{"id":27811,"date":"2017-06-27T08:45:19","date_gmt":"2017-06-27T13:45:19","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=27811"},"modified":"2017-06-27T08:45:19","modified_gmt":"2017-06-27T13:45:19","slug":"d-kan-email-and-computer-sws-were-necessarily-broad-but-not-unreasonably-broad","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=27811","title":{"rendered":"D.Kan.: Email and computer SWs were necessarily broad, but not unreasonably broad"},"content":{"rendered":"<p>\u201cThese were not warrants to search for \u2018any and all information\u2019 or \u2018all computer information\u2019 in defendant&#8217;s house. See Christie, 717 F.3d at 1165. Rather, the attachments effectively limited the scope of the searches to material relevant to specific federal crimes. Id. The warrants and attachments put officers on notice they were authorized to seize and search the devices for specified types of materials pertaining to the identified offenses. &#8230; Given the nature of the offenses alleged, there was necessarily a broad scope of relevant material, but the warrant cannot be faulted for failing to specify the items to be searched, the nature of the materials sought, or the object of the searches. In fact, defendant fails to explain how the warrants could have been more particular in authorizing a search that encompassed all of the potentially relevant records within defendant&#8217;s computers, cell phones, and internet accounts.\u201d United States v. Henson, 2017 U.S. Dist. LEXIS 96351 (D.Kan. June 22, 2017).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThese were not warrants to search for \u2018any and all information\u2019 or \u2018all computer information\u2019 in defendant&#8217;s house. See Christie, 717 F.3d at 1165. Rather, the attachments effectively limited the scope of the searches to material relevant to specific federal &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=27811\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,25,7,65],"tags":[],"class_list":["post-27811","post","type-post","status-publish","format-standard","hentry","category-computer-searches","category-e-mail","category-overbreadth","category-particularity"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/27811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27811"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/27811\/revisions"}],"predecessor-version":[{"id":27812,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/27811\/revisions\/27812"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27811"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}