On April 30, 2004, the Court issued a warrant that authorized the search of a home and the seizure of any computers that might be found, but that conditioned the search of the computer’s contents upon the government providing the Court with a “search protocol” describing (a) the information the government sought to seize from the computer, and (b) the methods the government planned to use to locate that information without generally reviewing information on the computers that was unrelated to the alleged criminal activity. At the government’s request, and so as not to jeopardize its ongoing investigation, the Court granted the government’s motion to place the application and supporting affidavit under seal. On May 4, 2004, after the warrant had been executed and a computer and computer disks had been seized, the government orally requested that the Court allow the government to commence its search of the computer hard drive and disks without providing a protocol. The Court declined to do so.
Thereafter, on May 17, 2004, the government filed a written motion to reconsider, ex parte and under seal. In a meeting with the government on May 19, 2004, the Court orally denied the motion to reconsider, explaining the basis for its decision. The government requested that the Court make its ruling of record, which we do by this written opinion.
I.
We begin by recounting the relevant background events. Late in the afternoon of April 30, 2004, the government applied for the issuance of a search warrant for a residence at 3817 W. West End in Chicago,
The government sought authority to search for and to seize certain enumerated items that it claimed would show the alleged tax fraud. However, with respect to any computers or related media (generally referred to hereafter collectively as “computers”), the government sought a warrant authorizing it to seize those items before conducting any search of their contents for evidence of tax fraud (see Warrant, Attachment B, ¶¶ 5-8). The government explained that accountants and tax preparers who are engaged in tax fraud often use computers to prepare and retain records of fraudulent returns, that there was reason to believe that computers would be found at the 3817 W. West End residence, that the government would encounter significant obstacles in attempting to search the contents of any computers while at the residence, and that a search of the computers would be better conducted in a laboratory setting.
After reviewing the government’s submission, the Court concluded that there was probable cause to believe that a search of Ms. Williams’s residence at 3817 W. West End would yield evidence of the alleged federal income tax fraud. Accordingly, the Court informed the government that it would issue a warrant authorizing a search of the residence for items enumerated in Attachment B to the warrant, and the seizure of those items.
However, the Court expressed concern over the request as it pertained to any computers the government might find at the residence. The Court was satisfied by the government’s explanation of why a search of the contents of any computers while at the residence might not be practicable, and thus authorized the government to seize any computer without an on-site search of its contents. But, the Court explained to the government that a computer found during the search of a home likely would contain a wide variety of documents having nothing to do with the alleged criminal activity intermingled with documents that might fall within the scope of the alleged criminal activity. The affidavit provided no information that would suggest otherwise. Neither the application nor the affidavit set forth the types of documents relating to the alleged criminal activity that the government expected to find on the computers. Nor did the government’s submission describe the means by which the government planned to search the computer, to avoid a general rummaging through all information on the computer, much of which would be irrelevant to the alleged criminal activity. To the contrary, the government represented that its search of the computer might involve “an examination of] all the stored data to determine which particular files are evidence or instrumentalities of a crime” (Aff. in Support of Warrant Application, ¶ 36(a)) (emphasis added).
The Court told the government that in order to address these concerns, prior to allowing any search of the contents of the computers, the Court would require the government to provide a protocol outlining the methods it would use to ensure that its search was reasonably designed to focus on documents related to the alleged criminal activity. The purpose of this protocol was to provide the Court with assurance that the search of the computer after its seizure would not consist merely of a random or general examination of other documents — which, on a home computer, might
At that time, the government did not object to the requirement of a protocol, but asked whether the Court would require it to be provided before signing the warrant authorizing a search. In light of concerns expressed by the government that the search be conducted quickly because Ms. Williams might suspect that her activity had attracted the interest of the government, the Court decided to sign the warrant so that the search could proceed forthwith. However, the Court made clear that if any computer was found, no search of its contents could commence before the government provided the required protocol. The Court made clear that the authority to seize the computers, and ultimately to search them, was conditioned on the government providing the required protocol.
The Court signed the search warrant at 5:40 p.m. on April 30. In order to prevent the ongoing investigation from being compromised, the Court granted the government’s request that the application and affidavit submitted in support of the warrant be filed under seal. As reflected on the return of the warrant, the search began the next morning, May 1, 2004, at 7:30 a.m. The inventory attached to the return of the warrant shows that the government seized a number of items in connection with the search: including one computer (a Hewlett Packard Pavilion 700 computer) and an unspecified number of computer disks.
On May 4, 2004, the government met with the Court to discuss the warrant. Attending the meeting were an attorney for the government (a different individual than the attorney who presented the warrant application on April 30), two agents, and an individual identified as the government’s computer expert. The government attorney informed the Court that the search had been conducted, and that a computer had been seized. At that time, the government attorney argued that the government should be permitted to search the contents of the computer without providing the Court with any search protocol. The Court asked the government’s computer expert about possible protocols, in order to determine whether there was some objection based on the view that a protocol was impracticable. While the Court considered it to be the responsibility of the government to offer the protocol it deemed best tailored to the search, the Court raised with the government possible ways of focusing the search of the computers, including: limiting the search to specific time periods; using key word searches; and/or limiting the search to text files and excluding graphics files. There was nothing in the responses by the government representatives that indicated that there was some technical or practical reason that a protocol could not be provided. 1
Two weeks later, on May 17, 2004, the government filed a written motion, asking the Court to reconsider its requirement of a protocol. On May 19, 2004, the Court met informally with the government to discuss the motion. The Court explained that it had considered the government’s arguments and authorities, but concluded that the Court possessed the power to require a search protocol, and that the power to do so was properly exercised here.
II.
The government’s motion raises a serious question, one which we believe to be of first impression in this district: whether, when deciding to issue a warrant that would involve the seizure and subsequent search of a home computer, a magistrate judge has the authority to require the government to set forth a search protocol that attempts to ensure that the search will not exceed constitutional bounds. For the reasons set forth below, we believe that the answer to that question is yes.
A.
A search warrant may issue only “upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const, amend. IV. The Supreme Court has interpreted this provision to encompass three requirements: (1) that any warrants “must be issued by neutral, disinterested magistrates”; (2) that those seeking a warrant must show probable cause “to believe that ‘the evidence sought will aid in a particular apprehension or conviction’ for a particular offense”; and (3) that the warrants describe with particularity the “ ‘things to be seized,’ as well as the place to be searched.”
Dalia v. United States,
It is frequently said that the purpose of the particularity requirement is “to prevent a general exploratory rummaging in a person’s belongings.”
United States v. Carey,
The degree of particularity that is required in any given situation may not be determined by resorting to some simple formulaic approach, but instead “varies depending on the circumstances of the case and the types of items involved.”
United States v. Spilotro,
First, it is frequently the case with computers that the normal sequence of “search” and then selective “seizure” is turned on its head. Because of the difficulties of conducting an on-site search of computers, the government frequently seeks (and, as here, obtains), authority to seize computers without any prior review of their contents.
Second, that is significant in this case because of the substantial likelihood that the computer contains an “intermingling” of documents evidencing the alleged tax fraud, with documents that the government has no probable cause to seize. While the warrant application here established probable cause to believe that the computer may contain information of tax fraud, it did not contain information indicating that the computer contains nothing but information of tax fraud. The application contains no evidence that Ms. Williams’s computer was dedicated solely to the alleged fraudulent activity; or that every return that Ms. Williams prepared was fraudulent; or that she did not use the computer for the full range of legitimate activities for which people typically use home computers. 2
Fourth,
while computers present the possibility of confronting far greater volumes of documents than are typically presented in a paper document search, computers also present the tools to refine searches in ways that cannot be done with hard copy files. When confronting a-file cabinet full of papers, there may be no way to determine what to seize without doing some level of review of everything in the cabinet, as “few people keep documents of their criminal transactions in a folder marked ‘[crime] records.’ ”
Hunter,
By contrast, computer technology affords a variety of methods by which the government may tailor a search to target on the documents which evidence the alleged criminal activity. These methods include limiting the search by date range; doing key word searches; limiting the search to text files or graphics files; and focusing on certain software programs.
See Carey,
B.
We now consider how these considerations relevant to computer searches affect the particularity requirement in this case. In so doing, we use the factors set forth in
Spilotro
in determining the degree of particularity required: “(1) whether probable cause exists to seize all items of a particular type described.in the warrant,
First, there is probable cause to believe that there are some documents on the computers that constitute evidence of the alleged criminal activity. However, as explained aboye, those documents likely are intermingled with other, innocent materials in which the government has no interest. Thus, there is not probable cause to believe that everything on the computers is evidence of the alleged criminal activity.
Second,
the warrant — as well as the application — fails to set forth “objective standards by which executing officers can differentiate items subject to seizure from those which are not.”
Spilotro,
Third,
we consider whether the government was able to provide a better description of how it seeks to go about searching the computer for information of criminal activity. “ ‘[Gjeneric classifications in a warrant are acceptable only when a more precise description is not possible.’ ”
United States v. Kow,
In addressing searches for hard copy documents and seizures of telephone communications, the Supreme Court has admonished that “responsible officials,
including judicial officers,
must take care to assure that [searches] are conducted in a manner that minimizes unwarranted intrusion upon privacy.”
Andresen,
C.
The government’s core objection to providing a search protocol is that the Court is powerless to require it. That objection is inconsistent with the foregoing case law, see, e.g., Carey and Barbuto, as well as with the DOJ Manual, which notes that “[t]he reasons for articulating the search strategy in the affidavit are both practical and legal.” DOJ Manual, at 101. Indeed, the government’s notion that a judge is powerless to regulate the means of executing a search and seizure is belied by the government’s own request in this case that the Court approve one particular method of executing the search: that is, to allow the government to seize the computers so that they may be searched off-site. That request, which is consistent with the position set forth in the DOJ Manual, see DOJ Manual at 100, 103, recognizes that practical considerations are relevant to delineating the means of a search. That is also the teaching of Spilotro, which looks to practical considerations in determining the degree of particularity required in a warrant.
We have considered the government’s arguments that the Court lacks the authority to require a search protocol to give particularity to the search and seizure of the computers’ contents. We find those arguments unpersuasive.
The government cites several “knock and enter” cases to argue that the Court has no authority to inquire in advance into the methods by which a warrant will be executed.
United States v. Banks,
Nor are we persuaded by the government’s citation to
Dalia,
Finally, the government argues that having found probable cause and allowing the computers to be seized, the Court can do nothing more (Gov’t Mot. to Reconsider, at 6, 8). At the threshold, this argument fails to acknowledge what the government elsewhere in its motion acknowledges
(id.
at 2): that the Court issued the warrant conditioned upon the
Moreover, the government’s argument erroneously conflates the probable cause and particularity requirements. As
Groh
recently reaffirmed in finding invalid a warrant that was based on probable cause but lacked particularity, these are independent requirements which must both be met. Here, while there was (and is) probable cause to believe that the computer contains some information that would constitute evidence of criminal activity, the warrant does not indicate what types of such information the government wishes to search for on the computer or how the government seeks to search for it in a way that will, to adapt the language of the
Dalia
court to the computer context, “minimize the [review] of [information] not otherwise subject to [review].”
D.
The government urges that any questions about the manner in which a search is executed may be addressed by a judge when approving the warrant, but only when a judge later is confronted with a motion to suppress. If adopted, such an approach would unnecessarily run the risk of the unfortunate results reached in
Carey
and
Barbuto,
where evidence seized in a search of a computer was suppressed because of a failure to provide the magistrate judge with search protocols.
Carey,
An approach that leads to such results is neither desirable nor legally required. We do not believe that is the approach that the Supreme Court had in mind when it stated that “responsible officials, including judicial officials,” must take care to assure that searches are conducted so as to “minimize[ ] unwarranted intrusions upon privacy.”
Andresen,
CONCLUSION
We emphasize that, in requiring a protocol here, the Court does not seek to dictate the specific criteria that the government may employ in order to supply particularity to its search and seizure of contents of the computers. Nor does the Court envision that a set of criteria initially approved will be forever set in stone; we do not foreclose the possibility that those criteria may need to be adjusted in response to what is found once the computer search commences. But, as matters now stand, what the government seeks is a license to roam through everything in the computer without limitation and without standards. Such a request fails to satisfy the particu
Accordingly, the Court denies the government’s motion to reconsider. In light of this ruling, the Court orders that within 21 days the government inform the Court in writing of the following: (a) whether there is good cause that this Opinion, which does not disclose sensitive material from the application, should remain under seal; and (b) whether the government still wishes to search the computer. If so, within that 21 day period the government shall submit for review a proposed protocol for searching the contents of the computer. If the government informs the Court that it no longer wishes to search the computer, then the Court will direct that the computer be returned.
Notes
. The Court notes that, in one respect, the response (or non-response) by the government was quite surprising. When the Court raised the possibility of limiting the search to certain time periods, one of the government representatives stated that such a limitation would not be helpful since the file directory only shows when a document was last saved. The Court then asked the government technical expert whether that problem could not be overcome by examining the "metadata” in the computer files, which would show not only the date a document was last saved, but also when the document was first created and (often times) the changes in the documents from the original draft to the final revision.
See
Manual for Complex Litigation Fourth at 78 (Federal Judicial Center 2004);
see also
The Sedona Principles at 52 (The Sedona Conference 2004) ("Metadata is information about a particular data set which may describe, for example, how, when, and by whom it was received, created, accessed, and/or modified
. The government’s motion emphasizes that the Court orally stated during the May 4, 2004 meeting that there was "no question” that the application demonstrated probable cause for the search (Gov’t Mot. to Reconsider, at 2). However, a showing of probable cause — no matter how strong — does not authorize a court to dispense with the independent requirement of particularity.
Groh,
- U.S. at -,
. In its oral presentation on May 4 (but not in its written motion), the government argued that a search protocol was not required by analogizing to the situation of the search of documents in a file cabinet. For the reasons stated above, we are persuaded that the analogy of the file cabinet to the computer is inadequate for purposes of the Fourth Amendment issue presented here, a conclusion that the
Carey
court also reached.
Carey,
. The government makes a general argument that it would be “impractical” for the Court to "inquire as .to how the government will conduct a search” (Gov't Mot. to Reconsider at 3 n. 1). That argument fails to account for the tools that are available to create protocols to tailor computer searches, as other courts have recognized. The government’s argument also fails to acknowledge that the Department of Justice has issued a manual stating that it often will be necessary to provide a search protocol in the context of a computer search: "The affidavit should also explain what techniques the agents expect to use to search the computer for specific files that represent evidence of crime and may be intermingled with entirely innocuous documents.” Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, United States Department of Justice, Executive Officer for United States Attorneys, Office of Legal Education at 100 (2d ed.2002) (hereinafter "DOJ Manual”). While the statements in the DOJ Manual do not represent the official position of the Department of Justice or other agencies, DOJ Manual at x, at a minimum the Manual further undermines the government's generalized assertion of "impracticality.”
