{"id":17197,"date":"2015-05-11T06:51:40","date_gmt":"2015-05-11T11:51:40","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=17197"},"modified":"2015-05-11T06:51:40","modified_gmt":"2015-05-11T11:51:40","slug":"s-d-n-y-email-warrant-need-only-show-fair-probability-evidence-would-be-found-in-it-all-emails-for-three-years-not-overbroad-in-conspiracy-case","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=17197","title":{"rendered":"S.D.N.Y.: Email warrant need only show &#8220;fair probability&#8221; evidence would be found in it; all emails for three years not overbroad in conspiracy case"},"content":{"rendered":"<p>Defendant\u2019s email account, shown on a website as a \u201ccontact\u201d email address, was accessed by a search warrant for evidence of her being involved in a fraud against the government. Direct evidence that an email account actually contains evidence is not required: It is a \u201cfair probability\u201d that evidence would be found. More difficult is potential overbreadth, but the court concludes that the warrant could not be more specific, and the three years of emails from the conspiracy period could be word searched. Searching emails is not unlike searching files in paper cases. In any event, the clauses of search warrants are severable. United States v. Barnes, 2013 U.S. Dist. LEXIS 189631 (S.D.N.Y. October 21, 2013):<br \/>\n<!--more--><\/p>\n<blockquote><p>Barnes&#8217;s basic argument is that even if the limitations on the scope of the seizure would render that seizure, standing alone, permissible under Galpin, the fact that the ISPs first disclosed to the Government all of the information listed in the warrants&#8217; &#8220;disclosure&#8221; sections \u2014 essentially, the entire contents of the two email accounts\u2014made the procedures authorized by the warrants &#8220;tantamount to a general search.&#8221; Def. Br. at 11. The Court disagrees.<\/p>\n<p>Barnes&#8217;s argument is not without intuitive appeal, and the Court is conscious that searches involving stored digital content raise unique privacy concerns. Cf. Galpin, 720 F.3d at 447 (&#8220;[A]dvances in technology and the centrality of computers in the lives of average people have rendered the computer hard drive akin to a residence in terms of the scope and quantity of private information it may contain.&#8221;). However, the Supreme Court recognized long ago that searching for files is not like searching for tangible objects, because it is impossible to know whether a given file contains relevant evidence without looking at it. See Andresen v. Maryland, 427 U.S. 463, 482, 96 S. Ct. 2737, 49 L. Ed. 2d 627 n.ll (1976) (&#8220;In searches for papers, it is certain that some innocuous documents will be examined, at least cursorily, in order to determine whether they are, in fact, among those papers authorized to be seized.&#8221;). The same is true with computer hard drives and, as in this case, email accounts. See Bowen, 689 F. Supp. 2d at 682 (&#8220;In a search for electronic documents such as e-mails, &#8216;the actual content of a computer file usually cannot be determined until it is opened with the appropriate application software on a computer&#8217; or until each file is analyzed by a program capable of searching the files for specific content.&#8221; (quoting United States v. Lamb, 945 F. Supp. 441, 458 (N.D.N.Y. 1996))). The Government is thus correct that the search protocol used in this case is not &#8220;remotely atypical,&#8221; Gov. Opp. at 8; see Vilar, 2007 U.S. Dist. LEXIS 26993, 2007 WL 1075041, at *35 (&#8220;it is frequently the case with computers that the normal sequence of &#8216;search&#8217; and then selective &#8216;seizure&#8217; is turned on its head&#8221; (quoting In re Search of 3817 W. West End, 321 F. Supp. 2d 953, 958 (N.D. Ill. 2004)) (internal quotation marks omitted)), and the mere fact that the warrants required the ISPs to initially disclose the entire contents of Barnes&#8217;s accounts to the Government does not render them invalid.<\/p>\n<p>. . .<\/p>\n<p>In Galpin, the Second Circuit adopted a severability test originally established by the Tenth Circuit. See 720 F.3d at 448 (citing United States v. Sells, 463 F.3d 1148, 1155-58 (10th Cir. 2006)). A court must first &#8220;separate the warrant into its constituent clauses,&#8221; then &#8220;examine each individual clause to determine whether it is sufficiently particularized and supported by probable cause,&#8221; and finally &#8220;determine whether the valid parts are distinguishable from the nonvalid parts.&#8221; Id. at 448-49. &#8220;In sum, the court must be able to excise from the warrant those clauses that fail the particularity or probable cause requirements in a manner that leaves behind a coherent, constitutionally compliant redacted warrant.&#8221; Id. at 449.<\/p>\n<p>Under that standard, the warrants&#8217; constituent clauses are separable, and their valid parts are distinguishable from their invalid parts. As the Government suggests, if one were to remove the &#8220;smuggling&#8221; clauses entirely, the warrants&#8217; &#8220;seizure&#8221; sections would first authorize the seizure of all of the information disclosed by the ISPs\u2014both content and non-content\u2014that &#8220;constitutes fruits, evidence and instrumentalities of the charged crimes. Harris Decl. Ex. D. After that initial clause, the warrants become clarificatory; excluding the &#8220;smuggling&#8221; clauses, they would provide merely that the seizure authorized by the initial clause &#8220;includ[es]&#8221; certain categories of information, such as transactional information, business records and subscriber information, and records of who &#8220;created, used, or communicated with&#8221; the accounts. Id. Although excising the &#8220;smuggling&#8221; clauses would thus remove a (perhaps helpful) clarification that the authorized seizure included &#8220;electronic mail, private messages, and other content information,&#8221; it would not affect whether the seizure of such information was, in fact, authorized. And because that authorization references the specific kinds of files described in the &#8220;disclosure&#8221; sections and is limited by reference to the crimes with which Barnes was charged, the remaining sections of the warrants are valid. See Galpin, 720 F.3d at 446; United States v. Levy, No. 11 Cr. 62 (PAC), 2013 U.S. Dist. LEXIS 25508, 2013 WL 664712, at *9 (S.D.N.Y. Feb. 25, 2013); United States v. Dupree, 781 F. Supp. 2d 115, 148-49 (E.D.N.Y. 2011).<\/p><\/blockquote>\n<p>Cited with approval in United States v. Romain, 2014 U.S. Dist. LEXIS 166500 (S.D.N.Y. December 1, 2014).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defendant\u2019s email account, shown on a website as a \u201ccontact\u201d email address, was accessed by a search warrant for evidence of her being involved in a fraud against the government. Direct evidence that an email account actually contains evidence is &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=17197\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25,7,20],"tags":[],"class_list":["post-17197","post","type-post","status-publish","format-standard","hentry","category-e-mail","category-overbreadth","category-probable-cause"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/17197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17197"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/17197\/revisions"}],"predecessor-version":[{"id":17198,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/17197\/revisions\/17198"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17197"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}