While neither rain nor sleet nor snow could keep the residents along Postal Highway Contract Route 64 in Los Lunas, New Mexico from receiving their mail, the temptations of mail fraud and credit card theft were a different story. Loretta Otero, the assigned postal carrier for that route, was identified as the culprit and charged with a number of crimes arising out of her alleged theft. At trial, she moved to suppress two incriminating documents uncovered during a search of her computer on the grounds that the warrant authorizing the search lacked sufficient particularity. The district court agreed and suppressed the evidence. The government filed this interlocutory appeal under 18 U.S.C. § 3731. While we agree with the district court that the warrant was invalid for lack of particularity, we hold that the good faith exception to the exclusionary rule should apply and, accordingly, we reverse.
I. Background
In February 2001, a number of residents along Postal Highway Contract Route 64 began to lodge complaints that their mail was not being delivered. Specifically, they complained that they were missing credit cards, personal identification numbers, and billing statements. These residents had also noticed a number of unauthorized cash withdrawals from their accounts.' Ms. Otero had been the assigned postal carrier on Postal Highway Contract Route 64 for more than thirteen years.
Understandably suspicious, Postal Inspector Stephanie Herman devised an investigation. On March 13, 2002, she prepared two test letters that appeared to be from credit card companies and were addressed to residents on Ms. Otero’s route. Inspector Herman then conducted surveillance of Ms. Otero as she made her deliveries, confirming that the two test letters were never delivered. When Ms. Otero completed her route, returned to the Los Lunas Carrier Annex, gathered her personal belongings, and left the building, Inspector Herman stopped her in the parking lot and inspected her bags. Inside the bags Inspector Herman found not only the two test letters, but also six other pieces of First Class Mail, all addressed to residents on Ms. Otero’s route and all from credit card companies. Ms. Otero was immediately placed on suspension and another carrier took over her route. Although Ms. Otero had been relieved of her delivery duties, residents reported that a week after her suspension she in fact continued making deliveries, though only of a very particular type of letter: credit card-related mail with outdated postmarks.
On March 27, 2002, Inspector Herman prepared a search warrant for Ms. Otero’s residence. Before bringing it to the magistrate judge, she took the warrant to an Assistant United States Attorney so that he could review it and confirm “that all of the information was there, ... [that] there was probable cause and that it was legally correct.” App. 127. Only after obtaining the AUSA’s approval did she submit the warrant to the magistrate judge. The key portion of the warrant outlining the scope of the search was Attachment B, which read in full:
ITEMS TO BE SEIZED:
*1130 1. Any and all mail matter addressed to residents of Highway Contract Route 064 in Los Lunas, New Mexico.
2. Any and all credit cards, credit card receipts and/or other records bearing names, addresses and/or credit card numbers of known victims and other residents from Highway Contract Route 064 in Los Lunas, New Mexico.
3. Any and all credit cards, credit card invoices, receipts, statements, affidavits of forgery, pre-approved offers, applications, correspondence, automatic teller machine (ATM) receipts and/or other records related to credit card or other accounts at financial institutions and/or businesses for individuals other than residents of 123 La Ladera Rd., Los Lunas, NM 87031 [Ms. Otero’s address].
4. Any and all mail matter or correspondence addressed to individuals other than residents of 123 La Ladera Rd., Los Lunas, NM 87031.
5. Any and all materials including but not limited to letters, correspondence, journals, records, notes, data and computer logs bearing victim information and/or other information related to or pertaining to the theft of mail, the fraudulent credit cards, bank fraud and conspiracy including but not limited to credit card offers, receipts, credit card statements, financial statements, and financial transaction records.
COMPUTER ITEMS TO BE SEIZED
6. Any and all information and/or data stored in the form of magnetic or electronic coding on computer media or on media capable of being read by a computer or with the aid of computer-related equipment. This media included floppy diskettes, fixed hard disks, removable hard disk cartridges, tapes, laser disks, video cassettes and other media which is capable of storing magnetic coding, as well as punch cards, and/or paper tapes and all printouts of stored data.
7. Any and all electronic devices which are capable of analyzing, creating, displaying, converting, or transmitting electronic or magnetic computer impulses or data. These devices include computers, computer components, computer peripherals, word processing equipment, modems, monitors, cables, printers, plotters, encryption circuit boards, optical scanners, external hard drives, external tape backup drives and other computer-related electronic devices.
8. Any and all instructions or programs stored in the form of magnetic or electronic media which are capable of being interpreted by a computer or related components. The items to be seized include operating systems, application software, utility programs, compilers, interpreters and other programs or software used to communicate with computer hardware or peripherals either directly or indirectly via telephone lines, radio or other means of transmission.
9. Any and all written or printed material which provides instructions or examples concerning the operation of the computer systems, computer software and/or any related device, and sign-on passwords, encryption codes or other information needed to access the computer system and/or software programs.
App. 63-64. Inspector Herman attached an affidavit in which she stated that, in her experience, “people engaged in this type of criminal activity often keep records on the computers, including the hard drive and disks,” App. 69, and in which she explained the process for off-site recovery of such records and said that the search would “make every effort to review and copy only those programs, directories, files, and materials that are instrumentalities and/or evidence of the offenses described herein.” *1131 App. 70. That affidavit, however, was not explicitly incorporated into the warrant.
The magistrate judge signed the warrant and Inspector Herman executed it on March 28, 2002. She seized a computer hard drive, eighty-eight floppy disks, and two compact disks, all of which she sent to Robert Werbick, a forensic computer analyst with the Postal Inspection Service. Inspector Herman also sent a copy of the warrant, the application and affidavit in support of the warrant, and a cover letter explaining that the “search warrant was for items relating to the theft of credit cards and related correspondence from the mail on Highway Contract Route (HCR) 064.” App. 72. The letter instructed Inspector Werbick to ascertain “[wjhether information described in Attachment B of the search warrant exists within the files on the hard drive, the floppy disks or the CDs.” Id. She also included a list of known victims and a list of the names and addresses of persons along the delivery route.
Inspector Werbick conducted a keyword search of the hard drive and disks, using the list of victim names and credit card information that Inspector Herman had provided him. He did not, however, place a date restriction on his search that would limit the search only to files created during the time of the suspected credit card fraud. When the search generated a “hit,” Inspector Werbick would examine the hit to determine whether or not it fell within the scope of the warrant. Most of the hits turned out to be “false hits.” For example, a search based on a resident with the last name “Arnold” would also pull up files associated with “Arnold Schwarzenegger” or “Arnold Palmer.” Two of the hits, however, uncovered highly pertinent information that someone had tried to delete from the hard drive. One was a credit card log that listed fourteen names, some of whom were known victims, with accompanying headings such as “Pin,” “Account Number,” “Credit Limit,” and “Address.” The second was a list of names and addresses of individuals along Ms. Otero’s route. Both of these files were found in the “unallocated space” of the hard drive, where deleted data is stored before it is then overwritten with new data. According to Inspector Werbick, a date restriction could not have been used in a search of unallocated space.
Ms. Otero was charged with a number of crimes, including theft or receipt of stolen mail in violation of 18 U.S.C. § 1708, theft of mail by an officer or employee of the postal service in violation of 18 U.S.C. § 1709, obstruction of correspondence in violation of 18 U.S.C. § 1702, and devising a scheme or artifice to defraud in violation of 18 U.S.C. §§ 1341 and 1346. At trial she moved to suppress, as the fruits of an invalid warrant, the two files uncovered from her hard drive. The court granted her motion, finding that the warrant was facially defective because it “purports to authorize the search and seizure of ‘any and all’ computer items-without limitation.” Op. 12. The court rejected the government’s argument that under a natural reading of the warrant the portion authorizing the computer search was limited to information pertaining to the alleged mail fraud and credit card theft. The court also rejected the government’s assertion that the good faith exception applied. The government filed this interlocutory appeal.
II. Discussion
A. Particularity of the Warrant
The Fourth Amendment requires not only that warrants be supported by probable cause, but that they “particularly describ[e] the place to be searched, and the persons or things to be seized.” U.S. Const, amend. IV. The particularity requirement “ensures that the search will be
*1132
carefully tailored to its justifications, and will not take on the character of the wide-ranging exploratory searches the Framers intended to prohibit.”
Maryland v. Garrison,
Wisely, the government does not contest that a warrant authorizing a search of “any and all information and/or data” stored on a computer would be anything but the sort of wide-ranging search that fails to satisfy the particularity requirement. Its claim, rather, is that under a natural reading of the warrant the computer search is limited to uncovering only evidence of the mail and credit card theft along Ms. Otero’s delivery route. In other words, paragraphs six, seven, eight, and nine, which fall under the heading “COMPUTER ITEMS TO BE SEIZED,” are limited by paragraphs two, three, and five, which fall under the separate heading of “ITEMS TO BE SEIZED” and restrict the search to “information related to or pertaining to the theft of mail, the fraudulent credit cards, bank fraud and conspiracy.” App. 63.
It is true that “practical accuracy rather than technical precision controls the determination of whether a search warrant adequately describes the place to be searched.”
United States v. Simpson,
Attachment B is quite neatly divided into two subsections: “ITEMS TO BE SEIZED” and “COMPUTER ITEMS TO BE SEIZED.” Each paragraph under the first section takes pains to limit the search to evidence of specific crimes or evidence pertaining to specific persons along Ms. Otero’s delivery route. Each paragraph under the second section, in contrast, has no limiting instruction whatsoever. Read alone, they each authorize a search and seizure of “[a]ny and all” information, data, *1133 devices, programs, and other ■ materials. There is no explicit or even implicit incorporation of the limitations of the first five paragraphs. The computer-related paragraphs do not even refer to the rest of the warrant. In fact, the presence of limitations in each of the first five paragraphs but absence in the second four suggests that the computer searches are not subject to those limitations. Even when read in the context of the overall warrant, therefore, the paragraphs authorizing the computer search were subject to no affirmative limitations.
The government contends that the warrant in this case is comparable to the warrant in
United States v. Brooks,
which we upheld.
Differences such as subject headings and paragraph formation might seem insignificant, but if we are to follow our command of reading each part of the warrant in context, these structural indicators are useful tools. Affording the government a practical rather than a technical reading does not require us to indulge every possible interpretation. Though a reasonable person might be forgiven for reading the entire warrant as subject to limitations, we believe that the most practical reading authorizes a wide-ranging search of Ms. Otero’s computer. The warrant as it pertained to the computer search was therefore invalid.
B. The Good Faith Exception
Finding that a warrant is invalid does not automatically require application of the exclusionary rule, and the motion to suppress should still be denied if the government can avail itself of
United States v. Leon's
good faith exception.
Even if an officer lacks subjective knowledge that a warrant is legally deficient, however,
pre-Herring
precedent holds that “a warrant may be so facially
deficient
— ie., in failing to particularize the place to be searched or the things to be seized — that the executing officers cannot reasonably presume it to be valid.”
Leon,
In this case, Inspector Herman attempted to craft a warrant that would authorize a search for evidence of mail and credit card theft that had been hidden on Ms. Otero’s computer. While the actual drafting did not accomplish her goals, one can see how a reasonable officer might have thought that the limitations in the first portion of Attachment B would be read to also apply to the second portion. Inspector Herman did not stop at her own understanding of the warrant, but sought the assistance of the Assistant United States Attorney, who ensured her that it satisfied the legal requirements. The magistrate judge then added his own approval. The affidavit that accompanied the warrant limited the computer search to those federal crimes for which there was probable cause. In enlisting Inspector Werbick’s help in searching the disks and hard drive, Inspector Herman sent him not only the warrant but her affidavit, as well as instructions to search for items related to the theft of mail and credit card-related materials from Ms. Otero’s mail route. She also provided him with information pertaining to known victims that would assist him in this search. Inspector Werbick understood his search as being limited to evidence of mail and credit card theft along Ms. Otero’s route, and accordingly conducted a keyword search geared toward information about the known victims. Both Inspectors Herman and Werbick therefore had reason to believe that the warrant was subject to limitations, and they conducted their search accordingly. This is not the kind of “flagrant or deliberate violation of rights,”
Herring,
This case is quite close to that of
United States v. Riccardi,
where we applied the good faith exception to a computer search
*1135
that uncovered child pornography, despite the fact that the warrant lacked particularity.
The present case does not precisely mirror the facts of Riccardi — here, the officer who wrote the affidavit was not directly involved in the forensic analysis of the computer, but instead instructed another officer on what to search for — but we nonetheless find them substantially similar. The fact that the officer conducting the computer search had not been involved from the beginning of the investigation does not alone militate against good faith when that officer received — and, more importantly, followed — search instructions that limited the scope of his search to crimes for which there was probable cause. Moreover, one of the more important facts that the two share in common is the officers’ attempts to satisfy all legal requirements by consulting a lawyer. See id. at 864. (“By consulting the prosecutor, they showed their good faith in compliance with constitutional requirements.”). Indeed, a frequent criticism of the good faith exception is that it encourages officers not to make these consultations and “risk that some conscientious prosecutor ... will say the application is insufficient when, if some magistrate can be induced to issue a warrant on the basis of it, the affidavit is thereafter virtually immune from chailenge[.]” Wayne R. LeFave, 1 Search and Seizure 68 (4th ed.). The fact that Inspector Herman, like the officer in Riccardi, made this step is an important indicator of her good faith. If more officers took such precautions we would have greater rather than less protection of Fourth Amendment rights.
The district court questioned whether Inspector Werbick’s search methodology was in fact limited in scope to items for which there was probable cause. Dist. Op. 21. Specifically, it noted that the search did not include a date restriction and also generated false hits, which required him to view non-relevant information. The search methodology, however, does not seem to have been motivated by any belief that the warrant gave Inspector Werbick free rein over Ms. Otero’s computer, but by the fact that “[g]iven the numerous ways information is stored on a computer, openly and surreptitiously, a search can be as much an art as a science.”
Brooks,
The inspectors in this case had reason to believe the warrant was valid, considered themselves authorized to search only for evidence of crimes for which they had probable cause, and conducted their search accordingly. We therefore hold that the good faith exception should apply and the evidence should not be excluded.
III. Conclusion
Though we agree with the district court that the warrant authorizing the search of Ms. Otero’s computer lacked particularity, because we find that the good faith exception applies, we REVERSE the district court’s order to suppress and REMAND for further proceedings consistent with this opinion.
BALDOCK, Circuit Judge, concurring in part and concurring in the judgment.
In my view, the slender criticisms lodged against the warrant’s particularity pale in comparison to the good faith of the officers involved in this case. Accordingly, I would not reach the validity of the search warrant and do not join Part II.A of the Court’s opinion.
See United States v. Leon,
