Answered

In the uploaded document Craig v Boren how would I use this in a legal argument defending the constitution rights to privacy?