Lead Opinion
Thomas Mink appeals the district court’s dismissal of his 42 U.S.C. § 1983 complaint against Susan Knox, a deputy district attorney, on qualified immunity grounds. We reverse.
I.
Mr. Mink, a student at the University of Northern Colorado (“UNC”), created a fictional character, “Junius Puke,” for the editorial column of his internet-based journal, The Howling Pig.
Mr. Peake, who was not amused, contacted the Greeley police, who started investigating a potential violation of Colorado’s criminal libel statute, Colo.Rev.Stat. § 18-13-105. See Mink v. Knox,
Mr. Mink and his mother subsequently filed suit in federal district court against the City of Greeley, Colorado, the district attorney, Detective Ken Warren, and a “John Doe” assistant district attorney, seeking damages for the search and seizure, among other things. The district court granted Mr. Mink’s motion for a temporary restraining order and ordered the City of Greeley to return “to the Plaintiffs the computer, and all contents thereof, seized following the search of Plaintiffs’ home.” Id. at 1250 (quoting Dist. Ct. Order, Jan. 9, 2004, at 1). Thereafter, the district attorney issued a written “No File” decision, concluding that the statements contained in The Howling Pig could not be prosecuted under the Colorado criminal libel statute.
Mr. Mink then amended his complaint, removing his mother as a plaintiff and adding Ms. Knox as a defendant.
a prosecutor is entitled to absolute immunity for those actions that cast him in the role of an advocate initiating and presenting the government’s case. Absolute immunity, however, does not extend to those actions that are investigative or administrative in nature, including the provision of legal advice outside the setting of a prosecution.
Id. at 1261-62. We concluded that Ms. Knox “was not wearing the hat of an advocate,” id. at 1262, when she reviewed the affidavit in support of the warrant, and “thus, is not entitled to absolute prosecutorial immunity.” Id. at 1263. Nevertheless, we noted that Ms. Knox “may be entitled to qualified immunity if she reasonably concluded probable cause existed to support the warrant application, or that the application of the Supreme Court’s First Amendment cases to the criminal libel statute was not clearly established under the circumstances here.” Id.
On remand the district court granted Ms. Knox’s motion to dismiss the amended complaint, holding that (1) “a reasonable official in Knox’s position could believe that the statements in The Howling Pig were not protected statements under the First Amendment — and, accordingly, that Plaintiffs actions in publishing such statements could subject him to criminal prosecution under the Colorado libel statute,” and (2) although the search warrant violated the Fourth Amendment’s particularity
On appeal, Mr. Mink asks us to decide whether the district court erred when it dismissed,
on the basis of qualified immunity, Mr. Mink’s claim alleging an unlawful search and seizure in violation of the Fourth Amendment, where the search lacked probable cause because clearly-established First Amendment law protected Mr. Mink’s speech, and because the overbroad affidavit and warrant violated clearly-established Fourth Amendment law[.]
Aplt. Br. at 2.
II.
“[F]ederal courts engage in de novo review when mulling defamation issues that are tinged with constitutional implications.” Levinsky’s, Inc. v. WalMart Stores, Inc.,
To determine whether a motion to dismiss was properly granted, we apply a plausibility standard to ascertain whether the complaint includes enough facts that, if assumed to be true, state a claim to relief that is plausible on its face. Ashcroft v. Iqbal, - U.S. -, -,
We also review de novo the district court’s decision regarding qualified immunity. Archuleta,
*1001 A plaintiff can demonstrate that a constitutional right is clearly established by reference to cases from the Supreme Court, the Tenth Circuit, or the weight of authority from other circuits. There need not be precise factual correspondence between earlier cases and the case at hand, because general statements of the law are not inherently incapable of giving fair and clear warning. The right must only be sufficiently clear that a reasonable official would understand that what he is doing violates that right.
Archuleta,
In dismissing Mr. Mink’s amended complaint, the district court considered whether: (1) there was a causal connection between Ms. Knox’s actions and the alleged violation of Mr. Mink’s constitutional rights; (2) Mr. Mink’s constitutional rights were violated; and (3) the violated constitutional rights were clearly established at the time the violation occurred. We address each of these questions in turn.
A.
The Causal Connection
Mr. Mink alleged that Ms. Knox caused the issuance of a search warrant that lacked probable cause and particularity, thereby causing a violation of his Fourth Amendment rights. The district court held that in order to recover on this claim, Mr. Mink was required to allege Ms. Knox’s direct participation in the constitutional violation, and that he had failed to do so:
Plaintiff does not, however, allege that Knox issued the warrant, nor that she reviewed the warrant, nor that she participated in the search and seizure executed pursuant to the warrant. The question here, therefore, is whether — • taken in the light most favorable to Plaintiff — the complaint alleges sufficient facts to show Knox — solely by reviewing and approving the affidavit submitted in support of the search warrant — violated Plaintiffs constitutional rights.
Mink II,
Title 42 U.S.C. § 1983 provides, in relevant part:
Every person who, under color of any statute, ordinance, regulation, custom, or usage, of any State or Territory or the District of Columbia, subjects, or causes to be subjected, any citizen of the United States or other person within the jurisdiction thereof to the deprivation of any rights, privileges, or immunities secured by the Constitution and laws, shall be liable to the party injured in an action at law, suit in equity, or other proper proceeding for redress.
Id. (emphasis added). “The requisite causal connection is satisfied if the defendant set in motion a series of events that the defendant knew or reasonably should have known would cause others to deprive the plaintiff of her constitutional rights.” Snell v. Tunnell,
On appeal, Ms. Knox urges us to affirm the district court’s sua sponte conclusion that the complaint should be dismissed because it did not specifically allege that Ms. Knox reviewed the warrant as well as the affidavit. We decline to do so. Notably, as Mr. Mink points out, both the affidavit and search warrant were attached to the amended complaint, and Ms. Knox’s own affidavit subsequently indicated that the warrant was one of the documents she reviewed, in accordance with Colo.Rev. Stat. § 20-1-106.1.
More importantly, taking Mr. Mink’s allegations as true, viewing them in the light most favorable to him, and making all reasonable inferences in his favor, as we are required to do, persuades us that the amended complaint plausibly asserted the requisite casual connection between Ms. Knox’s conduct and the search and seizure that occurred at Mr. Mink’s home. The amended complaint not only alleged that Ms. Knox “reviewed and approved the affidavit submitted to the state district court in support of the warrant to search the Mink’s home,” Aplt.App., vol. I at 117, 119, it also alleged that she “authorized and caused an unlawful seareh[,]” id. at 118, that “[a] reasonable prosecutor would have known that the warrard failed to meet the particularity requirement of the Fourth Amendment,]” id. at 119 (emphasis added), and that “[a] reasonable
B.
Mr. Mink’s Allegations, If True, Establish a Constitutional Violation
Mr. Mink alleged that the search and seizure of his property based on an invalid warrant violated his Fourth Amendment rights. Three conditions must be met for searches and seizures pursuant to a warrant to be constitutional.
First, warrants must be issued by neutral, disinterested magistrates. Second, those seeking the warrant must demonstrate to the magistrate their probable cause to believe that the evidence sought will aid in a particular apprehension or conviction for a particular offense. Finally, warrants must particularly describe the things to be seized, as well as the place to be searched.
Dalia v. United States,
1. Probable Cause
The first question is whether there was probable cause to believe that Mr. Mink’s publication of The Howling Pig violated the Colorado criminal libel statute. “The substance of all the definitions of probable cause is a reasonable ground for belief of guilt.” Brinegar v. United States,
Probable cause exists if “facts and circumstances within the officers’ knowledge and of which they had reasonably trustworthy information are sufficient in themselves to warrant a man of reasonable caution in the belief that an offense has been or is being committed.” Bowling,
It goes without saying that a government official may not base her probable cause determination on an “unjustifiable
a. First Amendment and Defamation
For centuries, the common law has afforded a cause of action to a person whose reputation has been damaged by the publication of false and defamatory statements. Milkovich v. Lorain Journal Co.,
Who steals my purse steals trash ...
But he that filches from me my good name
Robs me of that which not enriches him,
And makes mp poor indeed.
Id. (quoting Act III, scene 3).
Nevertheless, the Supreme Court has recognized a number of constitutional limits on various categories of speech which may be the subject of state defamation actions, see id. at 14-18,
[t]he First Amendment is not limited to ideas, statements, or positions which are accepted; which are not outrageous; which are decent and popular; which are constructive or have some redeeming element; or which do not deviate from community standards and norms; or which are within prevailing religious or moral standards.... The First Amendment standards are not adjusted to a particular type of publication or particular subject matter.
Pring v. Penthouse Int’l, Ltd.,
In balancing individual reputation and freedom of speech, the Court has identified various culpability requirements. See generally Milkovich,
As to the “constitutional limits on the type of speech which may be the subject of state defamation actions,” id. at 16,
To determine whether a statement purports to state actual facts about an individual, the Court scrutinizes the meaning of the statement in context. Id. at 16-17,
Even false statements of fact are protected from a defamation claim if any reasonable person would recognize the statements as parody. As the Court held
Although the Supreme Court has not yet squarely addressed whether fantasy, parody, rhetorical hyperbole, or imaginative expression is actionable in a case where a plaintiff is neither a public figure nor the speech on a matter of public concern, this circuit and at least one other circuit have done so. In Pring,
The First Amendment’s shielding of figurative language reflects the reality that exaggeration and non-literal commentary have become an integral part of social discourse. For better or worse, our society has long since passed the stage at which the use of the word “bastard” would occasion an investigation into the target’s lineage or the cry “you pig” would prompt a probe for a porcine pedigree. Hyperbole is very much the coin of the modern realm. In extending full constitutional protection to this category of speech, the Milkovich Court recognized the need to segregate casually used words, no matter how tastelessly couched, from fact-based accusations.
Id. at 128. Applying this analysis, the court held that the word “trashy” was hyperbole and therefore shielded from defamation liability notwithstanding the court’s inability to determine whether the context of the statement involved a matter of public concern. See id. at 130, 132-34.
Our holding in Pring, reiterating and applying the test in the context of a private figure on a matter of private concern, is an inevitable explication of the focal point of the Court’s analysis in Bresler,
The test of what a particular statement could reasonably be understood to have asserted is what a reasonable reader would understand the author to be saying, considering the kind of language used and the context in which it is used. See Milkovich,
Following this path, we held in Pring:
The test is not whether the story is or is not characterized as “fiction,” “humor,” or anything else in the publication, but whether the charged portions in context could be reasonably understood as describing actual facts about the plaintiff or actual events in which she participated. If it could not be so understood, the charged portions could not be taken literally. This is clearly the message in Greenbelt and Letter Carriers.
b. Junius Puke Is a Parody of Professor Peake
The dispositive question is whether a reasonable person would conclude that the statements in The Howling Pig were actual statements of fact about Mr. Peake, or attributable to him, rather than a satirical spoof. For the reasons stated below, we conclude that the answer is no.
As we have noted, The Howling Pig humorously altered Mr. Peake’s photograph to create the character of Junius Puke, its “editor.” Another photo was altered to depict Mr. Peake/Puke made up as a character in the rock band KISS. Junius Puke covered subjects and used language that Mr. Peake, a professor of finance, surely would not have. For example, the editorial said:
This will be a regular bitch sheet that will speak truth to power, obscenities to clergy, and advice to all the stoners sitting around watching Scooby Doo.
This will be a forum for the pissed off and disenfranchised in Northern Colorado, basically everybody.
I made it to where I am through hard work, luck, and connections, all without a college degree.
Dissatisfaction with a cushy do-nothing ornamental position led me to form this subversive little paper.
I don’t normally care much about the question of daycare since my kids are grown and other people’s children give me the willies[.]
ApltApp., vol. I at 147-48. Significantly, The Howling Pig editorials even contained an express disclaimer regarding the editor:
*1009 The Howling Pig would like to make sure that there is no possible confusion between our editor Junius Puke and the Monfort Distinguished Professor of Finance, Mr. Junius “Jay” Peake. Mr. Peake is an upstanding member of the community as well as an asset to the Monfort School of Business where he teaches about microstructure. Peake is active in many community groups, married and a family man. He is nationally known for his work in the business world, and has consulted on questions of market structure. Junius Puke is none of those things and a loudmouth know-it-all to boot, but luckily he’s frequently right and so is a true asset to this publication.
Id. at 146. According to the search warrant affidavit itself:
The picture [of Junius Peake] has been altered to include sunglasses, a smaller nose and a small moustache similar to that of Hitler’s. The person in the photograph is identified on the website as Junius Puke. The picture is accompanied by a biography of Mr. Puke. According to the site, its purpose is to draw attention to issues rampant in Northern Colorado and Elsewhere [sic].
Ex. B at 3.
Balanced against all this, Detective Warren provided Mr. Peake’s complaint to him as the sole basis of the alleged defamatory content articulated in the affidavit. Thus, the affidavit said that “[Mr. Peake] told Detective Warren that the statements made on the website about him are false.” Id. When asked to provide some examples, Mr. Peake cited the following:
1) The website uses his photograph and identifies him as the Editor in Chief Junius Puke.
2) The website states that he “gambled in tech stocks” in the 90’s.
3) The website states: The dark glasses are to avoid being recognized since he fears the good natured ribbing of his colleagues on Wall Street where he managed to luck out and ride the tech bubble of the nineties like a $20 whore and make a fortune.
4) The website contains many opinions and articles about The University of Northern Colorado, the Greeley Community and Northern Colorado. As this is an “editorial” column, those statements are attributed to Mr. Puke, and therefore Mr. Peak [sic]. Mr. Peak [sic] feels that these opinions are not his but have been attributed to him.
Id. at 3-4.
The test is not how Mr. Peake would characterize The Howling Pig’s editorial column, but how a reasonable person would understand those statements in that context. See Pring,
Because a reasonable person would not take the statements in the editorial column as statements of facts by or about Professor Peake, no reasonable prosecutor could believe it was probable that publishing such statements constituted a crime warranting search and seizure of Mr. Mink’s property.
2. Particularity Requirement
Mr. Mink also alleged that the warrant used to search and seize his property lacked the particularity required by the Fourth Amendment. The district court agreed,- stating that “[u]nder the ‘scrupulous’ standard required by the Supreme Court [for seizures of books and other materials protected by the First Amendment], I have no doubt the warrant in . this case was overly broad.” Mink II,
The Fourth Amendment requires that a search warrant describe with particularity the things to be seized in order to avoid a general exploratory rummaging of a person’s belongings. United States v. Campos,
A warrant is overly broad if it does not contain sufficiently particularized language that creates a nexus between the suspected crime and the items to be seized. See Campos,
[t]he modern development of the personal computer and its ability to store and intermingle a huge array of one’s personal papers in a single place increases law enforcement’s ability to conduct a wide-ranging search into a person’s private affairs, and accordingly makes the particularity requirement that much more important. See, e.g. United States v. Riccardi,405 F.3d 852 , 863 (10th Cir. 2005) (warrant authorizing general search of computer invalid as it permitted officers to search anything “from child pornography to tax returns to private correspondence”); United States v. Carey,172 F.3d 1268 , 1272 (10th Cir. 1999) (computer search for files pertaining to distribution of controlled substances uncovered child pornography).
Id. at 1132. We therefore held that “warrants for computer searches must affirmatively limit the search to evidence of specific ... crimes....” Id. (quoting Riccardi,
Here, there was no reference anywhere in the warrant to any particular crime, much less to the Colorado criminal libel statute. See Ex. A. The only reference to a crime in the entire warrant was a citation to a portion of the Colorado Rule of Criminal Procedure 41(b), which specified generally:
*1011 A search warrant may be issued under this Rule to search for and seize any property:
(1) Which is stolen or embezzled; or
(2) Which is designed or intended for use as a means of committing a criminal offense; or
(3) Which is or has been used as a means of committing a criminal offense; or
(4) The possession of which is illegal; or
(5) Which would be material evidence in a subsequent criminal prosecution in this state or in another state ...
Colo. R.Crim. P. 41(b) (2003) (emphasis added).
The warrant authorized the search and seizure of all computer and non-computer equipment and written materials in Mr. Mink’s house, without any mention of any particular crime to which they might be related, essentially authorizing a “general exploratory rummaging” through Mr. Mink’s belongings for any unspecified “criminal offense.” See Campos,
Based on the foregoing, viewing the amended complaint in the light most favorable to the nonmoving party, Mr. Mink, and drawing all reasonable inferences in his favor, see Archuleta,
C.
The Law Was Clearly Established at the Time the Alleged Violations Occurred
The prong of the qualified immunity test requiring that the law be clearly established is easily satisfied here. Ms. Knox’s review of the affidavit and warrant occurred in December 2003. Long before that, it was clearly established in this circuit that speech, such as parody and rhetorical hyperbole, which cannot reasonably be taken as stating actual fact, enjoys the full protection of the First Amendment and therefore cannot constitute the crime of criminal libel for purposes of a probable cause determination. Pring,
Ms. Knox insists that this case is factually analogous to Douglas v. Dobbs,
III.
In sum, we conclude the amended complaint plausibly alleged that Ms. Knox violated Mr. Mink’s clearly established constitutional rights. Accordingly, we REVERSE the district court’s decision granting Ms. Knox’s motion to dismiss and REMAND for further proceedings consistent with this opinion.
Notes
. The facts are taken primarily from our previous decision in Mink v. Slithers,
. Ms. Knox admitted in an affidavit submitted on March 8, 2004, that she reviewed the warrant as well as the search warrant affidavit.
. Mr. Mink also removed the City of Greeley and Officer Warren, and added Ken Salazar in his official capacity as Attorney General of Colorado.
. We may consider the two parts of this test in the sequence we deem best in light of the circumstances in the particular case. See Pearson v. Callahan, - U.S. -, -,
. In Ashcroft v. Iqbal, - U.S. -,
We found it unnecessary in Lewis to take a position on the debate, and we need not do so here. Mr. Mink has pled sufficient facts to state a facially plausible claim that Ms. Knox’s input into and advice concerning the affidavit and warrant directly caused the purportedly unconstitutional search of his house. Our precedent and Iqbal lead to the same result because we rely on Poolaw and Snell’s legal standard of liability for defendant's personal participation, not for supervisory liability
. The statute provides:
(1) The district attorneys of the several judicial districts in the state of Colorado shall: (a) Render ... legal advice to peace officers, upon the request of such officers or of the court, pertaining to the preparation and review of affidavits and warrants for arrests, searches, seizures, ...
Colo.Rev.Stat. § 20-1-106.1 (emphasis added).
. Civil and criminal libel cases "are subject to the same constitutional limitations.” Herbert v. Lando,
. Thus, the district court was incorrect when it slated that “the question of whether this 'opinion, parody, and hyperbole' exception extends to statements about private figures on matters of private concern does not appear to be resolved in this circuit.” Mink II,
. Accordingly, if we determine that the charged portions of The Howling Pig would not have been reasonably believed to be true statements about Professor Peake, it is not relevant to our analysis whether Mr. Peake was a public figure or speaking on a matter of public concern. See Pring,
. Isaacks cites to other courts' opinions that have adopted variations of the Pring test:
Dworkin v. Hustler Magazine, Inc.,867 F.2d 1188 , 1193-94 (9th Cir.1989) (Hustler features mentioning Dworkin’s name in a derogatory fashion were “privileged opinion” because they could not be "reasonably understood as statements of fact.”); San Francisco Bay Guardian, Inc. v. Superior Court,17 Cal.App.4th 655 ,21 Cal.Rptr.2d 464 , 467 (1993) (average reader would recognize phony letter to the editor as “a fake and a joke”); Walko v. Kean College,235 N.J.Super. 139 ,561 A.2d 680 , 683 (1988) ("A parody or spoof that no reasonable person would read as a factual statement, or as anything other than a joke — albeit a bad joke — cannot be actionable as a defama*1008 lion.”) (citing Pring); Myers v. Boston Magazine Co., Inc.,380 Mass. 336 ,403 N.E.2d 376 , 379 (1980) (reasonable reader would not understand satire to state actual fact); Garvelink v. Detroit News,206 Mich.App. 604 ,522 N.W.2d 883 , 886 (1994) (As a matter of law, satirical article could not “reasonably be interpreted as stating actual facts about the plaintiff and ... is, therefore, protected speech.”); Hoppe v. Hearst Corp.,53 Wash.App. 668 ,770 P.2d 203 , 206 (1989) (adopting Pring test and holding that parody was non-actionable as a matter of law).
Isaacks,
. The amended complaint alleged that this is exactly how the officer executing the warrant read it: "Detective Warren [told Mr. Mink] that he could take ‘everything in the house' if he wanted.” Aplt.App., vol. I at 108.
Concurrence Opinion
concurring.
I agree with the court’s holding in all respects and join its reasoning with one minor exception. Even with respect to that exception, I agree with the result the court reaches, arriving at a common destination but only by a different route.
The question the court confronts in Section ILB.l.a is whether probable cause existed to think that Mr. Mink’s column constituted “criminal libel.” I agree with my colleagues that the answer to that question must be “no.” I reach this conclusion for a simple and straightforward reason: this court has already said so. Pring v. Penthouse International, Ltd.,
Respectfully, I would avoid these thickets. Whoever has the better path through them, it’s better yet that we sidestep them altogether. To decide the case currently before us, it’s enough to say we are bound by Pring, and so was the district court. Beyond that, I would not venture. See PDK Labs., Inc. v. DEA,
EXHIBIT A
STATE OF COLORADO
COUNTY OF WELD
ss.
NO__DIVISION_
IN THE DISTRICT COURT
NINETEENTH JUDICIAL DISTRICT
SEARCH WARRANT
THE PEOPLE OF THE STATE OF COLORADO:
TO: Any Any officer authorized by law to execute a search warrant in the County wherein the property is located.
Ken Warren, having this date filed an Affidavit for a Search Warrant in conformity with the provisions of Colorado Rules of Criminal Procedure, 41(b) and (c), for the following described property, to-wit:
1) Any and all computer systems and computer equipment to include, but not limited to, central processing units and circuit boards attached or unattached to the computer system.
2) Any and all storage media to include, but not limited to, floppy diskettes, hard disk drives, removable disk drive cartridges and drives, magnetic computer tapes, compact disks, and any other device capable of storing information in a magnetic/optical form, whether internal or external to the computer system, attached or unattached to the computer system.
3) Any and all computer peripheral devices attached or unattached to the computer to include but not limited to computer monitors, printers, keyboards, modems, or other physical devices which serve to transmit or receive information to and from the computer.
4) Any and all documents which serve the purpose of explaining the way in which the computer hardware, programs, and data are used, including manuals for computer equipment or software, printouts of computer programs, data files, or other information which has been or continues to be stored electronically or magnetically in the computer system.
5) Any and all computer programs or software , used in the operation of the computer system, used to transmit or receive information, used to display or print graphics or other types of files, and all other computer programs and software associated with the computer system to include all programs stored on the computer, floppy disk, CD’s, or other storage media.
6) Any and all papers, documents, or other readable material, whether generated by handwriting, typewriter, computer or other device, which contains names, addresses, or telephone*1014 numbers, and passwords for this, or other computer systems.
7) Any and all correspondence, diaries, memoirs, journals, personal reminiscences electronic mail (email), letters, notes, memorandum, or other communications in written or printed form.
8) Indicia of occupancy consisting of articles of personal property tending to establish the identity of the person or persons in control of the premises at 310 West 5th St, Ault, Weld County, Colorado, including, but not limited to rent receipts, canceled mail, keys, utility bills and telephone bills.
9) Any and all passwords, encryption keys, access codes or other security or privacy devices, whether of a physical, written or oral form, used to encrypt, encode, or otherwise limit access to information, files, programs, accounts or other data associated with or stored on the computer.
10) Any proof of ownership or maintenance of control of electronic or computer related equipment, programs, data, or documentation at that address including correspondence, invoices, or similar items.
11) Your affiant is seeking permission to examine the computer and storage devices for any and all data, correspondence, electronic mail, voice messages, letters, notes, ledgers, spreadsheets, documents, memorandum, image, video, sound or graphic files for evidence of, or the presence of:
Any connection by this computer to the website “www.geocities.com/ thehowlingpig/” to include evidence of email generated by the Web Site “www.geocities.com/thehowlingpig'” and forwarded to or accessed by this computer.
Any evidence of documents prepared or stored on this computer which relate to the website “www.geoeities. com/thehowlingpig/”.
Any evidence relating to the creation, access (log-in) or maintenance of the website “www.geocities.com/ thehowlingpig/”.
Any and all passwords, encryption keys, access codes or other security or privacy devices, whether of a physical, written or oral form, used to encrypt, encode, or otherwise limit access to information, files, programs, accounts or other data associated with or stored on the computer.
Any proof of ownership, maintenance or control of the computer related equipment, programs, data, correspondence, invoices, registration keys, or similar items.
Any and all diaries, memoirs, journals, personal reminiscences, correspondence, letters, notes, memorandum, stories, electronic mail or other communications in written or oral form, stored on the computer evidence seized as those items may relate to the allegations:
believed to be situated (on the person) (at the place) or (in the vehicle) known as:
310 5th W St
Ault, Colorado
A light Brown, single story, single family dwelling.
With brick on the lower portion of the outside.
The address 310 is prominently posted next to the porch light on the East side of the front door. This house is the 3rd house east of Ash on south side of 5th Street.
upon one or more grounds as set forth in Rule 41(b), Colorado Rules of Criminal Procedure, namely:
*1015 (1) is stolen or embezzled;
(2) is designed or intended for use or which is or has been used as a means of committing a criminal offense or the possession of which is illegal;
(3) would be material evidence in a subsequently criminal prosecution;
The names of persons whose affidavits have been taken in support hereof are: Ken Warren, and I am satisfied that there is probable cause to believe that the property so described is located on the person, premises or in the vehicle above described, YOU ARE THEREFORE COMMANDED to search forthwith the person, place, or vehicle above described, for the property described at any time, day or night. This Warrant shall be executed within ten (10) days of the date the Warrant is issued. The return shall be made promptly and shall be accompanied by a written inventory of all property taken. You shall deliver to the person from whom the property is taken or from whose premises or vehicle the property is taken a copy of this Warrant together with a receipt for the property taken or, in lieu thereof, to leave the copy and receipt at the place from which the property is taken; and to deliver to the issuing judge a written inventory of the property with the return of this Warrant.
Dated this_ day of DEC 12 2003, 2003, at Weld County, Colorado, at__ A.M./P.M.
/s/
JUDGE
EXHIBIT B
IN THE DISTRICT COURT, IN AND FOR THE COUNTY OF WELD, BEFORE JUDGE 03CR1
AFFIDAVIT FOR SEARCH WARRANT UNDER RULE 16
Your affiant, Ken Warren, being first duly sworn, upon his oath says: that he has reason to believe that (on the person) (at the place) or (in the vehicle) known as:
310 5th W St
Ault, Colorado
A light Brown, single story, single family dwelling
With brick on the lower portion of the outside.
The address 310 is prominently posted next to the porch light on the East side of the front door. This house is the 3rd house east of Ash on south side of 5th Street.
there is now located certain property, to-wit:
1. Any and all computer systems and computer equipment to include, but not limited to, central processing units and circuit boards attached or unattached to the computer system.
2. Any and all storage media to include, but not limited to, floppy diskettes, hard disk drives, removable disk drive cartridges and drives, magnetic computer tapes, compact disks, and any other device capable of storing information in a magnetic/optical form, whether internal or external to the computer system, attached or unattached to the computer system.
3. Any and all computer peripheral devices attached or unattached to the computer to include but not limited to computer monitors, printers, keyboards, modems, or other physical devices which serve to transmit or receive information to and from the computer.
4. Any and all documents which serve the purpose of explaining the way in which the computer hardware, pro*1016 grams, and data are used, including manuals for computer equipment or software, printouts of computer programs, data files, or other information which has been or continues to be stored electronically or magnetically in the computer system.
5. Any and all computer programs or software used in the operation of the computer system, used to transmit or receive information, used to display or print graphics or other types of files, and all other computer programs and software associated with the computer system to include all programs stored on the computer, floppy disk, CD’s, or other storage media.
6. Any and all papers, documents, or other readable material, whether generated by handwriting, typewriter, computer or other device, which contains names, addresses, or telephone numbers, and passwords for this, or other computer systems.
7. Any and all correspondence, diaries, memoirs, journals, personal reminiscences electronic mail (email), letters, notes, memorandum, or other communications in written or printed form.
8. Indicia of occupancy consisting of articles of personal property tending to establish the identity of the person or persons in control of the premises at 310 West 5th St, Ault, Weld County, Colorado, including, but not limited to rent receipts, canceled mail, keys, utility bills and telephone bills.
9. Any and all passwords, encryption keys, access codes or other security or privacy devices, whether of a physical, written or oral form, used to encrypt, encode, or otherwise limit access to information, files, programs, accounts or other data associated with or stored on the computer.
10. Any proof of ownership or maintenance of control of electronic or computer related equipment, programs, data, or documentation at that address including correspondence, invoices, or similar items.
11. Your affiant is seeking permission to examine the computer and storage devices for any and all data, correspondence, electronic mail, voice messages, letters, notes, ledgers, spreadsheets, documents, memorandum, image, video, sound or graphic files for evidence of, or the presence of:
Any connection by this computer to the website “www.geocities.com/ thehowlingpig/” to include evidence of email generated by the Web Site “www.geocities.com/thehowlingpig/” and forwarded to or accessed by this computer.
Any evidence of documents prepared or stored on this computer which relate to the website “www.geocities. com/thehowlingpig/”.
Any evidence relating to the creation, access (log-in) or maintenance of the website “www.geocities.com/ thehowlingpig/”.
Any and all passwords, encryption keys, access codes or other security or privacy devices, whether of a physical, written or oral used to encrypt, encode, or otherwise limit access to information, files, programs, accounts or other data associated with or stored on the computer.
Any proof of ownership, maintenance or control of the computer related equipment, programs, data, correspondence, invoices, registration keys, or similar items.
Any and all diaries, memoirs, journals, personal reminiscences, correspondence, letters, notes, memorandum,*1017 stories, electronic mail or other communications in written or oral form, stored on the computer evidence seized as those items may relate to the allegations,
which property:
(1) is stolen or embezzled:
(2) is designed or intended for use or which is or has been used as a means of committing a criminal offense or the possession of which is illegal;
(3) would be material evidence in a subsequent criminal prosecution;
Based upon the following facts:
Your affiant is a police officer for the City of Greeley Police Department and has gained the following information from reading the reports and speaking to fellow officers, from reading the statements of the victim and witnesses and through personal investigation.
Your affiant is currently assigned to the Greeley Police Department, Weld County Forensic Laboratory. Your affiant is responsible for conducting forensic computer analysis on evidence submitted, and for investigating Internet or online related investigations. Your affiant has undergone extensive training on the recovery and documentation of evidence relating to computers, Internet activity, and data recovery from digital media. Your affiant has been examining digital media in excess of Three (3) years.
On November 14th 2003, Junius Peak reported to the Greeley Police Department that he was the victim of what he believed was criminal libel. He reported to Detective Warren that he discovered an Internet Website at the address of www.geocities.com/thehowlingpig. He discovered this website after being sent a copy of the site printed by one of his colleagues at The University of Northern Colorado. He told Detective Warren that there were several copies of this site being passed around on campus. Detective Warren went to the website via an Internet connection at the police department. Upon reading the articles posted on the website, Detective Warren found that the site was apparently designed with a logo that mimics that of The University of Northern Colorado. The website also has a picture of Junius Peak on the main page as well as other pages. The picture of Mr. Peak is from the University of Northern Colorado’s Website. The picture has been altered to include sunglasses, a smaller nose and a small moustache similar to that of Hitler’s. The person in the photograph is identified on the website as Junius Puke. The picture is accompanied by a biography of Mr. Puke. According to the site, its purpose is to draw attention to issues rampant in Northern Colorado and Elsewhere.
The body of the website includes three articles at the time of this affidavit. The articles consist of statements about various topics and persons relating to the Northern Colorado Area and The University of Northern Colorado. According to Mr. Peak, there are many statements in the website and its accompanying articles that are defamatory to his character. He told Detective Warren that the statements made on the website about him are false. He feels that the articles have brought him embarrassment and exposed him to public hatred, contempt and ridicule. He feels they have impeached his honesty, integrity, virtue, and reputation within the community.
When asked to site a few specific examples of this criminal libel, Mr. Peak cited the following examples:
*1018 1) The website uses his photograph and identifies him as the Editor in Chief Junius Puke.
2) The website states that he “gambled in tech stocks” in the 90’s.
3) The website states: The dark glasses are to avoid being recognized since he fears the good natured ribbing of his colleagues on Wall Street where he managed to luck out and ride the tech bubble of the nineties like a $20 whore and make a fortune.
X The website contains many opinions and articles about The University of Northern Colorado, the Greeley Community and Northern Colorado. As this is an “editorial” column, those statements are attributed to Mr. Puke, and therefore Mr. Peak. Mr. Peak feels that these opinions are not his but have been attributed to him.
A full printout of the site as it existed on November 19th is attached to this affidavit at “Attachment A”. It consists of 6 pages including the cover.
Your affiant researched the website and found that it was hosted by Geocities.com. Geocities.com is owned and operated by Yahoo Inc. Your affiant contacted Yahoo and learned that they do archive information relating to the Internet connections established during the creation and maintenance of Geocities sites. They also maintain records to include email for any associated Yahoo accounts. There is a yahoo account associated with this site and its address is “thehowlingpig@yahoo.com”. Yahoo told your affiant they will release this information upon the receipt of a court order.
Your affiant applied for and received an order for the production of the records held by Yahoo for the aforementioned Geocities website. These records included a listing of the connections and log-in activity for the website by anyone with credentials to log into the site. These records DO NOT reflect persons accessing the site, but not logging in (persons only reading the site). This connection information included a number of Internet Protocol Addresses that belong to ICG Telecom Group Inc. Your affiant contacted ICG Telecom Group Inc., and spoke to a Subpoena Compliance Investigator named Carl Nixon. He advised your affiant that his company is a backbone provider for other Internet Service Providers (ISP). His company maintains dial in access and bandwidth (service) for other ISPs to resell to their customers. Carl Nixon told your affiant that they archive connection information for each transaction and that information may include ANI (Automatic Number Identification) or Caller ID information. Carl Nixon told your affiant that his company would produce this information as well as account holder (ISP) information for each connection, upon receipt of a Colorado Court Order.
Your affiant applied for and received a Court Order for records held by ICG Telecom Group Inc. On December 11th, 2003, your affiant received a fax response from ICG Telecom Group Inc. Subpoena Compliance Investigator Steffani Rink. The report Rink provided showed that all connections via ICG Telecom Group’s equipment came from the residence telephone number 970-834-2715, as captured and reported by their system. All connections also showed the username “crysmink” and the connections were made on behalf of the Internet Service Provider Front Range Internet Inc. Your affiant researched this telephone number through public telephone record reverse lookup. The telephone number belongs to the residence
It is your affiant’s training and experience that this information contained on computer media cannot be readily accessed at the location the computer is seized from. The computer will need to be removed, and processed in a forensic laboratory setting. This may involve imaging the media to be examined and then conducting an analysis on that image. Processing the computer on scene may result in an incomplete examination and could result in destruction of data present on the media. Removal and examination in a controlled setting will prevent the destruction of data and will allow for a complete analysis.
Dated this 12th day of December, 2003.
/s/
AFFIANT
This Affidavit, consisting of 5 pages, was subscribed and sworn to before me this 12th day of December, 2003.
/s/
JUDGE
