MEMORANDUM OPINION
On June 11, 2014, this Court was presented with an application for a search warrant pursuant to Rule 41 of the Federal Rules of Criminal Procedure and 18 U.S.C. §§ 2703(a), (b)(1)(A), and (c)(1)(A). The application sought a warrant to obtain emails and other information from a “Gmail” account, which is hosted by Google, Inc., and to permit a search of those emails for certain specific categories of evidence. The Court granted the application on the day it was presented. In light of decisions issued elsewhere in the country that have denied search warrants in similar circumstances — particularly in the District of Columbia and the District of Kansas, see, e.g., In the Matter of the Search of Information Associated with [redacted]@mac.com that is Stored at Premises Controlled by Apple, Inc.,
I. BACKGROUND
As part of its investigation into possible violations of 31 U.S.C. §§ 5330 and 5322 (unlawful money remitting) and 18 U.S.C. §§ 371 (conspiracy to commit unlawful money remitting) and 1956 (conspiracy to commit money laundering), the Government brought an application for a search warrant seeking records relating to a “Gmail” email address, which is maintained and controlled by Google. The application includes an affidavit from an agent of the Federal Bureau of Investigation that describes the Government’s investigation and provides probable cause to believe that the target of the Government’s investigation has been using the subject email account to engage in criminal activity. The affidavit also provides probable cause to believe that emails and other information in that' account will provide evidence of those criminal activities. Because the investigation is ongoing and the warrant and application are sealed, this Memorandum Opinion will not provide any further information regarding the probable cause showing.
The search warrant directs Google to provide to the Government “all content and other information within the Provider’s possession, custody, or control associated with” the email account, including all emails sent, received, or stored in draft form, all address book information, and a variety of other information associated with the account. The search warrant provides that law enforcement personnel “are authorized to review the records produced by the Provider in order to locate” certain specific categories of evidence described in the warrant. The warrant does not contain any search protocol and does not limit the amount of time the Government may take to review the account material disclosed by Google. The warrant also does not provide for any destruction of the material disclosed once the emails within the categories listed in the warrant are identified.
II. APPLICABLE LAW
A. The Stored Communications Act
The Government’s application as well as Google’s obligation to disclose the emails
B. The Fourth Amendment to the United States Constitution
The Fourth Amendment of the United States Constitution provides:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
U.S. Const, amend. IV. The Supreme Court has held that the “essential purpose of the Fourth Amendment is to shield the citizen from unwarranted intrusions into his privacy” and that “[t]his purpose is realized by Rule 41 of the Federal Rules of Criminal Procedure ... which implements the Fourth Amendment .... ” Jones v. United States,
As the Supreme Court has repeatedly held, “the ultimate touchstone of the Fourth Amendment is ‘reasonableness.’ ” Brigham City v. Stuart,
III. DISCUSSION
In addition to the D.C. Opinion and the Kansas Opinion previously cited, the Court is aware of other decisions emanating from these courts that have denied applications for warrants authorizing searches of email accounts.
A. Whether Google Should Be Directed to Produce All tKe Emails Associated with the Email Account
The D.C. Opinion refused to issue a warrant requiring disclosure of the entire contents of an email account on the ground that the Government will “actually seize large quantities of e-mails for which it has not established probable cause .... ”
Here, the warrant describes only certain emails that are to be seized — and the government has only established probable cause for those emails. Yet it seeks to seize all e-mails by having them “disclosed” by [the email host]. This isunconstitutional because “[t]he government simply has not shown probable cause to search the contents of all emails ever sent to or from the account.”
Id. (quoting In re Search of Target Email Address,
The D.C. Opinion’s characterization of the Government’s application as an improper “seizure” of documents for which it had not shown probable cause cites to Coolidge v. New Hampshire,
The general warrant specified only an offense — typically seditious libel — and left to the discretion of the executing officials the decision as to which persons should be arrested and which places should be searched. Similarly, the writs of assistance used in the Colonies noted only the object of the search — any un-customed goods — and thus left customs officials completely free to search any place where they believed such goods might be. The central objectionable feature of both warrants was that they provided no judicial check on the determination of the executing officials that the evidence available justified an intrusion into any particular home.
Steagald v. United States,
In the D.C. Opinion’s view, “any e-mails that are turned over to the government are unquestionably ‘seized’ within the meaning of the Fourth Amendment.”
This Court respectfully disagrees with the D.C. Opinion on this point because we believe it too narrowly construes the Fourth Amendment’s particularity requirement and is contrary to copious precedent. As an initial matter, we note that “[ajmple case authority sanctions some perusal, generally fairly brief, of ... documents (seized during an otherwise valid search) ... in order for the police to perceive the relevance of the documents to crime.” United States v. Mannino,
In the case of electronic evidence, which typically consists of enormous amounts of undifferentiated information and documents, courts have recognized that a search for documents or files responsive to a warrant cannot possibly be accomplished during an on-site search. Thus, “courts developed a more flexible approach to the execution of search warrants for electronic evidence, holding the government • to a standard of reasonableness.” Metter,
The need to permit the Government to examine electronic materials off-site rather than require it to conduct an on-site search is most obviously demonstrated in the case of a search of a computer hard disk drive (“hard drive”), which is the part of a computer that actually stores files and documents. In the context of suppression motions, courts have routinely upheld the seizure or copying of hard drives and other storage devices in order to effectuate a proper search for the categories of documents or files listed in a warrant. See, e.g., United States v. Schesso,
In addition, the Federal Rules of Criminal Procedure were amended in 2009 to specifically provide for such a procedure. As stated in that rule:
A warrant under Rule 41(e)(2)(A) may authorize the seizure of. electronic storage media or the seizure or copying of electronically stored information. Unless otherwise specified, the warrant authorizes a later review of the media or information consistent with the warrant. The time for executing the warrant in ■ Rule 41(e)(2)(A) and (f)(1)(A) refers to the seizure or on-site copying of the media or information, and not to any later off-site copying or review.
Fed.R.Crim.P. 41(e)(2)(B). The Advisory Committee notes to the 2009 amendments to Rule 41 explained the need for such a procedure:
Computers and other electronic storage media commonly contain such large amounts of information that it is often impractical for law enforcement to review all of the information during execu- • tio'n of the warrant at the search location. This rule acknowledges the need for a two-step process: officers may seize or copy the .entire storage medium and review it later to determine what electronically stored information falls within the scope of the warrant.
The Second Circuit has recently recognized that “[i]n light of the significant burdens on-site review would place on both ■the individual and the Government, the creation of mirror images for offsite review is constitutionally permissible in most instances, even if wholesale removal of tangible papers would not be.” Ganias,
The D.C. Opinion offered the Government the option of seeking a warrant that would have required the email host — in that case, Apple, Inc. — to itself conduct the search of emails.
Second, Google employees would not be able to interpret the significance of particular emails without having been trained in the substance of the investigation. Seemingly innocuous or commonplace messages could be the direct evidence of illegality the Government had hoped to uncover. While an agent steeped in the investigation could recognize the significance of particular language in emails, an employee of the email host would be incapable of doing so. The D.C. Court’s suggestion to the contrary is seemingly premised on the notion that service providers are experienced in responding to subpoenas. See March 7 Opinion,
Thus, the D.C. Opinion’s proposal gives insufficient consideration to the difficulty of executing a search warrant for digital information and the likelihood that the Government’s investigative efforts would be' severely hampered by requiring that this crucial and complex investigative activity be performed by an email host. Placing the responsibility for performing these searches on the email host would also put the host’s employees in the position of appearing to act as agents of the Government vis-a-vis their customers. Moreover, it would allow private employees — who have no constitutional responsibilities to the public — to obtain personal information about a target of an investigation that they would otherwise have no occasion to see, and with no apparent limitation on their use of this information other than limitations imposed by their employer. Not surprisingly, courts have routinely rejected arguments made in the course of suppression motions that a warrant should have required a third party to conduct searches of electronic information. See, e.g., Deppish,
B. Whether the Court Should Require a Protocol For Conducting the Search of the Email Account or Limit the Length of Time the Emails Are Retained
Some courts issuing warrants for electronic information have included “secondary orders” imposing “minimization procedures” concerning the Government’s handling and retention of material disclosed by third-party custodians of electronic information. These orders have required that records not within the scope of the search warrant either be “returned” to the custodian or, in the case of copies, “destroyed.” See In the Matter of the Search of Information Associated with the Facebook Account Identified by the User-name AaronAlexis that is Stored at Premises Controlled by Facebook, Inc.,
“The general touchstone of reasonableness which governs Fourth Amendment analysis ... governs the method of execution of the warrant.” United States v. Ramirez,
The Second Circuit’s recent decision in Ganias does not change our conclusion on, this point. In that case, the Government executed a search warrant at the offices of an accountant that permitted it to obtain records of two corporate clients of the accountant.
We will assume, without deciding, that this Court has the power to impose limitations on retention at the time an email warrant application is approved.
[Law enforcement agents] did not cull the information down using key word searches because, in [a law enforcement agent’s] experience, people sometimesuse coded language to hide illegal activities, and it is difficult at the beginning of an investigation to know about any coded language persons might be using. Without knowledge of the coded language being used, it is often not feasible to use search terms to capture all files responsive to the warrants....
The Government’s knowledge of the activity being investigated developed over time. As the Government learned new details, the Government would go back and conduct targeted searches in the Relativity database using search terms for additional documents responsive ta the warrants. From time to time, and based on developing knowledge of the investigation, documents that were previously marked as irrelevant- were re-reviewed and marked as relevant.
United States v. Lustyik,
Additionally, it may be necessary for the. Government to maintain a complete copy of the electronic information to authenticate evidence responsive to the warrant for purposes of trial.
As for whether the Court should give direction as to the manner in which the Government conducts the search of the emails, we will again assume without deciding that a court has the power to include protocols in a warrant as to the type of search to be conducted. . See, e.g., United States v. Cartier,
Courts have also noted the impracticalities of including limitations on the mechanics or timing of a search of electronic information. See, e.g., United States v. Burgess,
“[I]n most instances, there is no way for law enforcement or the courts to know in advance how a criminal may label or code his computer files and/or documents which contain evidence of criminal activities.” United States v. Graziano,558 F.Supp.2d 304 , 315 (E.D.N.Y.2008). To limit the government’s computer search methodology ex ante would “give criminals the ability to evade law enforcement scrutiny simply by utilizing coded terms in their files or documents” or other creative data concealment techniques. Id. Accordingly, we join the Graziano court and several other federal courts in holding that the Fourth Amendment does not require a search warrant to specify computer search methodology.
Bowen,
We are aware of the case of In re Search Warrant,
While it is possible that in some circumstances “ex ante instructions may be a way to ensure particularity,” as the Vermont Supreme Court put it, In re Search Warrant,
Notes
. As the Judge Francis of this district has noted:
Although [the Stored Communications Act] uses the term “warrant” and refers to the use of warrant procedures, the resulting order is not a conventional warrant; rather, the order is a hybrid: part search warrant and part subpoena. It is obtained like a search warrant when an application is made to a neutral magistrate who issues the order only upon a showing of probable cause. On the other hand, it is executed like a subpoena in that it is served on the [Internet Service Provider] in possession of the information and does not involve government agents entering the premises of the [Internet Service Provider] to search its servers and seize the e-mail account in question.
In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation.,
. See, e g., In the Matter of the Search of Information Associated with [redacted] @mac.comthat is Stored at Premises Controlled by Apple, Inc.,
Other recent cases have denied search warrant applications for electronic devices that rely on the same reasoning as has been articulated in the cases involving email accounts. See, e.g., In re Nextel Cellular Telephone,
. The court in Cioffi suppressed email evidence seized under a warrant issued pursuant to § 2703. But it did so because the "[t]he Warrant did not, on its face, limit the items to be seized from [defendant’s] personal email account to emails containing evidence of the crimes charged in the indictment or, indeed, any crime at all. Nor did it attach and incorporate the Affidavit.”
. Although not raised in Ganias, we note also that the retention of electronic evidence is supported by the text of Fed.R.Crim.P. 41 insofar as it discusses the inventory of property seized pursuant to a warrant. With respect to electronic evidence, the rule states:
In a case involving the seizure of electronic storage media or the seizure or copying of electronically stored information, the inventory may be limited to describing the physical storage media that were seized or copied. The officer may retain a copy of the electronically stored information that was seized or copied.
Fed.R.Crim.P. 41(f)(1)(B) (emphasis added). From context, it is clear that the electronically stored information at issue refers to "the entire storage medium” seized as part of the two-step procedure, as described in the 2009 Advisory Committee notes to Subdivision (e)(2).
. The Court in Ganias found that a Rule 41(g) motion would have been ineffective in that case because the Government had contended that the files at issue "could not feasibly have been returned or purged anyway.” Ganias,
. One commentator has argued that ex ante restrictions in a warrant of any kind are constitutionally impermissible, are not actually enforced in suppression motions, and are in any event ineffective in protecting Fourth Amendment rights. See Orin S. Kerr, Ex Ante Regulation of Computer Search and Seizure, 96 Va. L.Rev. 1241 (2010); but see Paul Ohm, Massive Hard Drives, General Warrants, and the Power of Magistrate Judges, 97 Va. L.Rev. In Brief 1 (2011) (arguing that ex ante restrictions may be necessary in searches of electronic evidence to ensure that the Fourth Amendment’s particularity and probable cause requirements are met). We need not reach the question of a court's power to impose such restrictions, however, because we conclude that such restrictions were not appropriate for the warrant at issue here.
. While Garúas expressed skepticism about the need for retaining non-responsive hies for this purpose, it was willing to "assume” the need existed and stated that in such an event, the retained material should not be used "for any other purpose” — presumably referring to the material's use in that case as the basis for a second warrant.
