A temporal limitation on a computer search isn’t practical because it could unreasonably limit investigators’ ability to search for files within the search authorization. “Though a temporal limitation is one possible method of tailoring a search authorization, it is by no means a requirement.” United States v. Richards, 2017 CAAF LEXIS 709 (July 13, 2017):
Searches of electronic devices present distinct issues surrounding where and how incriminating evidence may be located. While we support the notion that “warrants for computer searches must affirmatively limit the search to evidence of specific federal crimes or specific types of material,” United States v. Riccardi, 405 F.3d 852, 862 (10th Cir. 2005), we also recognize the dangers of too narrowly limiting where investigators can go. As stated by the United States Court of Appeals for the Seventh Circuit, “[u]nlike a physical object that can be immediately identified as responsive to the warrant or not, computer files may be manipulated to hide their true contents.” United States v. Mann, 592 F.3d 779, 782 (7th Cir. 2010). “[I]n the end, there may be no practical substitute for actually looking in many (perhaps all) folders and sometimes at the documents contained within those folders, and that is true whether the search is of computer files or physical files. It is particularly true with image files.” Burgess, 576 F.3d at 1094; see also United States v. Williams, 592 F.3d 511, 521-22 (4th Cir. 2010) (positing an implied authorization for officers to open each file on the computer and view its contents, at least cursorily, to determine whether it falls within the scope of the warrant’s authorization. “To be effective, such a search could not be limited to reviewing only the files’ designation or labeling, because the designation or labeling of files on a computer can easily be manipulated to hide their substance”). Of course our reluctance to prescribe ex ante limitations or require particular search methods and protocols does not render them immune from an ex post reasonableness analysis. See, e.g., United States v. Christie, 717 F.3d 1156, 1167 (10th Cir. 2013) (“[E]ven if courts do not specify particular search protocols up front in the warrant application process, they retain the flexibility to assess the reasonableness of the search protocols the government actually employed in its search after the fact, when the case comes to court, and in light of the totality of the circumstances.”).
In charting how to apply the Fourth Amendment to searches of electronic devices, we glean from our reading of the case law a zone in which such searches are expansive enough to allow investigators access to places where incriminating materials may be hidden, yet not so broad that they become the sort of free-for-all general searches the Fourth Amendment was designed to prevent.
On one hand, it is clear that because criminals can—and often do—hide, mislabel, or manipulate files to conceal criminal activity, a broad, expansive search of the hard drive may be required…. On the other hand, … granting the Government a carte blanche to search every file on the hard drive impermissibly transforms a “limited search into a general one.”
United States v. Stabile, 633 F.3d 219, 237 (3d Cir. 2011) (citations omitted).
Appellant argues that the November 9, 2011, authorization was overbroad because it did not contain a temporal limitation when that information was available and known to investigators. Applying the above Fourth Amendment law, we conclude that the authorization did not require a date restriction because it was already sufficiently particularized to prevent a general search. Though a temporal limitation is one possible method of tailoring a search authorization, it is by no means a requirement. Here, the authorization and accompanying affidavit did not give authorities carte blanche to search in areas clearly outside the scope of the crime being investigated. They were entitled to search Appellant’s electronic media for any communication that related to his possible violation of the Florida statute in his relationship with AP.
We also conclude that the authorization allowed for a search of the unallocated space and through potential communications materials that did not have an immediately clear date associated with them. The precise extraction process utilized by Agent Kleeh and the accessibility of metadata on unallocated materials was not fleshed out in trial or anywhere on the record. However, we deduce from Mr. Kleeh’s testimony that metadata for unallocated materials often does not exist or is difficult to extract. We conclude that the possibility that relevant communications could have existed among the unallocated materials provided sufficient basis to subject those materials to an authorized and particularized search.
by John Wesley Hall
Criminal Defense Lawyer and
Search and seizure law consultant
Little Rock, Arkansas
Contact: forhall @ aol.com / The Book www.johnwesleyhall.com
"If it was easy, everybody would be doing it. It isn't, and they don't." —Me
"Life is not a matter of holding good cards, but of playing a poor hand well." –Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others)
“I am still learning.” —Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)).
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers."
—Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848)
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams
v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold,
J.), rev'd Nix v. Williams, 467 US. 431 (1984).
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws,
or worse, its disregard of the charter of its own existence." —Mapp
v. Ohio, 367 U.S. 643, 659 (1961).
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).
"There have been powerful hydraulic pressures throughout our history that
bear heavily on the Court to water down constitutional guarantees and give the
police the upper hand. That hydraulic pressure has probably never been greater
than it is today."
— Terry
v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).
"The great end, for which men entered into society, was to secure their
property."
—Entick
v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)
"It is a fair summary of history to say that the safeguards of liberty have
frequently been forged in controversies involving not very nice people. And
so, while we are concerned here with a shabby defrauder, we must deal with his
case in the context of what are really the great themes expressed by the Fourth
Amendment."
—United
States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)
"The course of true law pertaining to searches and seizures, as enunciated
here, has not–to put it mildly–run smooth."
—Chapman
v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).
"A search is a search, even if it happens to disclose nothing but the
bottom of a turntable."
—Arizona
v. Hicks, 480 U.S. 321, 325 (1987)
"For the Fourth Amendment protects people, not places. What a person knowingly
exposes to the public, even in his own home or office, is not a subject of Fourth
Amendment protection. ... But what he seeks to preserve as private, even in
an area accessible to the public, may be constitutionally protected."
—Katz
v. United States, 389 U.S. 347, 351 (1967)
“Experience should teach us to be most on guard to
protect liberty when the Government’s purposes are beneficent. Men born
to freedom are naturally alert to repel invasion of their liberty by evil-minded
rulers. The greatest dangers to liberty lurk in insidious encroachment by men
of zeal, well-meaning but without understanding.”
—United
States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)
“Liberty—the freedom from unwarranted
intrusion by government—is as easily lost through insistent nibbles by
government officials who seek to do their jobs too well as by those whose purpose
it is to oppress; the piranha can be as deadly as the shark.”
—United
States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)
"You can't always get what you want /
But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards
"In Germany, they first came for the communists,
and I didn't speak up because I wasn't a communist. Then they came for the Jews,
and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists,
and I didn't speak up because I wasn't a trade unionist. Then they came for
the Catholics and I didn't speak up because I wasn't a Catholic. Then they came
for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration
camp]
“You know, most men would get discouraged by
now. Fortunately for you, I am not most men!”
---Pepé Le Pew
"The point of the Fourth Amendment, which often is not grasped by zealous officers,
is not that it denies law enforcement the support of the usual inferences which
reasonable men draw from evidence. Its protection consists in requiring that
those inferences be drawn by a neutral and detached magistrate instead of being
judged by the officer engaged in the often competitive enterprise of ferreting
out crime."
—Johnson
v. United States, 333 U.S. 10, 13-14 (1948)