:67// 677 22777/667677/) `
522726//%6/ 6/(5‘¢//7//5/77/57///62/)//77/ %61/5 757/4 665 447 ~
717/0/2% /// 756/795 '%/577/ /5 //_62///76617z 477/_ 663/7//€2///?57 é¢,//K@M/ £5»/

   

 

 

 

 
 

 

»7/§.'_" 7

 

.§/577 /15“7 /) /{5% Z%/< 555/574 /§5§5/77 7/%7¢577 /c/ 7/555//?¢/77/5
n /75)”7// 525 Z¢;'577'/57,r »§77/5/7775 5¢/§7[ .§7/177 //§/ §77/‘5 5§/5//51/£? Q§é/;’_§"
' //_55'/( .`7<:75 5;`/ /-/ /f//?//wd:/ 7/7//< /‘_/725 55/:55¢/ 555//’/’77 /%/5)
l §§§55§777/ /775 /,55/ 7/57//7/ 5555;5/¢ 5//577755¢ 5`6///£//73'€ /5177,5/’5€ §77»7
' - 5 /
7//5///57/;/;/ 7/ crm/555 ~'5/;§ 575 /7/7/5/(/ §57;5575 425 /5,/575_7 1557
/”/€ §5/ /5 /75575/5/' 7/57L' §7?7¢’ 77 557//// §57/;//¢;7 775 §C’ §5///§557577 §€’
65775/7/ 55 777//,5/7 577 55/-/ ' ‘ ' .,57 5;/77~577/ _F
/
'/7"7§/ 77//7//05/`:57/ 5___§7757% 5557‘7;¢/ §)§/ §/777 ///7 74557/ 5 ///'/57/77777777` 575
-j§///.@?//c*//¢’ //7§557 771/557 §§ 7~57757/§_/:) Vf 7 7%§/7/§’5 /é/~:" ;§2'/
/2:>’ /§’/ F~»////*z<»///f//c?¢/?M//; /777¢/£7 7/5 /§§/77/775 /5§7'/§€`/
/§77/ 555/555 /,`//:'7/<:5 777/77 57 '“ _ ~, - _§¢ 755
n 71 /1/7177/7/ 75 77§§/7$// §5;§77(7775 /755,//7777/5/ 55577575/) . ' . y
." 56/§//515// §/§/7/57/ /57577/ 555/5// /57 757 5(/;57,§ 5/55//57577
‘/<,'"€75/-'» ///"%’%/5/~/577/5 /§/;“57/2'/ 523/5555§775// /§/7,75 755/ /5// <’”%’¢=,`/c' ;
57§/%/ 575/655 7475 /77¢ §75/7/,77<7 /§5 /.‘Sz55/ ///75_,. /'/1/¢'577/55/ S/"§:/§°
:§ §// 777/775 /7/ §/ f¢Aé/<‘//M /5/ 6/5/25£;/¢77 /555755//77 7§7
//7 755 //§7,’ /4/“///777///@5/ <75"77 '/7_.,- ,/§7§?; /'/77~7: , C /:/7_5/)5/'7:7/
/;55 /§//, ‘:/5.‘¢§/ ,77 ///§77 /,//5 //-7 775/575 §<1 .§7/ /'-
///./97§ /5/// ////§:’z` /1//57/'/ /5/ //_'75/75/,» / §/! //c’ /._97751' f////¢.¢//
A////§ 7;7775,77/,~7/ '7//5577 5777/ VU§I'§ 577/77 540 /)’:7 677 577/77 /§7/5/77
-/7_7// //// 57///7§/// 3¢_55,';] V§7’ 7§,77),75 7/'7771§ /55 MM5//5 ./7,\,577`:7:/
" 7'7:,/57_7/ 77/7777 777 715/7 //57 7 577/5 757 §/// /7 r// 7//7757~7, 7,~
797/§/`( 457///7;€ 775 _/7?{/5: §§ $'“/757 ,§77/5//7§ /575 //`/ ///777'/ .,//'75/ ¢,/

657/775 ¢/5’~_?5/ 43 577:57/5'/ <'-.’ <`§7§ 557 /»§/'//;’ /7 765 /7“/ /,/7 /./ '1£.§5 /c)L//?L

 

   

"7/ 577// 557/57 r /<.7 ~

;:'\

 

 
 

..f / /_ -57»77'5// /V'?l~'~?,r///“’A/ ~//_//i‘ /:F~:-§’/ 575 //55 _).//<"§/ 17§7//5 ///¢’747/7_

:’///§ §§/7575(5 _/7/15<'///7//// 5`/;////`{5 155555¢§;*' ’ a - ` ‘ n ,¢
§§ /¢/éué/M §§ WQ//W/’i/Fé// /§7/(`{ M///é/?Q/ /17/5'/ A.) 6////75} 712 ('551///\'" //%`

/
§j\j. '

  
  

   

 

w /%'
. 

716/516 ?:66'¢/77’7/7/ '//2</3 ///621'/762/727 766277 1%6/¢;»/065676 777 j ` v
62/66/6/§ (*(1:1;1<6/ 66 /72:;:%66 '/11, 67 27 ;1 627/676 676 »7€/
/¢7// ///72761~//677 y`/z*'/< ;77//// 676/16 z 7/6,/ /./662` 5-.1265_ 671/662 776/57 62`.376 »/¢/
l “""7167<66/72;16’//:///7///,/27//¢/26 6766//77; 7§) 0 //7’¢/ ./ §///6¢776/5 762
766/767 6°62;/¢/ 676 676/796 766 2466/6 676 //6676 '2////'2§6/: 777/766 27//72
y ~' 610:/7/22/771//"?$'16’62 6/// 227 6/71//"% 6/£( 7/2 //77/7>¢67 ` ///225 ‘?/' 1627/567 él::
" /61/ '6’¢’2//]/777/;/6;12 26261/ // 666:121 §6 666/6 /2// 7/776//7/626€ /6¢:///776 /2_;76 ~
/¢‘/ 777 727 //6/6776276/61/ 277/666 v /’6/6/2/ 1 . G//é.»/// 616 76 / /276€/;’7;57€7;§€0//<// 77,777
'/,§/66 _`267/62271/ , :;22766 675/z 906 (66:67"/?,62//6 /./ 77671»11
- 1 %776,1’3//<'.§7// 762 /7”/7 /_12 2665/7 _/6/76 26616// 66612161; 762/7 57211/¢/ 617
6 566 66 6:2/ 666;,177 61”6¢'/.,,/ 666/766 7” / 671 / 671/22 66 6671/666 615 61 §6/¢/
l /I.-:'¢// 707'"/'/62,12`./ 266/6@%062¢ 2726/ 66 767/21/-'/¢;/ /77//742///21//6 l
.66///76) 626/ a§//<7//6 21/§1»1112~/ <112 676/ff »~6/6/6/ `//79 ~»/ 66 "-/
1,766 §7/7/;6 2///26.627/ 6//6,77- 766/762/2)26 C/F// 626///:.// `1/2'7/2 767// /<1/%71~¢/
///< 667 /2671//;6/ /7°:1/ 717',1/6/7/' 767/672/62'¢6/// ll./i'~:: 2364/676 66 6.)”?2£71_;6\2» v//z
77.:61/6//. /217/66/ /2"/ /22¢///¢2//¢62'/(6 _//: 1~2§) 2 2 6

 

 

 

 

 

_ 662/71@/6/2: 6)/ '62//_ //{ /76166.1 vg/ //O<' 226, 6//2'611,6
/6’/67'//6/ /7667777/ /6/'/62///<' /6;/"6/ 766 //2/// 626211,'/ 6;/,7//¢72, 76 67/<"-`/
66 717/6 66 //’ 276/17 //6/ \//77% //6//_ // /, c/ 17 61¢'7'2 2:///626/1 /67< /61/16
766 //7/>/ 6672/6 ///._: 76776 2211/76 677///26/67 ///661/62:116 z: /21121 '//21=::5

2 : 2537/§ 167 //f’ 29/~6/77~"///1// 22’,15// 62/'6; ,2% /c"¢v‘( `/;/ %" 57/

 

 

 

 

 

 

 

 

m rH'E couRT oF chMilNAL APPEALS
' _ o~F TExA-s '

 

No. Pli11095-12_

_ THE _STATE OF TEXAS
v.

ANTHONY GRANVILLE, Appellee

 

`o,N sTATE"S\PEfri`IT{,I_oN FJOR DIS'CRETioNARY~:-REVI“EW
FROM THE sEVENTH CO'URT 0F AP-PEALS '
._»WALKE.RYCOUN_TY
` COCHRAN, J., delivered _th'e. o‘pini_on'o_f the Court in which KELLER, P.J., and
MEYERS, PRI_cE, WoMAc?I'<,~ JoHNsoN, HERVEY, and ALCALA, JJ.,_ joined. KELLER,
P.J., filed a concurring opinion iii'which PRICE;J., joined. KEASLER, J., filed a
dissenting opinion.
O P IN l Q N
This case raises the issue"' of whether a person retains -a legitimate expectation of

privacy in the contents of his cell phone when that phone is being temporarily stored in a jail

property roorn.l The trial judge granted Anthony Granville’s motion to suppress, concluding

 

j We granted the State Prosecuting Attorney’s (SPA’s) sole ground for review which asks,
May law enforcement, With or without probable cause, activate and' search the

iGranville Page 2
that the high-school student did not lose his legitimate expectation -of privacy in his cell
phone simply because it was being stored in'the jail property room after he had been arrested
for a Class C mi`sdemeanor. The court of appeals affirmed that ruling.2 We granted the
SPA’s petition for discretionary .review, but we reject its'argument that .a modern-day cell
phone is like a pair of pants or a bag of groceries, for which a person losesall privacy
protection once it is checked into a jail property room. We therefore affirm the judgment of
the court of .appeals.

v I.

One morning, Anthony Granville was arrested for the Class C- offense of causing a
disturbance on the',school bus. His cell phone was taken from him during the booking

' procedure and placed in the jail property room. Later that day, Offlcer Harrell, a Huntsville
' Police “School Resources Officer,” was told that, the day before he was arrested, Mr.
Granville had used his cell phone to take a photograph -_of another #student‘urinating in the
boys’ bathroom. Ofticer Harrell, who was not involved in arresting Mr. Granville, then
drove to the jail and retrieved the cell phone from the jail property room. He examined its
contents without first getting.a warrant. The officer turned on the phonc, which had been

turned off. He went through it until he found the photograph he was looking for, then took

 

contents of an inventoried cellular phone that was immediately associated with the
person at the time of his lawful arrest?

® 2 State v. Granville, 373 S.W.3d 218, 227 (Tex. App.-Amarillo 2012) (fact that defendant’s
cell phone was in jail property room did nothing to -“nullif}f’ his “reas`onable expectation of privacy
in the phone searched.”).

Granville Page 3

the phone to his office, and printed a copy of the photo graph. He kept the phone as evidence. _

Mr. Granville was charged with the state-j ail felony of Improper Photography, and he
filed a motion to suppress, arguing that Officer Harrell could not search his cell phone
without a warrant. At the hearing on the motion to suppress, both Officer Harrell and the
prosecutor contended that if an officer has probable cause, he may search anything in the jail
property room that belongs to a jail inmate. There are no exceptions The trial judge tested
this hypothesis by asking the prosecutor,~ “-[D]o you agree that there is an expectation of

privacy on the information the person has on their cell phone?” The prosecutor responded,
/,.»¢*""'°“-M `*~`

,r\"

.. N\.""\ .
“If` you have it inyour"'possession and not committed a `Ci'rme,`sure_._:’_vw She elaborated further: w

 

I think if you"re in the W_alker County jail you have no expectation of privacy"\: §
in the personal effects that you had on you at the time that you were arrested. §
.His expectation of privacy is diminished in those effects until he can and“

does exhibit subjective expectations throu h , presumably at the : . if
l time of his release from detainment or incarceration \? dog 6,{“_}'”£? 27 -'

 

" " ' ' " CO /6)4.¢5'@ `~} f§r/ci+o£
Defense counsel disagreed:‘ [I]t is clear that everybody in this room has some subjective

belief that their cell phone is private and it doesn’t matter if it is lawfully seized by the cops.”
The trial judge posed the legal issue nicely:
So if 1 get arrested for jay walking out here this afternoon and get put in jail,
any officer in town can go out there and go through my phone, cell phone, and
might discover that l have a picture of Promctheus chained to a rock in the

mountains and an eagle eating his liver out?

Y-es, said the State; "“If an officer has probable cause vto believe that you committed a crime
)

mci evidencc‘o'f`that“ciiinc'[i"s] on"y"ou`r' pliciié§'the`n, ‘yé's"`hewc_aii`lock_at"'it'.'"OtheWi§e,"ii'o’h`€ ' "`m"

can’t look at your phone because he wants to. He has to have probable cause.”

 

 

Granville ’ Page4

After studying the law, 'the trial judge granted the motion to suppress and entered

/\

findings of fact, concluding that the cell phone was the personal property of Anthony

Granville; Offi`cer Harrell took possession of it without a warrant; and the officer “searched

the'contents of the cell phone until he found the photograph he soug`ht.”3 Based on his factual

findings, the trial judge concluded that Anthony Granville had a subj ectivej reasonable, and

legitimate expectation of privacy in his cell phone “even when that cell phone [was] in the

 

10.

ll.

12.

13.

14.

3 The trial judge’s complete findings of fact are as follows:

Anthony Granville was arrested and jailed for a class C misdemeanor of Disruption of
School Transportation.

When booked into the Walker County Jail,_Anthony Granville’ s personal effects were taken
from him by Walker County Jail personnel and placed into his property.

Among the items taken from Anthony Granville by Walker County Jailers was a cell phone.
The cell phone taken from Anthony Granville was the personal property of Anthony
Granville.

After his incarceration, Officer Everett Harrell, a school resource officer at the school
Anthony Granville attends, heard from others at the schoolthat Anthony Granville had taken
a photograph of another student

Believing the taking of the photograph to be a possible criminal offense, Oliicer Harrell went
to the Walker County Jail and took possession of Anthony Granville’ s cell phone.

The cell phone was off and Oflicer Hairell had to turn it on to manipulate its controls
Ofiicer Harrell [s]earched the contents of the cell phone until he found the photograph he
sought

Officer Hairell seized the cell phone and checked it into property at the Huntsville Police
Departrnent.

Based on the content of the photograph allegedly taken by Anthony Granville, Anthony
Granville was charged with the State Jail Felony‘offense of Improper Visual'Photography.
At the time QH.icer Hairell top_l_c_p9ssession of Anthony Granville’s phone, he had no valid
se ant ""~"“
Ofi‘icer Hairell had sufficient time to obtain a search warrant for the contents of Anthony
Granville’ s cell phone.

Officer Harrell took possession of Anthony Granville’ s cell phone and could have held it
until a warrant could have been obtained.

No exigent circumstances existed that would have necessitated circumventing the search

» warrant requirement

Granville Page 5

jail inventory of an »accused.” Because -Oflicer Harrell had neither a search warrant nor
exigent circumstances to make a warrantless search of that phone, the trial judge granted the
motion to suppress.4

The State appealed,.and the court.of appeals affirmcd, finding that (l) a person “has
a general, reasonable expectation of privacy in the data contained in or accessible by his cell,
now ‘smart’ plione,”5 and (2) a person continues to have a reasonable expectation of privacy

in the contents of his cell phone even though it has been placed in a jail property room for

 

4 The trial judge’s full conclusions of law were as follows:

1 . Oflicer Everett Harrell had no valid search warrant When he seized the cell phone belonging 9
to Anthony Granvillc. '

2. Ex-i gent circumstances did not exist to lawfully circumvent the necessity of obtaining a
search warrant.

3 . The seizure of Anthony Granville’s cell phone was not accomplished as a search'incident to
arrest.

4. To the extent"that probable cause was necessary for Oflicer Harrell to search the contents of

Anthony Granville’.s cell phone, the Court finds that the State of Texas did not meet its
burden iii demonstrating probable cause as it wholly failed in its evidence to show that
Oflicer Hairell had in his possession at the time he took possession of Anthony Granville’s
cell phone sufficient information to believe that a criminal offense has been committed by
Anthony Granville, specifically that he did not state in his testimony that he had information
that the photograph was taken without the consent of the student photographed or that the
photograph was taken with the intent to invade the student’ s privacy

5 . The Court finds that Anthony Granville had a reasonable expectation of privacy in the
contents of his cell phone.

6. The Court finds that Anthony Granville demonstrated subjective expectation of privacy in
the contents of the cell phone.

7 . The Court finds that the expectation of privacy in the contents of one’ s cell phone is
reasonable and one that society accepts as legitimate, even when that cell phone is in` the jail
inventory of an accused.

5 Granville, 373 S.W,3d- at 223.

Granville Page 6
safekeeping.6 The court of appeals ended its opinion with a.rhetorical vflourish, noting that
“[a]` cell phone is not a pair of pants,” like the pants and shoes whose warrantless seizure
from the jail property room and later search and testing we upheld in Oles v. Sz‘ate.7

II.

Appellate courts afford almost total deference to a trial judge’s findings of fact in a
suppression hearing as long as those factual findings are supported by the record.8 We also-
view his factual findings in the light most favorable to his ruling.9

The Fourth Amendment states that “[t]he right of the people to be secure in their
perso‘ns, houses,lpapers, and effects, against unreasonable searches and seizures shall not be
vidlated.”'° 'The term “papers and »effects” obviously carried a different connotation in the

late eighteenth century than it does today. No longer are they stored only in desks, cabinets,

satchels, and folders. Our most private information is now frequently stored in- electronic

 

6 Id.` at 224-27.
7 993 S.W.2d 103 (Tex. Crim».,App. 1999).

8 State v. Duran, 396 S. W. 3d 563, 570 (Tex Crim. App 2013) (“Appellate courts afford
almost total deference to the trial judge’ s determination of facts (if those facts are supported by the
record) when they review a suppression ruling. ”); see, e g., State v Betts, 397 S. W. 3d 198, 204 (T ex
Crim. App. 2013) (deferring to trial judge’ s factual findings and upholding trial judge’ s
determination that defendant had reasonable expectation of privacy in his aunt’ s back yard where
he kept his dogs).

9 Kothe v. State, 152 S. W. 3d 54, 59 (Tex. Crim. App. 2004) (appellate courts must defer to
the trial judge’ s factual findings concerning a person’ s expectation of privacy and view them in the
light most favorable to the prevailing party; ultimate legal issue of standing` is reviewed de novo).

“’ U.S. CoNsT. amend IV.

Granville Page 7

devices such as computers, laptops, iiPads, and cell phones, or in “the cloud” and accessible

by those electronic devices.‘l But the “central concern underlying the Fourth Amendment”

1

has remained the same throughout the centuries; it is “the concern about giving police

officers‘unbridled discretion to rummage at will among a,person’s private effects.”12 This is v

a case about rummaging through a citizen’s electronic private effects-a cell phone~without
a warrant.

A. Standing: A Cell Phone Owner Has Both a Subjective and Reasonable
Expectation of Privacy in -His Cell Phone.

A person has “standing” to contend that a search or seizure was unreasonable if (1)

he has a subjective expectation of privacy in the place or object searchcd, and (2) society is .

' prepared .to-recognize that expectation as “reasonable” or “legitimate.”13 '-l`he “standing”
doctrine ensures that a person may claim only that his own rights have been violated; he

cannot assert that he is entitled to benefit because the rights of another have been violated.14

 

“ See Bryan A. Stillwagon, Notc, Bringing an End to Warrantless Cell Phone Searches, 42
GA. L. REV. 1165, 1194 (2008).

12 An'zona v. Gant, 556 U. S. 332, 345 (2009).

- --*---»~--+ ~~~~~~~~~~~~~ '~"*~Mnnesoza v 01son,-495 U. s.- 91-, --=95 97 (1990) (an overnight guest in another S home has

a legitimate privacy interest in that premises and thus may challenge its search); Kothe v. State, 152
S. W. 3d at 59 (Tex. Crim. App. 2004) (“Any defendant seeking to suppress evidence obtained in
violation of the Fourth Amendment must first show that he personally had a reasonable expectation
of privacy that the government invaded. He must prove that he was a “victim” of the unlawful
search or seizure. He has no standing to complain about the invasion of someone else’ s personal
vrights. ”) (footnotes omitted).

14 Olson, 495 U S. at 95 (“Since the decision in Kalz v. Unit`ed States, 389 U. S. 347 (1967),
it has been the law that‘ capacity to claim the protection of the Fourth Amendment depends.. .upon
whether the person who claims the protection of the Amendment has a legitimate expectation of

Granville Page 8

A person’s constitutional right to be free from unreasonable searches is a personal right that
cannot be asserted vicariously.15
Courts have held that (1) a person has a subjective expectation of privacy in the

contents of his cel»l_phone,16 and (2) this expectation of privacy is one that society recognizes

 

privacy in the invaded place.”’) (quoting R`akas v. Illinois, 439 _U.S. 128, 143 (1978)).

15 Minnesota v. Carter, 525 U.S. 83, 88 (1998) (“[T]o claim the protection of the Fourth
Amendment, a defendant must.demonstrate that ~he. personally has an expectation of privacy in the
place searched, and that his expectation is reasonable”).

16 See Uriited States v. Wurie, 612 F. Supp.2d 104, 109 (D. Mass 2012) (“It seems
indisputable that a person has a subjective expectation of privacy in the contents of - his or her cell
phone.”), rev 'd on other grounds, 728F.3d l (lst Cir. 2013), cen‘. granted,v 82 U.S.L.W. 3104 (U.S.
Jan. 17 , 2014) (No. 13-212) (upholding defendant’s privacy interest and holding that warrantless
search of cell phone taken from an arrestee was unconstitutional). -As the First Circuit explained in
Wurie: _ '

We suspect that the eighty-five percent of Americans who own cell phones and “use
the devices to do.much more than make phone calls,” . . . would have some difficulty
. with the government’s view that “Wuiie’s cell phone was indistinguishable‘&om

, other kinds of personal possessions, like a cigarette package, wallet, pager, or address

book, that fall within the search incident to arrest exception to the Fourth

Amendment’s warrant requirement In reality, “a modern cell phone is a computer,”

and “a computer . . .`is not just another purse or address book.”

Id. at 8 (citations omittcd); see also United'States v. DiMarco, __ F.Supp.2d'_, 2013'WL 444764,
* 10 (S.D.N.Y. Feb. 5, 2013) (quoting Wurie and stating, “given, the unique and significant
information-storing capabilities of the modern cell',phonc, [defendant] did have a privacy interest in
'.the_ cell phppejhatlthoHicers found in_ his pocket” when they-arrested him); People v.
»aj§l¢§j:;g§_g,$_d;§_l],, 32_§2_~1_&(;919T Ap’p;M j;¢quoting Wurie and “_assuming” that the defendant “had
as(in`able"`cxpecmdon of ' Macy in his cellular Telephone’s &HHHBW’); see generally
Schlossberg v. `Solesbeez 844 F. Sup ¢2d 1'165, 1170 (D.Ur?"§g_l?l‘(“[P]ersonal electronic devices
such as cameras and cell phones cannot be consi ere closed containers” as "these~ devices are
capable of holding large volumes of private information . . . . On adain basis citizens may carry
with them digital cameras, smart phones,.ipads.(or other tablets) and laptops. These devices often
include some combination of email services and intemet browsing. Potential information stored on
them includes: phonebook information, appointment calendars, text messages, call logs,
photographs, audio and video recordings, web browsing history, electronic documents and user
location information, Wayne l arisen &-Rick Ayers, Nat’l lnst. of Standards and Tech;, Guidelines
on Cell Phone Forensics 56 (2007), available at http:// csrc. nist. `gov/:publications/ nistpubs/ 800-

 

 

 

 

Granville Page 9

as reasonable and legitimate17

A person’s subjective expectation of privacy in a cell phone that he owns and
possesses is supported by decades of cases on “standing.”18 A defendant normally has
“standing” to challenge the search of places and objects that he owns. For example, a

homeowner has standing to challenge a search of his home.19 And a person generally has

 

1.01/ sP 800_ .101. pdf.”).

17 See, e.g., United States v. Finley, 477 F.3d 250, 259 (5th Cir. 2007) (rejecting el/Q é:;'
government’s position that because cell phone belonged to his employer;'de`fé'r`i"daiit"did"M ?~`é!o:£ "'i _
standing to challenge search of cell phone; defendant had use of phone and took normal precautions V'¢i ‘\ wei side
to protect privacy of phone calls and records even though he did not have password protection); 5‘?"&’@ 'f""":
Um`ted States v. Lopez~Cri¢z, 730 F.3d;803, 808-09 (9th Cir. 2013) (u_pholding trial judge’sfinding fee @/h»:,,éi/.€..
that defendant who was in possession of cell phones and was using them had a reasonable
expectation ‘of privacy in them; no evidence that defendant did not legitimately possess the phones
or that he failed to take normal precautions to maintain privacy by abandoning them or_ throwing
them away when he was stopped by agents); Q)medi§‘ra¢es v. ' 94 F. Supp.2d 1291, 1299
W (“An owner of a cell phone generally`h._as a reasonable expectation of privacy in
th§,elecnomM d on the .. hone.”); .Szaze v. Carr`&i?§`TTS°”NW§z“d~i“rorii~rwir“"znin)u
(defendant had a reasonable expectation of privacy in his cell phone); Unz'ted States v. Davis, 787
Fl Supp.2d 1165, 1170 (D. Or. 2011) (finding “[a] person has a reasonable expectation of privacy
mhis or her personal cell phone, including call records and text messages” ; U ' edStates v. Gomez, j
W(S.D. Fla; 2011) (defendant had a reasonable_e;pl;:at`iaimj
his cell phone)_ . H ~-~…,,W

,.,....».i‘-m`mm»m,w-Mm~]

  

 

"8 `When asked at oral argument about specific evidence that Mr. Granville had a subjective
expectation of privacy in his cell phone, defense counsel recalled his law-school memory of res ipsa
loquitur, the notion that “the thing speaks for itself.” lt was, after all, a cell phone. Just as one
assumes that a person has a subjective privacy interest in his diary, in.his medical records, in his
bank records, in the content of his telephone calls, and in the content of his personal computer, one
may assume, without further `proof, that a person has a subjective privacy interest iii his cell phone.

19 Alderman v. United States, 394 U.S. 165, 176-80 (1969) (a person’s property interest in
his own home was so great as to allow him to object to electronic surveillance of conversations
emanating from his home, even though he himself was not a party to the conversations).

Granville Page 10

standing to challenge the search or seizure of'a car he owns.z'0
A “legitimate” expectation of privacy acknowledges the lawfulness of the person’s
“subjective” expectation of privacy, As the Supreme Court has explained,

a “‘legitimate”' expectation of privacy .by definition means more than a
subjective expectation of not being discovered A burglar plying his trade in 7
a summer cabin during the off season may have a thoroughly justified
subjective expectation of privacy, but it is not one which the law recognizes
as “legitimate.” His presence . . . is “wrongful”; his expectation is not “one that
society is prepared to recognize as ‘reasonable.’ ” And it would, of ecourse, be
merely tauto`logical to fall back on the notion that those expectations of privacy
which are legitimate depend primarily on cases deciding exclusionary-rule
issues in criminal cases. Legitimation of expectations of privacy by law must
have a source outside of the Fourth Amendment, either by reference to
concepts of real or personal propertyM l_a_w or to understandings that are
recognized and pemme§ One of the main rights attaching to
property is the right to exclude others, . . . and one who owns or lawfully
possesses or controls property will in all likelihood have a legitimate
expectation of privacy by virtue of this right to exclude.21 .

The factors that courts use in deciding whether a person has a reasonable expectation of

H/,,..""'""i»

_,. new . ei-N.Wiw,_m_m-* . 1 ’{I ;€ -.‘r
privacy in the place or objecnsearch'e” ihcludcihe foilowing: ""`"""‘~~~‘-~--~`._“, w/ 121/§ if j

.,/"”"”“MM
§ (l) whether the defe dant had a proprietary or possessory interest in the placeo\q:§x

._\

\_ object searched,

r---»~e-.._,,..
"--~W.-W

 

 

 

211 United States v. Jones, 132 S. Ct. 1945, 950-53 (2012) (trespass upon car by placing GPS
device on its underbelly was an invasion of property rights and constituted a Fourth Amendment
search).

21 Rakas v. Illinois, 439 U. S. 128, 143 n. 12 (1978) (citations omitted).

- <an a supplemental bricf`, the SPA argues that the recent decisions in United States v. Jones,
W) and F_lor_z£l/a__y_`\ Jardines, 133 S. Ct. 1409 (2013) superceded the Katz
“expectation of privacy” modelwith the formei*com`m“`nflaw”liou”fth“`£i`n"éiidinent jurisprudence
based on property law The SPA suggests that these two views of the Fourth Amendment are

mutually cxclusive, but the Supreme Court has stated that they are complementary, not incompatible
Jones, 132 S. Ct at 952 (stating that “the Katz reasonable-expectation-of- -privacy test [was] added

Granville Page ll

(2) whether the defendant’s presence in_or on the place searched was legitimate;
(3) whether the defendant had a right to exclude others from the place or object;

(4) whether the defendant took normal precautions, prior to the search, which are _
customarily taken to protect privacy in the place or object;

(5) whether the place or object searched was put to a private use;

(6) whether the defendant’s claim of privacy is consistent with historical.notion.
of privacy.23 '

Ownership or legal possession of the property searched is not the “be-all-end-all” in deciding
whether a person has a.legitimate expectation of privacy in it. But courts commonly find that
a person has a legitimate expectation of privacy in the contents of his cell phone because of

its “ability to store large amounts of private data” both in the cell phone itself and by

 

-to, not substituted for, the common-law trespassory test.”). The federal courts that have addressed
the issue have agreed with this understanding See, e.g., United States v. Thomas, 726 F.3d 1086,
1092 (9th Cir. 2013) (Fourth Amendment violation may arise under both the Jones common-law
trespassory test or the Katz reasonable_-expectation-of-.privacy test); United States v. Jackson, 728
F.3d 367, 374'(_4th.Cir. 2013) (“The Jardines analysis does not end'the Fourth Amendment inquiry, `
however, because, as Jardines itself makes clear, ‘property rights are not the sole measure of Fourth
Amendment violations’ and ‘[t]he Katz reasonable-expectations test has been added to . . . the
traditional property-based understanding of the Fourth Amendment ”’) (quoting Jardines, 133 S.Ct.
14 14, 14 1 7).

23 Granados v. State, 85 S.W.3d 217, 223 (Tex. Crim. App. 2002); see also United States v.,
Cardoza-Hinojosa, 140 F .3d1 610, 615 (5th Cir. 1998) (assessing a defendant’s reasonable
expectation of privacy by considering whether he has.a property or “"possessor_y interest in the thing
seized or the place searched, whether he has a right to exclude others from that place, whether he has
exhibited a subjective expectation of privacy that it would remain free from governmental intrusion,
whether he took,normal precautions to maintain -privacy[,]- and whether he was legitimately on the '
premises”’) (quoting United States v. Ibarra, 948 F.2d 903, 906 (5th :'Cir. 1991)).

Granville Page 12

accessing remote services.24 This data may involve the most intimate details of a person’s
individual life, including text messages, emails, banking, medical, or credit card information,
pictures, and videos.25 A cell phone is unlike other containers as it can receive, store, and

transmit an almost unlimited am‘ount.o'fprivate. information.26 The potential for invasion of

 

24 State v. Smith, 920 N. E. 2d 949, 955 (Ohio 2009) (“Although cell phones cannot be equated fly `
with laptop computers, their ability to store large amounts of private data gives their users a
reasonable and justifiable expectation of a higher level of privacy in the information they contain.

vOnce the cell phone is'in police»custody, the state has satisfied its immediate interest in collecting /

and preserving evidence and can take preventive steps to ensure that the data found on the phone are j
neither lost nor erased. But because a person has a high expectation of privacy in a cell phone’s l
contents, police must then obtain a warrant before intruding into the phone’s contents.§’); United §
States v. Gomez, 807 F. Supp.2d 1 134, l 140-41 (S.D. Fla. 201 1) (defendant had standing to contest j
search of his cell phone and a reasonable expectation of privacy in its text messages).

25 See Um'ted States v. Wurie, 728 F.3d l, 9 (lst Cir. 2013), cert. granted, 82 U.S.L.W. 3104
(U.S. Jan. 17, 2014) (No. 13-212) (the contents of cell phones are, “by and large, of a highly personal
nature: photographs, videos, written and audio messages (text, email, and voicemail), contacts, '
calendar app,ointments, web search and browsing history, purchases, and financial and medical
records. . . . Indeed, modern cell phones provide direct access to the home in a more literal way as
well; iPhones can now connect their owners directly to a home »computer’s webcam, via an
application called iCam, so that users can monitor the inside of their homes remotely. ‘At the touch
of a button a cell phone search becomes a house search, and that is not a search of a “container” in
any normal sense of that word, though a house contains data.”’) (citations omitted)

_ 26 See United States v. Flores-Lopez, 670 F.3d 803, 805 (7th Cir. 2012) (“A modern cell r`,
phone is in one aspect a diary writ large. Even when used primarily for business it is quite likely to if
contain, or provide ready access to, a vast body of personal data. The potential invasion of privacy _,/
in a search of a cell phone is greater than in a search of a ‘container’ in a conventional sense even;"
when the conventional container is a purse that contains an address book (itself a container) andi\
photos. Judges are becoming aware that _a computer (and remember that a modern cell phone is a\
computer) is not just another purse or address book.”); see also, Maeve Duggan & Lee Rainie, Pew

http: //pewinternet. org/~/media//F iles/Reports/2012/PIP CellActivities_ 1 1 .25 pdf (noting that 29%

Research Ctr.’s Internet & Am. .Life Project, CellPhone Activities 2012, at 2 (2012), available at ~<

of cell phone owners use their phones for online banking, and 31% access medical information);
Elizabeth Woyke, Debate Over Warrantless Cellphone Searches Heats Up, FORBES (Sept._ 7, 201 1), .
available at http: //www forbes.com/sites/elizabethwoyke/ZOl1/_09/07/debate-over-warrantless
cellphone-searches-heatsup/ (a allowing such warrantless searches would expose sensitissinford__`,.ati@n /

m:v=-m.-m,- ma.>»"

commonly stored on businesspersons_sg;ell,phones to governmental view. z d

Granville Page 13

privacy, identity theft, or, at a minimum, public embarrassment is enormous.27

B. A_n Arrestee Normally Has an Expectation of Privacy in the Contents of his Cell
Phone That Is Being Temporarily Stored in a Jail Pi-'operty Room.

Although a person may have a reasonable and legitimate expectation of privacy in the
contents of his cell phone, he may lose that expectation under some circumstances, such as
if he abandons his cell phone,28 lends it to othersto use, or gives his consent to its search.29
Courts across the country have wrestled with questions of when he might lose hisreasonable
expectation of privacy in other situations, perhaps if he is arrested and police perform a

search of his cell phone incident to arrest3° or, as here, of his cell phone stored in the jail

 

27 See, e.g., Newhard -v. Borders, 649 F. Supp.2d 440, 443-44 v(VV.D. Va. 2009) v(former
school teacher and his girlhiend sued police for invasion of privacy When defendant was arrested for
DUI, officers took cell phone that his girlfriend had lent him, accessed nude photographs of himself
and girlhiend in compromising positions, then shared photographs with other ofhcers, which led to
public notoriety and loss of his teaching position).

28 See United States -v. -Powell, 732 F.3d 361, .374-75 (5th Cir. 2013) (when -defendant~
passenger disclaimed any personal connection to cell phone found in car, she lacked standing to
contest its warrantless search by police othcer); compare United States v. Lopez-Cruz, 730 F. 3d
803, 808-09 (9th Cir. 2013) (arrestee did not abandon his privacy interest in cell phones when he
denied ownership of them and said they belonged to a hiend because he was in possession of them
and using them when he was stopped by border-patrol agent).

29 See Lopez-Cruz, 730 F.3d at 809-1 1 (defendant consented for border patrol agent to “look
through” his cell phone, but scope of that consent did not include answering incoming calls).

30 Because the State did not rely upon the “search incident to arrest”doctrine in the trial court,
the court of appeals did not address that doctrine in its opinion. We will not do so either, but we do
note that two separate certiorari petitions have been granted by the United States Supreme Court on
the issue of whether the cell phone of an arrestee may be searched without a warrant under the

“search incidentto arrest” doctrine. Rileyv. California, 82 U S. L. W. 3082 (U. S Jan. 17, 2014) (No.
13-132); United States v. Wurie, 82 U. S. L. W 3104 (U S. Jan. 17, 2014) (No. 13- -212)_. The legal
issue in the present case is similar to, but not the same as, that in Riley and Wurie which came to
opposite conclusions; the California court of appeals upheld the warrantless search as incident to an

-arrest, while the First Circuit held that such a warrantless search violated the Fourth Amendment..

Granville Page 14
property room.

Under the Fourth Amendment, police officers may search an arrestee incident to a

l

lawful arrest.31 The justification for permitting such a warrantless search is (1) the need for

 

Courts across the nation are split on this issue. Compare Smallwood v. State, 1 13 So. 3d 724, 735~38
(Pla. 2013) (condemning warrantless search of cell phone as part of a search incident to arrest); State
v. Smith, 920 N.E.2d 949, 956 (Ohio 2009) (same), cert. denied, 131 S. Ct.102 (2010), with Unz`ted
States v. Murphy, 552 F.3d 405, 41 1-12 (4th Cir. 2009) (need to preserve evidence justified officers’
warrantless retrieval of call records and text messages horn cell phone of suspected narcotics
arrestee), cert. denied, 129 S. Ct. 2016 (2009); UnitedStates v.Finley, 477 F.3d 250, 259-60 (5th Cir.
2007) (although arrestee has a reasonable expectation of privacy in his cell phone and thus had
standing to complain about search, warrantless search of cell phone was permissible as incident to
arrest).

. Even if the State had relied upon the “search incident to 'arrest” doctrine in this case, we note

that the majority of recent cases that have considered the issue in the context of a cell-phone search ,
have held that the search must be contemporaneous (or nearly so) to the arrest itself. See, e.g.,
Murphy, 552 F.3d at 411 (initial search of cell phone occurred when arrestee handed phone to
arresting ofhcer); United States v. Santillan, 571 F.Supp.Zd 1093, 1102 (D. Ariz. 2008).(search of
cell phone occurred “mere minutes after the arrest and seizure”); United States v. Currjy, No. 07-100,
.2008 WL 219966, *10 (D. Me._ Jan.23, 2008) (not designated for publication) (search of cell phone
was “substant:ially contemporaneous” with arrest). Some courts have held that cell-phone searches
that were not closely contemporaneous were not made incident to arrest. See, e.g., Unitea' States v.

~ Gz`bson, 2012 WL 1 123146, *10 (N.D. Cal. April 3, 2012) (not designated for publication) (search
of cell phone was not'incident to arrest When search took place approximately one to-two hours alter
arrest); _United States v. Lasalle, 2007 WL 1390820, *7 (D. Hawaii May 9, 2007) (not designated
for publication) (search of cell phone was not incident to arrest where search was conducted
“somewhere between two hours and fifteen minutes to three hours and forty-five minutes” after
arrest); United States v. Park, 2007 WL 1521573, *7 (N.D. Cal. May 23, 2007) (not designated for
publication) (search of cell phone was not incident to arrest when search took place ninety minutes
after arrest); see also Uni'ted States v. Chadwick, 433 U.S. 1, 15 (1977) (concluding that search of `
locked trunk ninety minutes after an arrest was too remote in time and place to be incident to the
arrest); see generally, Jana L. Knott, ls There an App‘For That? Reexamining the Doctrine of
Search Incident to Lawful Arrest in the Context of Cell Phones, 35 OKLA. CITY L. REV. 445, 445-47
(2010). ' - '

31 United States v. Robinson, 414 U.S. 218, 224-26 (1973) (citing Chimel v. California, 395
U.S. 752, 762-63 (1969) (of`hcer Who had made full-custody arrest for driving a car without a permit
could conduct warrantless search of person as part of that arrest; when officer found crumpled
cigarette pack in arrestee’s pocket, he could seize the heroin capsules_that he found Within that pack).

Granville Page 15
. v officers to seize weapons or other things which might be used to assault on officer or effect
an escape, and (2) the need to prevent the loss or destruction of evidence.32 A search is
incident to arrest only if it isv “substantially contemporaneous” with the arrest and is confined
to the area within the immediate control of the arrestee.33 T.hus, a search incident to arrest
cannot normally be justified if the “‘search is remote in time-or place from the arrest’ . . . or
no exigency exists.”34

In United States v. Edwards,35 the Supreme Court recognized an exception .to the
“substantially contemporaneous” search-incident-to-arrest doctrine and upheld a warrantless
search of an arrestee’s clothes at the police station ten hours after the arrest.36 In Edwards,
the police took the arrestee’s clothes to look for evidence of paint chips that would match

samples that had been taken from the window of the post office during the attempted

burglary.37 The police waited these ten hours because “it was late at night” and they had no

 

32 Id.
33 Vale v. Louisiana, 399 U.S. 30, 33 (1970).

34 United States v. Chadwick, 433 U.S. 1, 15 (1977); see also Schlossberg v. Solesbee, 844
vF. Supp.2d 1163, 1167-71 (D. Or. 2012) (declining to distinguish between electronic devices such
as cell phones, digital cameras, and laptops, and holding that 'a warrantless search of the contents of
a digital camera as a search incident to arrest violated the Fourth Amendment); United States v.
LaSalle, No. 07-00032 SOM, 2007 WL 1390820, *7 (D. Hawaii May 9, 2007) (not designated for
publication) (because police officer did not search cell phone contemporaneously with defendant’s
arrest, the “search incident to arrest” doctrine did not apply; motion to suppress granted).

35 415 U.s. 800 (1974)._
36 Id. at 805.

37 Id. at 801-02.

Granville Page 16
other clothes forEdwards to wear; “it would certainly have been unreasonable for the police
to have stripped [Edwards] of his clothing and left him exposed in his cell throughout the
night.”38 The Court cautioned, however, that in upholding this particular search and seizure
of an arrestee’s clothing, it had “not conclud[ed] that the Warrant Clause of the Fourth
Amendment is never applicable to postarrest seizures of the effects of an arrestee.”39

We relied upon the Edwards ruling and rationale in Oles v. State,40 in holding that the
warrantless search of an arrestee’s clothing was not unlawful because the defendant failed
to establish a subjective and reasonable expectation of privacy in the clothing he wore when
arrested and that had been placed in the jail property room.41 We explained that “arrestees

_ do retain some level of privacy interest in the personal effects or belongings taken from them

incident to their arrest,”42 but that there is a lesser subjective expectation of privacy and a

 

38 Id. at 805 .

39 Id. at 808; see id. at n.9 (“Holding the Warrant Clause inapplicable in the circumstances
present here does not leave law enforcement officials subject to no restraints.”) (emphasis added).

4° 993 S.W.2d 103 (Tex. Crim. App. 1999). We noted the distinctions between the situation
1in»Oles and that in Edwards, including the facts that (l) Oles’s clothes didn’t show any obvious signs
of blood, whereas the clothes in Edwards were “blood-s`pattered”; '(2) Oles ’s clothes were taken eight
days after his arrest, whereas the police took Edwards’s clothes just ten hours alter his arrest; (3)
there was clear probable cause to. search Edwards’s clothing, Whereas there was not probable cause
to believe that Oles’s clothes contained bloodstain evidence relevant to the murder until the clothes
had actually been tested. Based upon those distinction, we concluded that “although Edwards and
Marquez [v. State, 725 S.W.2d 217 -(Tex. Crim. App. 1987)] provide the foundation for today’s
' ruling, clearly they are not dispositive of the issues presented in the instant case.” Id. at 107-08_.

“14.:31 103-11. _

41 Id. sat 103.

Granville Page 17

lesser societal expectation of privacy ~in inventoried propei‘ty.43 Of course, there is a vast
difference between the privacy interests'and expectations in clothing that one is wearing
when arrested and certain other possessions that one might have with them.

Indeed, just a few years after deciding Edwards, the Supreme Court addressed the
scenario of a 200-pound footlocker that had been seized when the defendant was arrested
leaving a train station, but that was not searched until 90 minutes later and was no longer in
the arrestee’s possession.44 The Court held that the evidence obtained from that search must
be suppressed because the footlocker “was property not immediately associated with the
arrestee” at the time of the search.

[O]nce law enforcement officers have reduced luggage or other personal

property not immediately associated with the person of the arrestee to their

exclusive control, and there is no longer any danger that the arrestee might

gain access to the property to seize a weapon or destroy evidence, a search of

that property is no longer incident to the arrest.45
In such circumstances, the police may legitimately “seize” the property and hold it while they

t 46

seek a search warran But they may'not embark upon a general, evidence-gathering search,

 

43 Id. at 109-10.

44 United States .v. 'Chadwick, 433'U.S. l, 4 (1977), overruled on other grounds by Cali omia
v. Acevedo, 500 U.S. 565 (1991); see United States v. Jhan, 74 F.3d 537, 542 n.2 (4th Cir. 1996)
(Chadwick has been overruled only as to closed containers seized horn inside an automobile).

45 Chadwick, 433\U.S. at 15. See also Iliornton v. United States, 541 U.S. 615, 632 (2004)
(Scalia, J., concurring) (“When officer safety or imminent evidence concealment or destruction is
at issue, officers should not have to make fine judgments in the heat of the moment. But in the
context of a general evidence-gathering search, the state interests that might justify any overbreadth
are far less compelling.”). `

s 46 Chadwick,-433 U.S. at 13.

Granville Page 18

especially of a cell phone which contains “much more personal information . than could
ever fit in a wallet, address book, briefcase, or any of the other traditional containers that the
government has invoked.”47

With that general background, we turn to the present case.

III.

In this case, the court of appeals summarized its holding and reasoning as follows:

Due-to the potential invasiveness of the search, Granville’s status as a pretrial

detainee, the fact that his stay in jail for a class C misdemeanor would be of

short duration, the utter lack of any nexus between the cell phone and the

crime for which appellant was jailed, and the lack of evidence suggesting that

the phone and its contents posed any risk to the jail’s penalogical interest, we

conclude that society Would recognize his continued, and reasonable, privacy

interest in the instrument despite his temporary detention.48

The SPA argues that the court of appeals erred because an arrestee “has no legitimate
expectation of privacy in the personal effects immediately associated with his person at the
' time of lawful arrest.”49 In the SPA’s view, Oles was “incorrect to hold that expectations of

privacy in jail are only diminished-rather than nonexistent-and the court of appeals’[s]

decision results directly from that holding and the unnecessary analysis performed to decide

 

47 United States v. Wurie, 728 F.3d l, 9 (lst Cir. 2013) (“Just as customs officers in the early
colonies could use writs of assistance to rummage through homes and warehouses, without any
showing of probable cause'linked to a- particular place or item sought, the government’s proposed
rule would give law enforcement automatic access to ‘a virtual warehouse’ of an individual’s ‘most
intimate communications and photographs without probable cause’ if .theindividual is subject to a
custodial arrest, even for something as minor as a traffic violation.’_’). 2

48 Granville, 373 S.W.3d at 225.

49 sPA’s Briefat 3..

\;~‘§%;3\§ ~§`q‘~§ &§gi//
" s“x\v

er %/
§§' §/ /@{/»//"'!»’/lm J/%(j£l%/Vn§_/ 21st

u;`;.:§i`r /7~/£/»/ </ZW¥ l"/>"c¢',,,,’) ,JGwlle Page 19

   

W"/‘ 2 Mi';? \ -§

. ~ 4 <" raw 4 how 94¢:¢;0 112/w /'2. »
y § f that case. ”3° According to the SPA, when §cifizen is arrested for any offense, c§1'1%22;$ falllli 45»_@#"'§ _/ 92“3£~‘§§§¢§

t y ‘. f " r

§ 322 § /1‘!.4 `!F\<`f:;’
"\¢ § l§?`B%ito wear a seat belt,5l verything that the person possessed at the time of that arrest-purse, fail

v /'~` \-

i s `t\ ` 22

Y."x \. "\ 233 222
§§ il §§ briefcase» laPtOP ¢Omputer, cell phone, medical records, IRS returns, trade secret 33§/
`a" `*~l. 2 2 2
;§:` §§ §gx§-Y ‘2;;*,')~`<;¢
\§1 ;_;~"\n <, information-is subject to a warrantless search because all of that citizen’ s privacy interests 2

§ iii
\\ have completely disappeared We cannot agree with this reasoning

   
 

\ First, the SPA fails to distinguish between a search incident to arrest and a search of
§ faa

1 § §
an arrestee’ s personal property that has already been inventoried and placed in storage/As F‘»‘L 421 _

 

nn w__ »\W' » ' ' -~==; &1.11 l _
rt
the Supreme Court recently explained in Arizona v. Gant,32 the search incident to an arrest § With *
W) §§ §¥l
exception to the warrant requirement is premised upon promoting officer safety and ii 2929

il rt

preventing the destruction of evidence relating to the crime for-_which the person was
arrested.33 Although Gant involved the search of a car, courts have‘discussed its application

to other situations in which “the item searched is removed from the suspect’s control between 3

 

3° Id. at 3-4.

31 See,. e.g., Atwater v. Lago Vista, 532 U.S. 318, 354-55 (2001) (ofhcers could arrest and j ail
mother who, along with her children, was not wearing a seat belt in her.truck; officers at jail made
her remove her shoes, jewelry, and eyeglasses, and detained her in a jail cell).

32 556 U.S. 332 (2009).

~ 33 Id. at 351. ln Gant, police officers arrested the defendant for driving with a suspended
license, handcuffed him, and locked him in the back of a patrol car. Id. at 335. Then the police
searched his car and found cocaine in the pocket of a jacket that had been lying in the back seat. The
Supreme Court held that this search was unlawful under the “search incident to arrest” exception
becausc,'under that exception, officers may search the passenger compartment of a car “only if the
arrestee is within reaching distance of the passenger compartment at the time of the search or if it
is reasonable to believe that the vehicle contains evidence of the offense of arrest.” Id. at 351.

Granville Page 20

the time of his arrest and the time of the search.”54 Some courts have applied Gant in

rejecting'the lawfulness of a search of the contents of an arrestee’s cell phone.55

 

' 54 United States -v. Shakir, 616 F.3d 315, 318 (3d Cir. 2010) (applying Gant to search of a
gym bag that was lying at arrestee’s feet when he was arrested and handcuff`ed; upholding search
because defendant Was still close to gym bag, was not fully secure, and handcuffs are not fail-safe
in preventing dangerous acts by an arrestee); see also United States v. Perdoma, 621 F.3d 745 , 75 0-
52 (8th Cir. 2010) (applying Gant principles to search incident to arrest in bus terminal).

55 See United States v. Wurie, 728 F.3d 1, 3 (lst Cir. 2013), cert. granted, 82 U.S.L.W. 3104
(U.S. Jan. l_7, 2014) (No. 13-212) (citing Gant .and holding_thatlthe_search:incident:to:anest
exception does not authorize the warrantless search of data on a cell phone seized from an arrestee’s _
person, bem-gb-\'/-€r'~’nment has not convinced us that such a search is ever necessary to protect
arresting officers or preserve destructible evidence.”); United States v. DiMarco, No. 12 CR 205
(RPP), 2013 WL 444764,*8 & l 1-12 (S.D.N.Y. Feb. 5, 2013) (not designated for publication) (citing _
Gant and concluding that warrantless search of arrestee’s cell phone more than six hours after
defendant’s arrest was unlawful; “delayed search” was not incident to arrest nor supported by the
ofiicer-saf`ety and evidence-protection justifications of that exception); Unz'tea' States v. Dixon, __
F. Supp.2d __, 2013 WL 6055396, *3 (N.D. Ga. 2013) (citing Gant and concluding that agent’s
action of taking arrestee’s cell phone back to his office and searching it was not a search incident to`
arrest and was unlawful; motion to suppress granted); Um'ted States v. Brown, No. 12-79-KKC,
2013 WL l 185223, *3 (E.D. Ky. March 20, 2013) (not designated for publication) (citing Gant and
upholding initial, brief search of cell phone that was immediately incident to arrest because
defendant was “manipulating” cell phone at time ofiicers ordered him outoftruck; defendant could
have been warning confederate to escape or requesting assistance from him, or he could have been
destroying evidence on cell phone; but once officers determined that “no helpful information was
readily available” on arrestee’s phone, officers should have ceased search of phone’s “contact list”
and sought a warrant); Anthony v. Oliva, No. ED CV 12-1369-FMO, 2013 WL 1127104, *6-7 (C.D.
Cal. Jan. 29, 2013) (not designated for publication) (citing Gant and holding that civil-rights plaintiff
had pled a cause of action against police department when officers allegedly wentbeyond legitimate
purpose of search incident to arrest and began to ‘Flook” and “navigate” through cell phone); State
v. Cooper, No. 66-CR-1 1-2228, 2013 WL 264430, *5 (Minn. Ct. App. Jan. 14, 2013) (not designated
' for publication) (citing Gant and upholding trial court’s suppression of search of cell phone made
long after officer had seized it from arrestee, who could not have retrieved it); see also State v. Smith,
920 N.E.2d 949, 955 (Ohio 2009) _(noting, in a case involving the warrantless search of an»arrestee’s
cell phone incident to arrest, that: “Once the cell phone -is in police custody, the state has satisfied
its immediate interest in collecting and preserving evidence and can take preventive steps to ensure
that the data found on the phone are neither lost nor erased. But_v because a person has a high
expectation of privacy in a cell phone’s contents, police must then obtain a warrant before intruding
into the phone’s contents.”). ‘ v ` ‘

_ Granville Page 21

Second, the SPA makes the false analogy that, if a jail detainee does not have any
privacy rights in his jail cell,56 he therefore does not have any privacy rights in his personal

property that is being safeguarded in the jail property room. The assumption that prisoners

or pretrial detainees are without any Fourth Amendment rights is not supported by the

~w~~,_pw______~_»"___`"__

 

/___‘4_ -._-.4..-.»....».,. , , _..-. 4 ...~_-»~~`_._.-`,., ""°""

§upreme Court. §§ a unanimous Court noted in 1974:

.._.~`.,~_W ___! d_M_,...,.-_»--- m..~_~_`__` `__`___

_Lawful imprisonment necessarily makes unavailable many rights and \
privileges of the ordinary citizen, a “retraction justified by the considerations \§@
underlying our penal system.”. . . But though his rights may be diminished by ’5

the needs and exigencies of the institutional environment, _a prisoner is not n
wholly stripped of constitutional protections when he is imprisoned for crime. §
There is § iron curtain drawn between the Constitution and the prisons of this ’
country./ - j

Oles correctly held that jail detainees enjoy 5a diminished expectation of privacy, not that a

detainee has absolutely no reasonable expectation of privacy.58 Furthermore, the security

 

55 See Hu¢ls'on v. Palmer, 468 U.S. 5 17, 527-36 (1973) (holding “that the Fourth Amendment '
has no applicability to a prison cell” because of the needs of institutional security; “A right of privacy '
in traditional Fourth Amendment terms is fundamentally incompatible with the close and continued
surveillance of` inmates and their cells required to ensure institutional security and internal order.”).'

§§ .
§ 57 '} ol]j"v. 'McDonnell, 418 U.S. 539, 555-56 (1974) (citation omitted).

158 Oles, 993 S.W.2d at 108§ see Bell v. Wolfish, 441 U.S. 520, 556-57 (1979) (“It may well
be argued that a person confined in a detention facility has no reasonable expectation of privacy with
respect to his room or cell and that therefore the Fourth Amendment provides no protection for such
a person. . . . ln any case, given the realities of institutional confinement, any reasonable expectation
of privacy that a detainee retained necessarilywould be of a diminished scope. Assuming, arguendo,
that a pretrial detainee retains such a diminished expectation of privacy after commitment to a
custodial facility, we nonetheless find that the room-search rule does not violate the Fourth
Amendment.”); see also UnitedStates v. Cohen, 796 F.2d 20, 23~24 (2d.Cir. 1986) (detainee “retains
an expectation of privacy within his cell sufficient to challenge the investigatory search ordered by
the prosecutor” to get evidence to aid them “in laying additional indictments against a detainee”;
search was unrelated to jail-security concerns); Lowe v. State, 416 S.,E.Zd 750, 752 (Ga. Ct. App.
1999) (pretrial detainee had reasonable expectation of privacy in papers in his cell containing his

Granville Page 22

rationale and “needs of the institution” that underpin the diminished expectation of privacy
in a jail cell is not equally applicable to property that jailers have already inventoried and are
safeguarding in the property room.59

Third, the SPA contends that, under Oles, any search of any property in the custody
of jail officials is permissible. We disagree with that absolutist position and agree with the
court of appeals that the object of the search makes all the difference between this situation
and that in Oles.60 There, the police seized and tested a pair of pants and shoes for blood.
We noted that the first question was “whether an arrestee retains any expectation of privacy
in clothing lawfully taken and inventoried by police incident to an arrest.”61 After analyzing
various precedent, we concluded that “arrestees do retain some level of privacy interest in

the personal effects or belongings taken from them incident to their arrest,” but that

 

handwriting because search was unrelated to needs of jail and was an attempt to find evidence to
bolster State’s case); State v. Neely, 462 N.W.Zd 105, 112 (Neb. 1990) (pretrial detainee retained
reasonable expectation of privacy in her luggage while it remained in the jail’s locked inventory).

59 S'ee_, e.g., Illinois v. Lafayette, 462 U.S. 640, 648 (1983) (as part of routine procedure
incident to jailing an arrested person, officers may “search any container or article in.[police]'
possession, in accordance with established inventory procedures.”; emphasizing that inventory
search must be conducted pursuant to established procedures); Florida v. Wells-, 495 U.S. l, 4 (1990)
(inventory searches must be conducted pursuant to established inventory procedures, so that they do
not become “a' ruse for a general rummaging in order to discover incriminating evidence.”).

6° ln OIe"s, the defendant was'initially` detained at the police station as a witness to a murder.
When oliicers discovered that he had an outstanding felony warrant, they arrested him, then
inventoried and stored his ":cl'othing.`.. ./Eiglit_"'daysu_!l_a_ter, while the defendant Was still in jail, an
investigator took his clothing t_o the medical`»`examiner-"if"see if he. could find any blood. A serologist"
discovered blood on the ;defend°a'n't?s’shoes'tl‘rat"iriatched the victim’_s blood. 993 S.W.2d at 105`.

61 Id. at-lOG§""

Granville Page 23

[r]eviewing this search under a totality of the circumstances, there is virtually

no evidence that [defendant] harbored a subjective expectation of privacy in

his clothing that was in the custody of the police, nor is there evidence that

society would deem such a belief reasonable under these circumstances

[Defendant] has failed to meet his burden of proof in establishing a legitimate

expectation of privacy in his clothing,62
'l`hat is the general doctrine concerning privacy interests in clothing, but clothing does not
contain private banking or medical information and records; it does not contain highly
personal emails, texts, photographs, videos, or access to a wide variety of other data about
the individual citizen, his friends and family. Searching a person’s cell phone is like
searching his home desk, computer, bank vault, and medicine cabinet all at once. There is
no doubt that the Fourth Amendment protects the subjective and reasonable privacy interest
of citizens in their homes and in their personal “papers and effects.” Conversely, clothing,
- like the shoes seized and tested in 01es, is displayed every time a citizen walks~out into the
world. As_ now-Presiding Judge Keller noted in her concurrence in Oles,

The outside of a person’s shoes while being worn are constantly exposed to the

public. When [_the defendant] Was arrested and incarcerated, the police
obtained lawful possession of his shoes. Given that the outside of the shoes

 

_62 Id. at 1 lO-l 1. In` Oles, we did not state, or even suggest, that a defendant would never have
, a reasonable expectation of privacy in any item that was in the custody of the police. Suppose, for
example, that the officer in Oles had taken a sealed personal letter out of the defendant’s clothes,
opened it, and read it. At least one court has said that the Fourth Amendment would not permit that
officer to open and read someone’s else’s mail without a warrant. See United States v. Wall, No. 08-
60016-CR, 2008 WL 5381412, *3 (S.D. Fla. 2008) (not designated for publication) (warrantless
search of cell phone made during jail booking was improper; stating that “searching through
information stored on a cell phone is analogous to a search of a sealed letter, which requires a
warrant.”) (citing United States v. Jacobson, 466 U.S_. 109, 114 (1984) (“Letters and other sealed
packages/are in the general class of effects in which the public at large has a legitimate expectation
of privacy; warrantless search of such effects are presumptively unreasonable.”).

Granville Page 24
are constantly exposed to the public, appellant could not have a reasonable
expectation of privacy against a visual inspection of the shoes, on the outsid'e,
with the naked eye.63 '

` Similarly, here, the ofticerscould have reasonably inspected the outside of appellant’s cell
phone; they could have tested it for fingerprints or DNA material because portions of the cell
phone are routinely exposed to the public. But we do not think that _a citizen, including
appellant, has lost his'expectation of privacy in the contents of his cell phone merely because l
he has been arrested and his cell phone is in the custody of police for safekeeping.

Although some courts have held that a person does not have a reasonable expectation

of privacy in the contents of his cell phone when he is subjected to a search incident to

arrest,64 citizens themselves have become increasingly concerned about privacy expectations

 

63 Oles, 993 S.W.2d at 111 (Keller, J., concurring). Judge Keller went on to note that,
because the police could also legitimately handle and store the shoes, “even the inside of the shoes
would be exposed to the ofticers,” so that the defendant did not have a reasonable expectation of
privacy in either the inside or outside of the shoes. Id. ‘

64 See, e.g.,United States v. Flores-Lopez, 670 F.3d 803, 810 (7th Cir. 2012) (upholding
search incident to arrest of cell phone to obtain its phone number but questioning whether a more
invasive search would be permissible); United States v. Finley, 477 F.3d250, 259-60 (5th Cir. ~2007;)
(stating that a cell phone is just another “container” and upholding its search as incident to arrest);
People v. Diaz, 244 P.3d 501, 506-08 (Cal. 201 1) (upholding search of ~cell phone 90 minutes aRer
the arrest of narcotics defendant; concluding that a search of an item “immediately associated with
the person” at the time of arrest is valid because of “reduced expectations of privacy caused by the
arrest,” not the nature of the item seized). ln Diaz, the court recognized that it was contributing to
a deepening split between state and federal courts on whether a person has a reasonable expectation
of privacy in\ the contents of his cell phone, but left it to the United States Supreme Court to decide
if modern technology makes a difference to the traditional ability to search the contents of containers
as part of an otherwise legitimate search incident to arrest, z

The citizens of Califor`nia disagreed with the California Supreme Court’s holding, and the
California Legislature promptly passed a bill requiring police to obtain a search warrant before
searching the contents of any ‘;‘fportable electronic devices,’ including cell phones.” Supplemental
Brief~in Opposition, Diaz v. California, 132 S;Ct. 94 v(201 1) (No. 10-1231), 2011 WL'4366007, at

 

 

Granville Page 25

and their cell phones,65 even before the current NSA phone controversy.66

 

*l(describing Senate Bill 914 (2011)). After the state’s attorneys brought that legislation to the f
attention of the United States Supreme Court and urged the Court to deny Diaz ’s writ of;certiorari,`
the Court did so, and, one week later, California’s governor vetoed the “cell phone privacy” bill,
stating that the “courts are better suited to resolve the complex and case-specific issues relating to
constitutional search-and-seizures protections.’~’ Letter from EdmundG. Brown Jr., Governor, to
Members of the California State Senate (Oct. 9, 2011), available at
http://www.leginfo.ca.gov/pub/l1-lZ/bill/sen/sb_0901-0950/sb_914__vt_2011 1009.html. See also
Petition for Certiorari at 6, Riley v. California, No. 13-132,~_ available at
http://Www.volokh.com/wp-content/uploads/ 20 1 3/08/Riley-cert-petition-final-1 .pdf.

165 See, e.g., United r` 8 St Cir. 2013), cert. granted 82 U.S.L.W.
3104 (U.S. Jan. 17, 2014) (No. 13-212) (quoting Maeve Duggan & Lee Rainie, Pew Intemet and _
American Life Project, Privacy and Data Marragement on Mobile Devices (Sre_ptnjwz£_l£))
(publishing.poll survey results that “[m] ore than-half of mobile app users have uninstalled or avoided
cell phone apps because of privacy concerns,” and “[n]early one third of cell owners have
experienced a lost or stolen phone, and 12% have had another person access the contents of their
phone in a way that made them feel their privacy was invaded”; “[t]he rise of the smartphone has
dramatically altered the relationship between cell owners and their phones when it comes to
monitoring and safeguarding their personal information,” said Aaron Smith, a Research Associate
with the Project and report co-author. “The wealth of intimate details stored on smartphones makes
them akin to, the personal diaries of the past_-the information they contain is hard to replace if lost,
and potentially embarrassing in the wrong hands.”), available at
http://www.pewinternet. org/Press-Releases/20 l 2/Mobile-Privacy. aspx.

66 Compare Klayman`v. Obama, ___ F.Supp.2d _, 2013 WL 6571596, * 20 (D.D.C. Dec.
16, 2013) (citing numerous`internet data compilations concerning the ubiquity of cell phones and
other technological devices and noting, “P»ut simply, people in-2013 have an entirely different

relationship with phones than they did thirty-four years ago. As a result, people make calls and send _ 5

text messages now that they would not (really, could not ) have made or sent back when” earlier
search and seizure cases were decided). Judge Leon explained, “Records that once would have
revealed a few scattered tiles.of information about a person now reveal an entire mosaic_a vibrant
and constantly updating picture of the person’s life. Whereas some may assume that these cultural
changes will force people to reconcile themselves to an inevitable diminution of privacy that new
technology entails, I think it is more likely that these trends have resulted in a greater expectation
of privacy and a recognition that society views that expectation as reasonable.” Id. at 21 & n. 59
(noting, “Public opinion polls bear this out. See, e.g., Associated Press, 9/]1 Anm`versary: PollFinds
Public Doubts Growing on Federal Surveillance, Privacy, Hous. :Chron., Sept. 11, 2013, at A6
(“Some 56 percent oppose the.NSA’s collection of telephone records for future investigations even
though they do not include actual conversations.”)), with ACL Uv. Clapper, _ F. Supp.2d _, 2013
WL 6819708 *20-22 (S.D.N.Y. Dec. 27, 2013) (NSA’s collection of _“bulk telephony metadata” did
not violate Fourth Amendment principles; “Some ponder the ubiquity of cellular telephones and how

Granville Page 26

In sum, we conclude, as did the court of appeals, that a cell phone is not like a pair of
pants or a shoe. Given modern technology and the incredible amount of personal information
stored and accessible on a cell phone, we hold that a citizen does not lose his reasonable
expectation of privacy in the contents of his cell phone merely because that cell phone is '

being stored in a jail property room. Officer Harrellw§p_u_l`d have seized appellant’s phone and

 

-..___,_._.__..__.... \._

”.._.._

.» --'--~~“-"~~~- __..~.»-¢\.r............ ._..._..,.._~..,..r ......... ._.

held it whdemhne\_$o”uvg"l}t__§*§§§§_§lvl__M“;§I'M£§:Df,.lg;!j.l:;f.;,..§m;.;gwith,.,probable caus<; he could not

w

“agtiyate.and`s*e,arch¢thecontents¢of.an.in!entorie_c@ellular phone” without one. We answer

 

1 “No” the SPA ’s so_l_e question for review, and we affirm the judgment of the court of appeals.

¢,=--.=»-..~'»~.-~»-..-.~r

Delivered: February 26, 2014
Publish» . -

 

subscribers’ relationships with their telephones have evolved since Smith, While people may ‘have
an entirely different relationship with telephones than they did thirty-four years ago,’ this Court
observes that their relationship with their telecommunications providers has not changed and is just
as frustrating Telephones have far more versatility now than when Smith was decided, but this case
only concerns their use as telephones. The fact that there are more calls placed does not undermine
the Supreme Court’s finding that a person has no subjective expectation of privacy _in telephony
' metadata.”) (citation to Klay_man omitted).

 

 

 

 

 

§

 

s ;;
xr"¢

¢»."
E‘Zit

al

 

v:
..'<

 

 

-r;\\.,~_i,~

 

 

 

 

 

 

 

 

1»'.,

 

 

 

 

 

 

 

 

 

 

` '¢1"»“~ “\~' ;x"`_>

 

 

’.~`\x"'

 

 

 

 

 

… t '.

 

5,@':-§ §'~‘»'=`" '\ '

 

 

 

 

n'_. that '

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

'\X`M'/`\ a
a;':.. l

 

 

 

 

:=l"’~.a a

 

.,~»

;~~ .\,- 1<, »r.~,,vr?»i'.

 

 

run

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

srif_=s -

:‘§

 

,..`_ `_ L. rn. `
:`¢:¢n».,s -,i§v>~.¢».,.

 

 

 

 

 

,» f »':
'. \\\ »' \'.a~,

 

 

. t ~ ,
,Y‘ .» ,\~»..` `-.‘ .~,\ ~ " > ` ( ` ` ‘ »» ~ »
.. , . "- "' ' '! v ' - z . " ~ ‘ ` ' ~'»'
' 5 _ y ~ , ft , , ._r ' 4 - , .-,_».W...u»`»~
,,:_. ~ 4 ' . ~ ' ~. . ' , l l_,.l.;h.v.r
-_<" v‘.-_ ',e¢¢ ‘ . ` ' . v 1 ` ' ’ 5

 

 

 

 

§/év/ b 5 §§ //*" /')77

, ,_M_,_a~_._a…. __ __-__-._a_____, _ __~a 1/’_,4____ /5_ 777

%/Q/ZZ%/»/ §§ /}?”’-5 4-/.;44.47“ //~7; //»1;711.»-4/\' __._,

`\

\~>"" b
j W/Y/’%f/ f""`w 425 //'55/*/¢£4’._ /"°*W /I/W /?/°%t/"? ,4//£;54,`>- 4/;""7' 447 -~,;4/;,{,41,‘1}? 453
355

f/%/§ /7/144/////\/4 //1/ /'7764: 647-411 444 1444/777 ./B/¢/ 444 44774/ 47 /M/@z//‘
7977 141/477 447 4244/447 47447 4719/ 411/444 477 544/441 775/1444 §§

:§:;-»* ay;¢¢p {/)75,,,! .4,1-,'_1,-1~![1<;.:,&§;,£ v \.y

fe .
//71744¢" @L/) ///’5’)/*/£/?¢ 547'5/`/152 pba<a/¢J~/-/ 7 cfd/<'/?//i//j 0/'/ 114¢1>!7; ¢3//// 1147 a

l
5/“//,,17. 74)717;;4 /~55459/4'1< /Z’P 1///71<§ 4274»5474>7’ ?£47.' 7?{%'/44~ 1444 474 4744/11

 

W 14ij4 %A/J/ 144 744/44 § 72/4 445 774/444 793 §17;:./'144: 1‘7~.7;'. 447/742
1~,/1_/11:4///14/1,/ §;5§/ 7:}/4§?4/1/ 7747%777 417 4@4174"" 442 7221:4'1§1 /34:7/" /)é’ 7%7!a

///
,// i/ 1114£1/41_ /%21' O,L(a /4//'/‘?<` Q,;,<:~»/ /,1</~'/ 7?/21$ F/f/,/, €¢)47.7 C/- 1514 /5/51/ /?-,1\/// 444 77 774

,»

` -’" )
__1' /57*"“ `" /45/?.'.-1-7“ //1+'?~:’77'-1“1:> abt/54 LQPQgA/C',¢P .,.;/ / "J’”"¢ 7 17// '“ 674 'Z>" 723/7a // ,;)/~
".

/5515/ < 7.~;- _,~,-;4 1""4?;:1~1~ 7.’.~1:".§`". /-5/£4‘ /<1€,47’17""/57/ 7444»71/1. /,1 75 »1‘>»’ //f~/<’“’ r, 441/741~' 4:;7*7:,:--

fl

/` , , ,.. ' ,.'_,4~ 1
/ éz'_‘,/_'_l`.'.:;/ 55 4‘.;,1~', ;~: 5'”5'/;5 //x/ /1")"{5 .'3' /</4}4’1-3: qzlé- /7'25 //r/S: /7’1‘1: 5 /.`51"'5 /Z'//j 551 `£*' 35_7'1§)"' ”"5" "5""'

. / .
_r _ . 4. ‘ _;~! ,,,1.»~ ¢ , ,7{ -' _.» ,_ '5' 5555'
547";,7" ,/.4€/ § 4§‘.9:1> \.J ¢7~'/ .:1. /7§;// 441/772 771 ~7 1457 47 ”’ /<’L" i/*'“ /~/' /'/<//'1.’/’ 7425"`§'_ 1 A/?K 555‘55 55

 

“/ ll
" ":'l j '" .'.14 ' ”’7 a "` /`,/' w k 5
/?'./1'11" .§1\;.1 471.7}/,£/' L¢_,;§ZS ;”?j?j 5 1145/rr /-5§/¢;_.,12"_;_ /,2§/ j,'/‘ 445/§ ;‘7"5,"»? 743 5“"“’ §Q'§/' ,?’E§ ,§\Bif'£, 5
5 1. . 1,1._ 4 .1_,. 4 "7"» \”045475/ ’1`55`
”7“~‘;7’14177" 714 §45'7-'1€ _7’ '1'7§'7‘,:2#4.71 ’“"";7)4 77 &/_21~49 -1 773 ;Z.l:` /047?4;57;§174/7=44~&4 /7/1~<1~»~

!.

 

/-”"”'*~`\

 

/ ,/1._':1

5;;~“117“7 /<“’>1,11;,7./1"2¢47;€1§ i.“~"'~',f41§%1‘""1444.244177*;€7:'5“ 7 ,.1@;§‘3,7?4:.“14&1?:? T-'?‘.'r';€¢¢;."'?’ ,,7,.~441/455 /’}¢,47_4“4» 77 :__
. , \l
»' 5:/§' ¢7¢--/ 41¢»»'177,47:7' f‘<»fw" c. ‘744.114 1575 fri)§a€~i" "’“7 '*' -z" .;:»717- 7 c

   

5 555 65“7"5'*"7-5'1»;' r;' 44 4:‘~3;~: 1 . 1

 

f _` 11
` " 1 11 »a-»""' 4 . , ,_,1 _,, 1 ‘ ,,»~ _r _, *'5 , ~ . 1 '»» 55"“`
741/15411’4£¢1>.'1&1€?§ ¢'-1'5"€_»7? :;114’~;/!47 /55}¢@ 1144 .//>Y-/»~"~»~'¢»»‘”\f’“ 4 ~- - .» Z5:5 543 149/17 1177 /15515/55 ` ` 551.j

£555;_'-,). ,`5";€54' _______ m

 

/1'7.7.‘55><:1.1'»75 475 ’7“ 1"7”7<77 L¢///""/"/*/-/' 45`5;§ »~7*515451‘7'1:17" 415 / 1.441/!'147'» Z. /1;37: `/ //~'//

_____/ 414/;: 4411/77 647/1542 - 45',45,4,777 21 414/71a /'/'/,744 444 744-113 ram/7

7 ’ ‘5 §£7'/1'/'*'.:/5 1?55;'5'55'/[5
\m£_id 15 ‘5:$‘5,§'/§&1¢`[:5’/0{,),0/\//¥{ xi 443 ‘P~_. _'___ `-5 zwf \ _\-...

 

F__:/,/-
‘)

’\/. 1 - ........
/ 555 §"'\_?'»’4/5¢5":¢4~"( //l;'ig;

, '-J_r’ 5 f 4 ' :
air bill 751/414 !M~' / 05 f;/ 214 /,5/`\,/ /75.€/}5’5!£/.45$,.7&{:4_{::55
3{:1:¥‘ V T / ,_

/
134/‘/ "
4

5 5 5744€9155.555:“5’ \5 1' 55 4§/ ' 1547 ~
751 t;d’ /?55'5'{‘5"' p/}P.’z "`7 } "‘71/4‘5` §1_ 5555)5`;<7{5)\"1”\5'5555 7 &(,LZU./ (51555:’5!5" ,s;,,g_/ ";“`5`5,35;? f’,"£_ @}'s'!{ 5555!§ 535
‘\V./a `~"' k_'}\x\’/'J " "‘55

f _. . 1 `

'5 5'/l F/i//ll.~¢rrl,/DYl

 

 

  

nr.~.

 

-1 \,
\\/

Xanax Addiction Side Effe_cts, Withdrawals, Symptoms & Signs - Park Ro...

E)(H”HZVI/ D ZBELOUJ >'E- l\)E$<#/p,@rmm§

0

http://Www.parkroyalhospital.com/addiction/prescription-drugs/xanaX/signs...

 

l\/lounting financial problems
|nability to focus upon tasks at hand
Slurred speech 5

l_o\'/vered libido

' Physica| symptoms:

Requiring more and greater amounts ot
Xanax to achieve the same pleasurable

1feeHngs
- Physica| dependence upon the drug

Withdrawal symptoms if Xanax is
decreased or discontinued 5
E)<cessive sleepiness

Respiratory depression

Sv\/ollen extremities

l\lausea and vomiting

Blurred or double vision

Dry mouth or throat

Tremors

Headaches

Psychological symptoms:

Paranoia
Confusion

l
l

l\/|emory deficits \

Developing addiction to other substances
Addiction

Psychological dependence

Hal|ucinations

Delusions

lf you feel that you are in crisis, or
are having thoughts about
hurting yourself or others, please
call 9-1-1 or go to the nearest
emergency room immediately

Page 7 af 9

11/1/2014

Xanax Addiction Si_de Effects,_ _Withdrawals, Symptoms & Signs - Pa_rk Ro... Page 8 of 9 f

 

The effects of long-term Xanax abuse Will
differ frorn person to person, but one thing
is clear: addiction to Xanax leaves virtually
no area of an addict’s life unscathed.
Some'of the most common effects of
Xanax abuse include: n n

Crumbling interpersonal relationships
Short-term memory impairment

sooioi isoiorion

Blurned or double vision

Lacl< of muscle coordination

De¢roo`soo iioioo `

Tremors

Pre`occupation With obtaining,' using, and°
recovering from Xanax 1 `
)ob loss y
Financial ruin

_Le_gal problems
lncarceration. , _‘
increased respiratory infections
Depression d i`
Chest pain l
l-lyperactivity "
Suicidal thoughts .

 

' .When an individual Who has become

physically and psychologically dependent
upon Xanax attempts to stop using the
drug, he or she Will likely go through

symptoms -of vvithdrawal. Withdrawal from

Xanax is something that should only be
done under the supervision of a physician

http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/signs... j 1 1/1/2014

_ Xanax Addiction Side Effects, `Withdrawals', Symptoms & -Signs - Park Ro.,. Page 9 of 9

g as the effects of vvithdravval can cause
fl; _,) _' 4 _ serious negative consequences i\/lost
common effects of Xanax Withdravvai

include:

~ insomnia

* Tremors

- i\iausea and vomiting"`
° ~”Brain"fog"»

~ increased anxiety "i
° Depression

~ Suicidai thoughts"and.behaviors

CET COl\'FlD'ENTlAL HELP NOW:

888 919 94§6

;"; 51-"1 '_'" us

(_,.--`) CET CONF|DENT|AL Pari<'Royal hospital provides modern, compassionate treatment for adults
\. ,; ' HELP NOW: and seniors suffering With mental health issues and co-occurring n

888 919 disorders
124-16 About

11 US v `About Parl< Royal
~ Our Location
_ © 2014 Pork Royoi ¢ Our i\/lission
Hospital, all rights Programs
reserved.
~ Programs
Legal Links ‘ Aduit$ 7
' ~. Older Acluits & Seniors
» Privacy Proctices ~ intensive Outpatient Therapy'

' Corporate Compliance Admissions ;

- Admissions
»' Professional Referrals
~ insurance & Payment information

http`://www.parkroyalhospitel . com/addiction/prescaption-drugs/xanaX/signs. . t 1 1/ 1/2014

Xanax Addiction Side Effects, Withdréiwals, Symptom`s & Signs - Park Ro... Page 4 of 9

rea_uire drug rehab before embarking on a

new, sober iife.

GET C`,GNFIDENT§/-§L HE!_P NO\/\/:

333.9§9.94-€6

i_';- emer/ us

' Statistics

Addiction and abuse of Xanax is a rapidly _
growing problem in the United States.
Betvveen 2004 and 2010, the number of
individuals vi/ho visited the emergency

- room suffering from Xanax effects nearly
trip|ed. Of the 125,000 Who visited the ER
in 2010, over 96,000 had used more than
one drug With Xanax - most often alcohoi,
marijuana, cocaine, or opiate narcotics

ln 2011, Treatrnent Episode Data Set
Report discovered that 60,200 individuals
Who sought rehab Were addicted to
b`enzos such as Xanax; a Wiid increase
from 1998 in Which 22,40_0 individuals

- sought treatment for the same drug class.

Co-Occurring `
Disorders '

Addiction to Xanax rarely occurs in the
absence of other mental illnesses. The
most common co-occurring disorders

include:

 

http ://Www.parkroyalhospital;com/addiction/prescription-drugs/XanaX/signs. . ._ 1 1/1/2014

i//*_`\.

Xzinax Addiction Side Effects, Withdraweis, Syrnptoms & Signs - Park Ro... Page 2 of 9

-~Left Rail Menus -

_ Prescription Drugs S§;H_;H "
.§> _"_;,j€*&i- ""~"*“*i ':

~ Prescription Drugs-

~ Effects, Signs &
Synnptoms

~ Xanax l

' Ef.fects, Signs & _
Symptorns»

- \/icodin `_

- Effects, Signs &
Syrnptoms` .

'- Oxycoclone

- Effects, Signs &

~ Symptoms
Afiiliations &
Recognition

Joint`
Co_rnmission
Gold Seal_'of
Approvai

 

The Jas_on

§' Foundation

http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/sigris'.'.".

 

Acldiction 4
Symptoms,_ Causes,

' Si?g{ns & Si`de Effects

coNTENTs `

Statistics

Co»Occurr.ina, Disorders
Causes `
§\/I'i’ip:i`.(>i"t'i$iv

Effe:ts of Xanax ./~`>.b;zse

Effects of \/'\/'iti'idravi/ai

Xanax, the trade name of a drug called
”aiprazolam," is a benzodiazepine

medication that is prescribed by doctors

for short-term management of anxiety or
sleep disorders. Xanax produces its
calming effects by suppressing the
inhibitory"receptors in the brain and

f central nervous system to decrease the
_, abnormal excitement in the brain that

leads to anxiety symptoms. Whiie most '
individuals Who take Xanax follow the
doctor's instructions, taking the drug at the
proper time at the proper dose and
discontinuing usage as indicated.
Unfortunately for some, Xanax can
become addicting if taken in large
quantities over a long period of time.

ll ll

Known on the street as "bars, planl<s,”
or "zanies," Xanax-abuse is ever~ ~

increasing Some individuals combine

 

333.9@5
416

§_; <‘ma/’/ as

Two

it Was during my first
Weei< at Pari< R'oyal
that l realized l
needed to.be here
and that these Were
the people Who
Would help me cope
With my depression.

’ -- i\/latt l\/l.

 

Tai<e a \/irtual Tour!
Contact Us Today

11/1/2014

Xanax Addiction Side Effects, Withdrawals,:Symptoms & Signs - Park Ro... Page 3 of 9

Xanax with other downer drugs like
opiates or alcohol in order to increase the
pleasurable feelings This can lead to
negative health consequences such as

` respiratory arrest, coma, and death.

` Others use Xanax to control unwanted-
side effects of stimulant abuse. This
combination of uppers and downers can
lead to cardiovascular complications such _
as myocardial infarction.

The effects of Xanax abuse and addiction
know no bounds Every part of an addict's

- life can be altered by addiction to . i
alprazolam. Family relationships grow
strained, work productivity decreases and
the individual may begin to feel trapped in
a vicious cycle of addiction. i\legative
health_consequences may become
apparent, but an addict feels trapped in a
cycle of obsessing about Xanax - getting
more, using more, and recovering from the
effects of the drug. t `

With prolonged usage, individuals may
become dependent upon Xanax, meaning
that they rely upon the drug both
physically and -psychologically. in Xanax,
many addicts have found a pleasant
escape from everyday stres`sors and must
relearn how to have a productive,
enjoyable life without Xanax. Sober living
skills often take time to develop as an
individual addicted to Xanax`may feel life
without the drug is unbearable. l\/lany
addicts in fact, take Xanax to feel normal
and function in everyday life, as'they may
have come to believe that they cannot
function without itl These individuals will

http://www.parkroyalhospita'l. com/addiction/prescription-drugs/Xanax/signs. .. 1 1/1/2014

Xanax Addiction Side Effects, Withdrawals, Symptoms & Signs - Park Ro... Page 5 of 9

'> B'ipolar disorder
° 'Schizophrenia

° Stimulant abuse

 

 

Causes

Addiction is thought to be a disease
caused by multiple factors working
together. Causes for Xanax addiction may
include:v .

Genetic:_lndividuals who have a relative
who struggles with addiction to Xanax or
other substances are more likely to n
develop an addiction to Xanax themselves
While nota definitive indicator, there is
absolutely a greater risk among family
members

[BF , _\ =iiemisi:z’;: Xanax works by _
decreasing the excitement transmitted via
neurotransmitters in the brain. individuals
who have an inborn tendency toward
increased levels of these neurotransmitters

 
   

may seek ways to decrease this
excitement and may self-medicate with
Xanax.

Environmenta|: individuals who are born
into an unstable home environ'ment,
especially if substance abuse is modeled
by a parent or guardian, are a_t greater
risks for developing substance abuse later

in |ife.

al: As addiction rarely occurs

 

without the presence of another mental

http://Www.parkroyalhospital.ciom/addiction/prescription-drugS/Xanax/Signs. 1 1/1/2014

 

Xanax Addiction Side'Effeots, Withdrawals, Syrnptoms & Signs - Park Ro... Page 6 of 9

illness/many individuals who struggle with
undertreated or undiagnosed mental
illnesses may turn to drugs or alcohol in
order to manage the symptoms of their
disorder.

Symptoms

Symptoms of Xanax abuse and addiction
will vary among individuals depending
upon individual genetic makeup, level of
. dependence length of addiction, and
amount used. Common symptoms of
Xanax addiction include the following:

    

?;“'“'~:liw, :B"I,¢.~¢,-,.‘

,_mp_t@_,_i§s:

lncreased_anxiety

Depression

0

Mood swings

__ lrritability

Behavioral_ symptoms:

Doctor shopping

Appearing drowsy

Lying or stealing to further Xanax habit
Stealing or borrowing Xanax from friends

and loved ones ,\

Hiding stashes of Xanax in various places
around the home, office, and car
"Losing" multiple prescriptions for Xanax

Lying about amount used
Withdrawing from previously enjoyable

activities
Decline in academic or occupational

functioning
¢ Strained interpersonal relationships

i.egal~ problems

http://Www.parkroyalhospital.com/addiction/prescription-drugs/XanaX/signs. .. 1 1/1/2014

