{"id":15359,"date":"2015-01-08T09:13:13","date_gmt":"2015-01-08T14:13:13","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=15359"},"modified":"2015-01-10T11:37:47","modified_gmt":"2015-01-10T16:37:47","slug":"e-d-n-c-third-party-doctrine-well-entrenched-and-sca-shows-congress-isnt-changing-it-yet","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=15359","title":{"rendered":"E.D.N.C.: Third-party doctrine well entrenched and SCA shows Congress isn&#8217;t changing it, yet"},"content":{"rendered":"<p>All things considered, the third party doctrine is well established in SCOTUS precedent, and the court declines to depart from it. In addition, the Stored Communications Act, remaining unchanged, is evidence that Congress intends it to remain that way. Cell site location information and a Facebook production order are sustained. In addition, the Google search warrant was overbroad but saved by the good faith exception. United States v. Shah, 2015 U.S. Dist. LEXIS 826 (E.D. N.C. January 6, 2015) [This is a lengthy and demoralizing opinion for those expecting any change in the third party doctrine, but it is correct. A USDJ is stuck with precedent and can&#8217;t go out on a limb except to ask for change.]. As to overbreadth:<br \/>\n<!--more--><\/p>\n<blockquote><p>The provision [of the warrant] describing the documents \u201cseized\u201d makes a general reference to \u201c[a]ll information described above in Section I that constitutes fruits, evidence, and instrumentalities of Title 18, United States Code, Sections 1030 (Fraud and Related Activity in Connection with Computers).\u201d (Google Warrant, 6). This statute, also known as the federal Computer Fraud and Abuse Act (\u201cCFAA\u201d), prohibits a wide array of activities, including the use of computers to transmit information restricted by the United States without authorization, intentionally accessing a computer without authorization or exceeding authorized access to obtain financial records, accessing nonpublic computers of the United States in a way which affects the government\u2019s use, accessing protected computers without authorization in order to commit fraud, threatening to cause damage or obtain information from a protected computer, conspiracy to commit these offenses, and other activities. See 18 U.S.C. \u00a7 1030(a).<\/p>\n<p>A violation of the CFAA would not necessarily generate such \u201cdistinctive evidence\u201d as bank robbery or narcotics. Dickerson, 166 F.3d at 694. Nor would evidence necessarily be as distinctive as that of child pornography, a type of crime more commonly targeted by warrants for electronic information. E.g. United States v. Schesso, 730 F.3d 1040, 1044 (9th Cir.2013); United States v. Deppish, 994 F.Supp.2d 1211, 1214 (D. Kansas 2014). Rather, a warrant authorizing collection of evidence of a CFAA violation comes closer to warrants seeking to collect evidence regarding violations of broad federal statutes prohibiting fraud or conspiracy. In these cases, limitation by reference to the broad statute fails to impose any real limitation. See United States v. Maxwell, 920 F.2d 1028, 1033 (D.C.Cir.1990) (\u201cAlthough a warrant\u2019s reference to a particular statute may in certain circumstances limit the scope of the warrant sufficiently to satisfy the particularity requirement \u2026 it will not do so where, as here, the warrant authorizes seizure of all records and where, as here, the reference is to a broad federal statute, such as the federal wire fraud statute.\u201d); Rickert v. Sweeney, 813 F.2d 907, 909 (8th Cir.1987) (general search limited only by broad tax evasion statute held overly broad, where probable cause existed only to search for evidence of tax evasion in connection with one particular project); United States v. Roche, 614 F.2d 6, 7\u20138 (1st Cir.1980) (warrant\u2019s limitation of search to \u201cfruits and instrumentalities of the violation\u201d of federal mail fraud statute was inadequate because \u201climitation by so broad a statute is no limitation at all.\u201d).<\/p>\n<p>The Google Warrant provides no other details to clarify the particular crime at issue. Section II(a) makes reference to \u201cunauthorized network activity,\u201d yet gives no indication as to the meaning of this phrase, which would seem to be implicated in almost all of the activities prohibited by the CFAA. The warrant offers nothing about the time frame of the offense. See United States v. Hanna, 661 F.3d 271, 287 (6th Cir.2011) (noting, in upholding search warrant for electronic information, that the warrant was limited to \u201cthe time period that the evidence suggested the activity occurred.\u201d) Rather, it provides for the seizure of all evidence of violations of the CFAA \u201csince account inception.\u201d (Google Warrant, 6).<\/p>\n<p>Although the test for particularity \u201cis a pragmatic one,\u201d and must consider \u201cthe circumstances and type of items involved,\u201d Torch, 609 F.2d at 1090, the record does not indicate that circumstances of the investigation precluded a more particularized description of the crime. Special Agent Ahearn\u2019s supporting affidavit provides copious details as to the time and nature of the alleged offenses. Had the Google Warrant properly attached or incorporated this affidavit, it could have provided the necessary context for the search. Hurwitz, 459 F.3d at 471 (\u201c[A]n affidavit may provide the necessary particularity for a warrant if it is either incorporated into or attached to the warrant.\u201d) (quoting United States v. Washington, 852 F.2d 803, 805 (4th Cir.1988)). Yet the Google Warrant makes no incorporation, and it does not appear from the record that the affidavit was attached. Without the Google Warrant somehow including the additional details provided by Special Agent Ahearn\u2019s affidavit, the affidavit itself cannot satisfy concerns for particularity or overbreadth. See Groh v. Ramirez, 540 U.S. 551, 557 (2004) (\u201cThe Fourth Amendment by its terms requires particularity in the warrant, not in the supporting documents.\u201d).<\/p>\n<p>\u201c[T]here are grave dangers inherent in executing a warrant authorizing a search and seizure of a person\u2019s papers that are not necessarily present in executing a warrant or search for physical objects whose relevance is more easily ascertainable.\u201d Williams, 592 F.3d at 523\u201324 (quoting Andresen v. Maryland, 427 U.S. 463, 482 n. 11). \u201cBecause electronic devices could contain vast quantities of intermingled information, raising the risks inherent in over-seizing data \u2026 law enforcement and judicial officers must be especially cognizant of privacy risks when drafting and executing search warrants for electronic evidence.\u201d Schesso, 730 F.3d at 1042; see also In the Matter of the Search of Info. Associated with [redacted]@mac.com that is Stored at Premises Controlled by Apple, Inc., 13 F.Supp.3d 157, 166\u201367 (D.D.C.2014) ( \u201cD.D.C. Mac.com Order \u201d). Especially in light of the nature of the search and seizure here, the Google Warrant is not drafted with sufficient particularity. In the absence of additional details, the warrant fails to identify the \u201cparticular crime\u201d for which officers were to seek evidence. Therefore, the warrant lacks the particularity required by the Fourth Amendment.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>All things considered, the third party doctrine is well established in SCOTUS precedent, and the court declines to depart from it. In addition, the Stored Communications Act, remaining unchanged, is evidence that Congress intends it to remain that way. Cell &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=15359\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,7,79],"tags":[],"class_list":["post-15359","post","type-post","status-publish","format-standard","hentry","category-good-faith-exception","category-overbreadth","category-third-party-doctrine"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/15359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15359"}],"version-history":[{"count":4,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/15359\/revisions"}],"predecessor-version":[{"id":15399,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/15359\/revisions\/15399"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15359"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}