{"id":4875,"date":"2010-11-10T07:47:16","date_gmt":"2010-11-10T07:46:09","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2010-11-10T07:46:09","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=4875","title":{"rendered":"E.D.Wis.: Ruse to get consent to look at defendant&#8217;s computer was not invalid"},"content":{"rendered":"<p>Officers used a ruse to get access to defendant\u2019s computer that there had been a computer security breach where family pictures had been posted on the internet. The court finds defendant\u2019s authority, <a href=\"http:\/\/scholar.google.com\/scholar_case?case=1859063349343923645&amp;q=583+F.+Supp.+2d+694&amp;hl=en&amp;as_sdt=1002\">United States v. Richardson<\/a>, sufficiently different that the consent was valid. United States v. Krueger, 2009 U.S. Dist. LEXIS 130067 (E.D. Wis. July 22, 2009):<\/p>\n<blockquote><p>Relying on <a href=\"http:\/\/scholar.google.com\/scholar_case?case=1859063349343923645&amp;q=583+F.+Supp.+2d+694&amp;hl=en&amp;as_sdt=1002\">United States v. Richardson<\/a>, 583 F. Supp. 2d 694 (W.D. Pa. 2008), defendant argues that the police caused him to believe that he was a victim of a computer security breach, that his consent was limited to investigating such a breach, and that the search for images of child pornography thus exceeded the scope of his consent. Like the magistrate judge, I reject the argument.<\/p>\n<blockquote><p>In Richardson, officers conducting a child pornography investigation obtained consent to search the defendant\u2019s computers by leading him to believe that he had been a victim of credit card fraud. Id. at 698-701. The officers then conducted a forensic examination of the computers, which revealed images of child pornography. Id. at 703-04. The lead officer admitted that she used a ruse to obtain consent, which she maintained throughout her dealings with the defendant. Id. at 701-05. The court found that, based on the officers\u2019 artifice in approaching the defendant as a potential crime victim, his consent was limited to evidence of illegal credit card activity over the internet. Id. at 718.<\/p><\/blockquote>\n<p>The present case involves no similar trickery. Andrews told defendant:<\/p>\n<blockquote><p>I was following up on a computer investigation in which images of his family members had been posted to the Internet. And I told him that I was concerned because they were images of his family members. And, that\u2019s why I had come to his house for the investigation, and that it involved computers in his house.<\/p><\/blockquote>\n<p>(Tr. at 11.) Andrews may not have fully disclosed the nature of her investigation, but she made no false or misleading statements. She did not lead defendant to believe that he \u2014 as opposed to his family members \u2014 was a victim, or suggest that the officers would refrain from searching the computers for any evidence of his potential wrongdoing. Further, unlike in Richardson, nothing in Andrews\u2019s preliminary statements suggested a limitation on the scope of the search. In Richardson, the court found the forensic search for images wholly unrelated to the expressed object of the search \u2014 illegal, on-line use of credit cards. See id. at 720-21. Here, the conversation between defendant and Andrews, although general, pertained to \u201cimages\u201d of defendant\u2019s family members, and Andrews specifically advised defendant that the computers would be removed from the residence for a forensic exam. (Tr. at 16.) Finally, as the magistrate judge explained, an investigation into how the images Andrews mentioned ended up on the internet \u201cwould naturally include a review of image files on [defendant\u2019s] computer to determine, for example, if the specific photographs were on [defendant\u2019s] computer, as well as internet protocol data to determine, for example, which computer might have posted the photographs.\u201d (R. 24 at 11.)<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=4875\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4875","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4875"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4875\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4875"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}