Searching over 5,500,000 cases.

Buy This Entire Record For $7.95

Official citation and/or docket number and footnotes (if any) for this case available with purchase.

Learn more about what you receive with purchase of this case.

In re Information Associated with [Redacted]

United States District Court, D. Columbia.

April 7, 2014


Page 146

[Copyrighted Material Omitted]

Page 147




Pending before the Court is a Renewed Application for a search and seizure warrant pursuant to Rule 41 of the Federal Rules of Criminal Procedure and 18 U.S.C. § 2703(a), (b) and (c) to disclose certain records and contents of electronic communications relating to an Apple email address.[1] See Affidavit in Support of an Application for a Search Warrant [#5-1] (sealed) at 1 (hereinafter Affidavit). In a previous Memorandum Opinion and Order,[2] this Court denied the government's original application for a search and seizure warrant for the same e-mail address without prejudice both because it failed to clearly specify which e-mails it sought to seize and because it sought authorization to seize e-mails for which it had not established probable cause to seize. In re Search of Apple E-mail, 2014 WL 945563, at *3, *5. The government's Renewed Application does not address these concerns and ignores the substance of this Court's previous rulings. The government persists in its attempt to seize an entire e-mail account and search through all of it. For the reasons stated below, the government's Renewed Application for a search and seizure warrant will, therefore, be denied.

I. Background

This is the government's second attempt to obtain a search and seizure warrant for a specific Apple e-mail address as part of its investigation of a possible violation of 41 U.S.C. § 8702 (Solicitation and Receipt of Kickbacks) and 18 U.S.C. § 371 (Conspiracy) involving a defense contractor. Affidavit at 10. For purposes of this opinion, the details of the investigation--which remain under seal on the Court's docket--are irrelevant.[3]

[4] In re Search of

Page 148

Apple E-mail, 2014 WL 945563, at *7 (" To be clear: the government must stop blindly relying on the language provided by the Department of Justice's Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations manual. By doing so, it is only submitting unconstitutional warrant applications." ). In an " Attachment A," titled " Place to Be Searched," the government specifies the location of Apple, Inc. and indicates that the " warrant applies to information associated with the e-mail account [redacted] dating from [January], 2014, to the present." [5] Affidavit at 12. An " Attachment B," titled " Particular things to be seized by the government," is as follows:


Particular things to be seized by the government

All emails, including email content, attachments, source and destination addresses, and time and date information, that constitute evidence and instrumentalities of violations of 41 U.S.C. § 8702 (Solicitation and Receipt of Kickbacks) and 18 U.S.C. § 371 (Conspiracy), dated between [January], 2014, to the present, including emails referring or relating to a government investigation involving any or all of the following: [Redacted list of names of companies and individuals in the form of " John Smith, John Smith, Inc., any current or former John Smith employees, etc." ].

Id. at 13.

Finally, the government has included an " Attachment C," titled " Procedures to facilitate execution of the warrant" :


Procedures to facilitate execution of the warrant

I. Information to be disclosed by Apple (the " Provider" )

To the extent that the information described in Attachment A is within the possession, custody, or control of the Provider, including any emails that have been deleted but are still available to the Provider, or have been preserved pursuant to a request made under 18 U.S.C. § 2703(f) [in January], 2014, the Provider is required to disclose the following information to the government for the account listed in Attachment A: all emails, including attachments, associated with the account, dating from [January], 2014, to the present, and including stored or preserved copies of emails sent to and from the account, draft emails, the source and destination addresses associated with each email, the date and time at which each email was sent, and the size and length of each email.
Apple shall deliver the information set forth above via United States mail, courier, or email to: [The Department of Justice].

II. Government procedures for warrant execution

The United States government will conduct a search of the emails produced by the Provider and determine which are within the scope of the information to be seized specified in Attachment B. Those that are within the scope of Attachment B may be copied and retained by the United States.
Law enforcement personnel will then seal any information from Apple that does not fall within the scope of Attachment

Page 149

B and will not further review the information absent an order of the Court.

Affidavit at 14-15. Thus, the government requests that Apple provide all e-mails from a certain date in January, 2014, so that the government may search them for evidence of specific crimes and keep any non-relevant e-mails under seal until further order of a court.

II. Analysis

This is the third Memorandum Opinion from this Court regarding overbroad search and seizure warrants for data held by a third party provider of an electronic communications service. In September, the Court substantially modified a search warrant for the Facebook account of Navy Yard shooter Aaron Alexis to narrow its scope and prevent the government from retaining information that was irrelevant to its investigation. See In the Matter of the Search of Information Associated with the Facebook Account Identified by the Username Aaron. Alexis That Is Stored at Premises Controlled by Facebook, Inc., 2013 WL 7856600, at *8 (D.D.C. Nov. 26, 2013) (Facciola, M.J.) (hereinafter Facebook Opinion). In that Opinion, the Court implored the government to " seriously consider how to minimize the amount of information that its search warrant applications seek to be disclosed" because, as it stood, the government was requesting authorization to seize data for which it had not established probable cause. [WL] at *8. In so doing, this Court recommended, inter alia, " [a]sking the electronic communications service provider to provide specific limited information such as emails or faxes containing certain key words or emails sent to/from certain recipients." Id. (citing In re Applications for Search Warrants for Case Nos. 12--MJ--8119--DJW and Information Associated with 12--MJ--8191--DJW Target Email Address, Nos. 12--MJ--8119, 12--MJ--8191, 2012 WL 4383917, at *10 (D.Ks. 2012) (hereinafter In re Search of Target Email Address)); see also Facebook Opinion at __, 2013 WL 7856600, at *8 (listing five measures the government could take to bring its warrant applications in line with the requirements of the Fourth Amendment). Unfortunately, over the following four months, the government did not take any steps to modify their search warrant applications.

This Court's previous Memorandum Opinion in this matter was driven by two principal concerns.[6] First, the government's original application sought to seize an entire e-mail account even though it had only established probable cause for some of the e-mails. See In re Search of Apple E-mail, 2014 WL 945563, at *5. By doing so, the government asked this Court to issue a " general warrant that would allow a 'general, exploratory rummaging in a person's belongings'--in this case an individual's e-mail account." Id. (citing Coolidge v. N.H., 403 U.S. 443, 467, 91 S.Ct. 2022, 29 L.Ed.2d 564 (1971)). Second, the government failed to explain what would occur with data that were seized but were outside the scope of the warrant application (and for which there was necessarily no probable cause to seize in the first place). In re Search of Apple E-mail, 2014 WL 945563, at *6. As a result, this Court was explicit that, " in light of the government's repeated submission of overly broad warrants that violate the Fourth Amendment, this Court can see no reasonable

Page 150

alternative other than to require the provider of an electronic communications service to perform the searches." Id.

The government's modifications in its Renewed Application fail to address the Court's concerns. In fact, the government has ignored the substance of the Court's warnings that its email search warrant applications violate the Fourth Amendment. Although there are some cosmetic differences between the original application and the Renewed Application, the bottom line is that the government still gets all e-mails--regardless of their relevance to its investigation--and keeps them indefinitely. See Affidavit at 14-15. This is no different than what the government originally requested, and this Court still will not grant it.

A. The Government Still Seeks an Unconstitutional General Warrant

1. The Fourth Amendment Prohibits the Type of Warrant the Government Seeks

The Supreme Court has recognized two constitutional protections served by the warrant requirement of the Fourth Amendment. " First, the magistrate's scrutiny is intended to eliminate altogether searches not based on probable cause. The premise here is that any intrusion in the way of search or seizure is an evil, so that no intrusion at all is justified without a careful prior determination of necessity." Coolidge, 403 U.S. at 467. Thus, it is this Court's duty to reject any applications for search warrants where the standard of probable cause has not been met. Second, " those searches deemed necessary should be as limited as possible. Here, the specific evil is the 'general warrant' abhorred by the colonists, and the problem is not that of intrusion per se, but of a general, exploratory rummaging in a person's belongings." Id. To follow the dictates of the Fourth Amendment and to avoid issuing a general warrant, a court must be careful to ensure that probable cause exists to seize each item specified in the warrant application.

In re Search of Apple E-mail, Brower v. Cnty. of Inyo, 489 U.S. 593 109 S.Ct. 1378 United States v. Jacobsen, 466 U.S. 109 104 S.Ct. 1652 In re Search of Target Email Address, United States v. Taylor,

764 F.Supp.2d 230 United States v. Bickle, No.

Page 151

10-CR-00565, 2011 WL 3798225, at *22 (D.Nev. July 21, 2011); United States v. Bowen, 689 F.Supp.2d 675, 684 (S.D.N.Y. 2010).[7]

To conclude otherwise would yield unsatisfactory results.[8] First, if copying were not considered " seizing," that would suggest the irrelevance of the Fourth Amendment to that act:

If copying data is not a seizure, then copying cannot logically be regarded as a search and it does not violate an expectation of privacy. It is possible to copy files without examining the files. Therefore, if copying is not a seizure, it is outside the scope of the Fourth Amendment's reasonableness requirements and is an activity which can be conducted at will, requiring neither the justification of a warrant nor an exception to the warrant requirement. This is not a satisfactory result. Copying has an effect upon the " ownership" rights of the party whose information is copied.

Susan Brenner and Barbara Frederiksen, Computer Searches and Seizures: Some Unresolved Issues, 8 Mich. Telecomm. & Tech. L. Rev. 39, 113 (2002). Thus, this Court would have to believe that, if the act of copying e-mail is not a seizure, then the Fourth Amendment is powerless to prevent the wholesale copying of every single e-mail ever sent, a result that no court could ever reasonably embrace. It would also render hollow the Sixth Circuit's holding in United States v. Warshak, 631 F.3d 266, 285-88 (2010), that there is a reasonable expectation of privacy with respect to one's e-mails--even though those e-mails were copied by an electronic communications service provider and given to the government. Id. at 283.

Second, that approach suggests that a seizure could only occur if the actual hard drive that contains the target e-mail account, which is presumably in a server farm operated by Apple, is physically taken by the government. This ignores the reality that " [h]ardware is increasingly fungible" and that what really matters--and what the owner of the e-mails actually has a possessory interest in--" is the data." Fourth Amendment Seizures of Computer Data, 119 Yale L.J. at 712. A focus on hardware instead of data, in determining when a seizure occurs, would therefore miss the mark and ignore fundamental realities about how computers are actually used. See In re Southeastern Equipment Co. Search Warrant, 746 F.Supp. 1563, 1576 (S.D.Ga. 1990) (" As the LeClair Court pointed out, it is the information itself, not the paper and ink or tape recorder or other copying utensil, that is actually seized." ) (citing Le Clair v. Hart, 800 F.2d 692, 696 n.5 (7th Cir. 1986)).

Furthermore, the government itself characterizes the act of copying e-mails as a seizure by noting that it will " seize" some of the copied e-mails after the search is complete. See Affidavit at 13-15. It is, after all, seeking a " search and seizure warrant." See Fed. R. Crim. P. 41. Thus, even though the e-mails are only being copied by Apple (with other copies remaining on Apple's servers), a seizure is occurring.

Page 152

Because there is no principled distinction that suggests that copying data once is not a seizure but copying data twice is a seizure, it follows that the e-mails are seized the first time they are copied by Apple and given to the government. Any other position is unsatisfactory because the property interest in e-mails certainly suffers " meaningful interference" when a third party has unauthorized access to those e-mails.[9] Thus, emails are seized when Apple gives them to the government just as surely as a physical letter is if it is taken by the postal service and given to the government. See Fourth Amendment Seizures of Computer Data, 119 Yale L.J. at 722-23.

The problem with the government's Renewed Application is not that it fails to specify with particularity what it intends to seize--and not that it suggests a seizure will not occur--but that it will actually seize large quantities of e-mails for which it has not established probable cause and which are outside the scope of Attachment B. The government asks Apple " to disclose the following information to the government for the account listed in Attachment A: all emails, including attachments, associated with the account, dating from [January], 2014, to the present . . ." Affidavit at 14. This Court has an affirmative obligation to " prevent[] the seizure of one thing under a warrant describing another." See Andresen v. Maryland, 427 U.S. 463, 479, 96 S.Ct. 2737, 49 L.Ed.2d 627 (1976) (citing Stanford v. Texas, 379 U.S. 476, 485, 85 S.Ct. 506, 13 L.Ed.2d 431 (1965)). Here, the warrant describes only certain emails that are to be seized--and the government has only established probable cause for those emails. Yet it seeks to seize all e-mails by having them " disclosed" by Apple. This is unconstitutional because " [t]he government simply has not shown probable cause to search the contents of all emails ever sent to or from the account." See In re Search of Target Email Address, 2012 WL 4383917, at *9. As Judge David J. Waxse wisely analogized, if this were the physical world, it would be akin to " a warrant asking the post office to provide copies of all mail ever sent by or delivered to a certain address so that the government can open and read all the mail to find out whether it constitutes fruits, evidence or instrumentality of a crime. The Fourth Amendment would not allow such a warrant." Id. This Court agrees.

2. The Two-Step Procedure Is a Narrow Exception Due to Practical Considerations That Is Inapplicable Here

Nevertheless, there is a narrow exception that authorizes an otherwise unconstitutionally broad seizure if the only practical way to perform a search is to seize an entire repository, such as a file cabinet or computer, and take it offsite for a later search.[10] This is, in essence, the procedure outlined in United States v. Tamura, 694 F.2d 591, 595 (9th Cir. 1982), where the Ninth Circuit deemed it acceptable to take a large quantity of documents

Page 153

offsite if the government explained that need to the magistrate. This two-step procedure--seize a large quantity of data and perform the specific search later at an offsite location--was later codified in Rule 41. See Fed. R. Crim. P. 41(e)(2)(B).

There is no question that the two-step procedure is constitutional under certain circumstances. See Facebook Opinion, 2013 WL 7856600, at *6 (citing cases holding that the two-step process under Rule 41 does not violate the Fourth Amendment). In fact, this Court has recently approved use of the two-step procedure in a series of opinions addressing the search of cell phones and hard drives--but only if the government provides an adequate search protocol explaining how it will perform the search and ensure that it is only searching sectors or blocks of the drives that are most likely to contain the data for which there is probable cause.[11] In those instances, the search protocol must " explain how [the government] is going to conduct this search to minimize the risk that files outside the scope of the warrant will be discovered." See In re Apple iPhone, 2014 WL 1239702, at *7.

The problem here, as previously pointed out by this Court, is that the government is " abusing the two-step procedure under Rule 41" by requiring Apple to disclose the entire contents of an e-mail account. See In re Search of Apple E-mail, 2014 WL 945563, at *5. A seizure unquestionably occurs once data is turned over from Apple to the government. See supra. The government cannot pretend that the seizure only occurs after it has searched and separated the relevant e-mails from the irrelevant ones. And the two-step Rule 41 process, which has essentially created a narrow exception to the general prohibition against seizing data for which there is no probable cause, is permissible only because there is no alternative that would allow the government to access the data for which it does have probable cause. See In re Search of Black iPhone, 2014 WL 1045812, at *4. The Court must emphasize that the two-step procedure is a narrow exception that requires an affirmative showing of need in the warrant application. The Renewed Application, however, fails to provide any explanation for why the two-step procedure is necessary.

3. By Requiring Apple to Perform the Search, the Court Avoids Issuing a General Warrant

Unlike a search of a hard drive or cell phone, there is an alternative that, in accordance with the Fourth Amendment, prevents the government from seizing large quantities of data for which it has not established probable cause: the electronic communication service provider, in this case Apple, can perform the search at the government's request and turn over any relevant data that it discovers. Otherwise, if the Court were to grant the Renewed Application as it is, the government would immediately seize a vast quantity of e-mails to which it is not entitled; in so

Page 154

doing, this Court would issue a general warrant, which it cannot do.

The Court fully understands that, in requiring a third party electronic communications service provider to perform the search that the government would otherwise perform, it is going a step further than--to its knowledge--any other court has. See Taylor, 764 F.Supp.2d at 237 ( the " Fourth Amendment does not require the government to delegate a prescreening function to the internet service provider or to ascertain which e-mails are relevant before copies are obtained from the internet service provider for subsequent searching." ); accord Bickle, 2011 WL 3798225, at *20 (but noting that " a filter process was mandated by Judge Foley to sort or filter privileged emails from non-privileged emails." ); Bowen, 689 F.Supp.2d at 682. But this Court reaches this conclusion out of exasperation that the government has, despite repeated warnings, refused to determine an alternative that does not involve the wholesale seizure of vast amounts of e-mails and other data protected by the Fourth Amendment to which it has no right. Unless the government can suggest an appropriate alternative, the Court can only conclude that the Fourth Amendment does require that the provider perform the search because nothing else will eliminate the present certainty that the government will unconstitutionally seize data for which it has not established probable cause to seize.

Cases involving searches and seizures of evidence held by third parties, such as Zurcher v. Stanford Daily, 436 U.S. 547, 559, 98 S.Ct. 1970, 56 L.Ed.2d 525 (1978), do not suggest that this Court must take a different approach. In Zurcher, the Supreme Court held that a search and seizure warrant was the appropriate vehicle by which to obtain photographs held by a student newspaper that was itself not suspected of any wrongdoing. Id. at 551-52. That case addressed whether property held by a third party (not a suspect) could be searched and seized if it was nevertheless fruits, instrumentalities, or evidence of a crime. Id. at 559.[12] This Court does not disagree, and there is no question that Apple, as the entity holding the target e-mails, may be served with a search and seizure warrant to turn over relevant e-mails.

Instead, there is a different question before this Court: can this Court order Apple to turn over e-mails that are necessarily outside the scope of the warrant and thus irrelevant? The answer is no. To hold otherwise would suggest that the Zurcher Court would have approved a search and seizure whereby the government entered the newspaper's office, copied every photograph, took them back to the station, and then searched through them to determine which ones were relevant to the investigation (and, as written, the Renewed Application would then have the police keep the non-relevant photographs indefinitely). Such a procedure would never be sanctioned because it would be precisely the type of " general, exploratory rummaging in a person's belongings" that the Fourth Amendment prohibits. Coolidge, 403 U.S. at 467

Page 155

. Given that third parties are permitted to assist in the execution of search warrants, see In re Search Warrant, 193 Vt. 51, 71 A.3d 1158, 1180 (Vt. 2012) (citing cases), it is certainly appropriate to have Apple perform the search when Apple's involvement is necessary to prevent a violation of the Fourth Amendment and limit the e-mails seized by the government.

B. The Government Has Failed to Even Suggest an Alternative to Having the Email Provider Perform the Search

Nothing in the Renewed Application even attempts to address the Court's rulings in In re Search of Apple E-mail, and the government makes no effort whatsoever to take advantage of Apple's technical expertise to perform the search in a way that will protect the target's Fourth Amendment rights. Instead, all the government has done is simply move the request that Apple " disclose . . . all emails, including attachments, associated with the account" from Attachment B to Attachment C. See Affidavit at 3. This obviously accomplishes nothing, and it indicates that the government is unwilling--for whatever reason--to give up its policy of seizing large quantities of e-mails and other Fourth Amendment protected data even after this Court has repeatedly warned it against doing so.

There may be circumstances in which it is not possible for the service provider to do the search. In such instances, in accordance with the principle of Tamura, practical considerations would necessitate that the government perform the search even if it means seizing--on a temporary basis--data for which it has not established probable cause. But that has not occurred here. Mere convenience does not allow the government to violate the Fourth Amendment and seize data wholesale.[13]

Here, the government has not even hinted that Apple cannot perform the search, let alone provided the Court with the evidence and sworn statements necessary to justify a wholesale seizure of the target Apple e-mail account. Instead, this Court has been presented with the same defective and unconstitutional request for a search and seizure warrant. This Court cannot issue it.

C. The Government Cannot Keep Data it Knows Is Outside the Scope of the Warrant

In its Renewed Application, the government first asks this Court to order Apple to turn over data for which the government knows it has not established probable cause; after it performs a search, it then wants to " seal any information from Apple that does not fall within the scope of Attachment B and [] not further review the information absent an order of the Court." Affidavit at 15. Such a request is inconceivable--and unacceptable--given the Court's repeated statements on this specific issue. In September and December 2013,[14] the Court modified approximately twenty warrants to specify that any data not within the scope of the warrant would be returned or, if copies, destroyed

Page 156

within a reasonable period of time. See Memorandum Opinion, 2014 WL 945563 at *3, *7. Moreover, through no less than five separate published opinions--four of them in the past month--this Court has made clear that any position short of " [a]ny information discovered on the Device to be seized which falls outside of the scope of this warrant will be returned or, if copied, destroyed within a reasonably prompt amount of time after the information is identified" is unacceptable. See In re Search of Apple iPhone, 2014 WL 1239702, at *5.

The government's apparent source for suggesting that it will " seal" the irrelevant e-mails until this Court orders otherwise is Tamura, where the Ninth Circuit said that " [g]overnment and law enforcement officials generally can avoid violating fourth amendment rights by sealing and holding the documents pending approval by a magistrate of a further search . . ." 694 F.2d at 595. Taken out of context, this quote appears to authorize the government's suggestion in its Renewed Application--but it does not. Tamura authorized the sealing pending further court order only " [i]n the comparatively rare instances where documents are so intermingled that they cannot feasibly be sorted on site." Id. That is not the issue here. Tamura does, however, serve as a useful reminder that it is illegal for the government to " refus[e] to return the seized documents not described in the warrant . . ." Id. at 596.

Here, the government implies that it will keep data indefinitely that it knows is outside the scope of the warrant. To return to the example from Zurcher, the government's position is akin to indefinitely keeping all copies of a newspaper's photographs merely because one or two may show evidence of a crime. For the sixth time, this Court must be clear: if the government seizes data it knows is outside the scope of the warrant, it must either destroy the data or return it. It cannot simply keep it.[15]

Page 157

III. Conclusion

The government did not appeal the Court's ruling in In re Search of Apple E-mail, but it has all but ignored that ruling and merely engaged in cosmetic modifications by moving some unconstitutional language from Attachment B to Attachment C. The end result is, of course, no different. The government wants to seize the target's entire e-mail account, search through it for relevant data, and then keep indefinitely the irrelevant data that is outside the scope of the warrant. There is no question that the Renewed Application violates the Fourth Amendment, and this Court cannot issue it.

It is, therefore, hereby ORDERED that the government's Application is DENIED.


Buy This Entire Record For $7.95

Official citation and/or docket number and footnotes (if any) for this case available with purchase.

Learn more about what you receive with purchase of this case.