MEMORANDUM AND ORDER
I. Introduction.
The defendant, Alan N. Scott (“Scott”), here moves to suppress the fruits of two search warrants issued by Magistrate Judge Marianne Bowler. The first warrant issued on March 12, 1999, and was executed on March 16, 1999. The second warrant issued on April 8, 1999, authorizing the government to search the hard drives of two computers seized during the execution of the first warrant. Scott also moves to suppress the contents of his wallet seized by a Secret Service agent on March 16, 1999. Scott argues that the fruits of these two searches should be suppressed because: (a) the initial search warrant issued was not supported by probable cause; (b) the seizure of the computers was illegal due to the absence of probable cause; (c) the search warrants were lacking in particularity; (d) the government so exceeded the scope of the search warrants during their execution that suppression should be mandatory; (e) the search and seizure of the wallet was not a valid search incident to arrest; (f) the government agents failed to comply with Rule 41(d) of the Federal Rules of Criminal Procedure and Scott was prejudiced thereby; and (g) the warrant execution was devoid of the “Good Faith” requirement necessary to invoke United States v. Leon. The government filed a response in opposition to Scott’s motion to suppress, and Scott filed a reply to the government’s opposition. The parties jointly agreed to submit the matter upon the written record without the necessity for an evidentiary hearing.
II. Factual Background.
Based on information provided by two confidential witnesses and long-time childhood friends, James Kent (“Kent”) and *190 Michael Jackson (“Jackson”), Special Agent Mark Graham (“Graham”) of the United States Secret Service submitted a thirty-three page affidavit on March 12, 1999 to Magistrate Judge Bowler. The affidavit summarized a bank fraud scheme alleged to have been undertaken by Scott, Robert Chace, Jr. (“Chace”), Kent, and Jackson. (Def.’s Mot. to Suppress at 2.) Further, the affidavit alleged that Kent and Jackson were involved with Scott and Chace in obtaining “Rhode Island identification cards in false names,” (id. at 3), and stated that Kent and Jackson “were further instructed to obtain Shaw’s supermarket cards, AAA cards and ATM cards, along with opening maildrops in the false names.” (Id.) Moreover, the affidavit recounted information given to Graham by Kent and Jackson regarding two automobile loans secured from BankBoston, as well as other actions taken by the informants. Finally, the affidavit sought the issuance of arrest warrants for Scott and Chace and a search warrant for the premises of 15$ Mason Street, Hyde Park, Massachusetts. The warrants were issued on March 12, 1999, and were executed on March 16, 1999.
On March 16, 1999, Federal agents arrested Scott at his residence, 15$ Mason Street, Hyde Park, Massachusetts upon a complaint charging “Scott with making a counterfeit security, in violation of 18 U.S.C. § 513(a); producing a false identification document, in violation of 18 U.S.C. § 1028(a)(1); bank fraud, in violation of 18 U.S.C. § 1344; preventing communication to law enforcement, in violation of 18 U.S.C. § 1512(b); and conspiracy, in violation of 18 U.S.C. § 371.” (Gov’t Resp. Opp’n at 2.) The Federal agents then executed the search warrant and seized numerous items. Among the items seized were two computers, a Compaq Presario 4660 and an IBM Thinkpad. (Def.’s Mot. to Suppress at 6.) Scott alleges that despite his request, the “executing agents refused to show or give [him] a copy of either the search warrant or arrest warrant, although [he] was arrested and taken away from the premises by Agent Graham.” (Id.) Further, Scott alleges that “[t]he executing agents also did not leave a copy of the search warrant at the premises, although a copy of the inventory was left at 15$ Mason Street.” (Id.) An inventory of the items seized was duly filed with the Court.
On April 8, 1999, Graham submitted an additional affidavit to Magistrate Judge Bowler seeking an additional search warrant for the 15$ Mason Street address. The search warrant authorized the Federal agents to search the hard drives of the two computers seized in the initial search for evidence of additional federal offenses. These offenses were: “[m]aking false claims against the United States, in violation of 18 U.S.C. § 287; and wire fraud, in violation of 18 U.S.C. § 1343.” (Gov’t Resp. Opp’n at 2.)
III. Analysis.
In
Illinois v. Gates,
the Supreme Court held that “ ‘[A] magistrate’s determination of probable cause should be paid great deference by reviewing courts.’ ”
Illinois v. Gates,
[T]he task of the issuing magistrate is simply to make a practical, commonsense decision whether, given all the circumstances set forth in the affidavit before him, including the “veracity” and “basis of knowledge” of persons supplying hearsay information, there is a fair probability that contraband or evidence of a crime will be found in a particular place.
Gates,
Likewise, the First Circuit has adopted a totality of the circumstances approach and held that “[i]n order to establish prob
*191
able cause, the facts presented to the magistrate need only ‘warrant a man of reasonable caution’ to believe that evidence of a crime will be found.”
Feliz,
Although magistrates are given great deference by reviewing courts, finding probable cause to support a search warrant cannot be based on “bare bones” affidavits consisting solely of conclusory statements. Furthermore, “ ‘[m]ere suspicion, rumor, or strong reason to suspect [wrongdoing]’ are not sufficient.”
Vigeant,
A. Sufficient Probable Cause for the Initial Search Warrant.
Scott argues that Agent Graham’s affidavit was not sufficient on its face to support the search of 15)£ Mason Street. Specifically, Scott argues that the information in Graham’s affidavit was provided by two unknown and unreliable informants and that such corroboration as was undertaken verified only details of their own illegal activities and not the activities of Scott. Further, Scott argues that law enforcement officials failed to corroborate any details of the alleged criminal activity provided by the informants which established ties to Scott. Moreover, Scott argues that the corroborated information relevant to him is the type of innocent detail that does not give rise to probable cause for a search warrant. Finally, Scott argues that the affidavit lacks mention of the “lengthy” criminal records of Kent and Jackson.
In
United States v. Zayas-Diaz,
the First Circuit held that “[f]or evidence to avert suppression ..., normally the warrant application must demonstrate probable cause to believe that a particular person has committed a crime — ‘the commission element’ — and that enumerated evidence relevant to the probable criminality likely is located at the place to be searched — ‘the nexus element.’ ”
United States v. Zayas-Diaz,
Since probable cause is a fact-specific inquiry with no one factor possessing “tal-ismanic powers,”
Khounsavanh,
1. Reliability of Kent and Jackson in the Past.
It is well understood that providing accurate information to law enforcement offi *192 cials in the past is a strong indicia of an informant’s reliability. According to Agent Graham’s affidavit in support of the search warrant, neither Kent nor Jackson provided information to Graham in the past. (Def.’s Ex. A ¶ 14.) Kent, nonetheless, had provided information within the past year to other law enforcement personnel in connection with marijuana distribution unrelated to the current investigation. (Id.) This information was corroborated, but no arrests were made. Jackson, however, has not provided past information to any law enforcement personnel.
2. Information Provided by Kent and Jackson and Corroborated by Law Enforcement Personnel.
In Khounsavanh, the First Circuit decreed:
[T]he judgment to be made is: when does verification of part of the informant’s story make it sufficiently likely that the crucial part of the informant’s story (i.e., allegations that criminal activity has occurred and that evidence pertaining thereto will be found in the location to be searched) is true, such as would “ ‘warrant a [person] of reasonable caution and belief that [a search would be] appropriate,” based upon what the informant has said?
Khounsavanh,
Law enforcement personnel confirmed Kent’s description of the exterior of the house located at 15/6 Mason Street. (Def.’s Ex. A ¶ 18.) Pretrial Services Officer Alan Chipman (“Chipman”) confirmed that Scott resided at 15/6 Mason Street, was confined to his home under electronic monitoring, and lived alone. (Id. ¶20.) Chipman also confirmed that Kent’s description of the first floor plan of Scott’s residence was accurate. (Id. ¶ 22.) Law enforcement personnel confirmed, through Boston Edison, that the electric bill for 15/6 Mason Street is in Scott’s name, and confirmed that P.O. Box 366236, Hyde Park, Massachusetts is assigned to Scott. (Id. ¶ 21.)
Kent reported to Graham that Scott had instructed him to obtain Rhode Island identifications with Jackson because Rhode Island did not produce ID cards through a digitized process. (Id. ¶ 24.) Graham confirmed that in 1995-1996, the Massachusetts Registry of Motor Vehicles employed a digital photograph computerized system for the production of identification documents, but the Rhode Island identification system was antiquated and more vulnerable to imposters. (Def.’s Ex. A ¶ 24.)
Kent reported to Graham that he had assumed the identities of Kevin Burke, Brian S. Connelly, and Gerardo Madrigal since November 1998, and he provided Graham with a photocopy of Rhode Island identification cards in the name of Brian S. Connelly, issued on February 1, 1999, and Gerardo Madrigal, issued on December 18, 1998. (Id. ¶ 25.)
Kent described to law enforcement personnel how he “purchased” an automobile from Peter Caradonna in the name of Kevin E. Burke, applied for a loan from Bank-Boston, and obtained a $17,500 check made payable to Peter Caradonna. Documentation from the loan file at BankBoston indicated that on or about January 25, 1999, BankBoston issued a $17,500 loan proceeds check made payable to Peter Caradonna. (Id. ¶ 31.) Further, the vehicle purchased was reported to be garaged at 15 Evergreen Drive, East Providence, Rhode Island — the address that appears on the Kevin E. Burke Rhode Island ID card with Kent’s picture. (Id.)
Law enforcement officials confirmed Jackson’s description of Chace’s car. (Id. ¶ 38.) Jackson reported that Scott gave him and Kent lists of different Motor Vehicle Registry locations, names, addresses and maps reflecting the locations, and the money to obtain the identification cards. Jackson provided Graham with “what appears to me [Graham] to be” a computer-generated list of detailed instructions and directions of the locations that should be visited by Kent and Jackson. (Def.’s Ex. *193 A ¶ 39.) The instructions included the. “assumed names, the locations where and the names under which the bank accounts should be opened, the accounts that should be selected, and the amounts to be deposited in the accounts ($50), as well as the specific ATM card that should be chosen (‘Select card instead of regular ATM’).” (Id.)
Jackson reported that he obtained a Rhode Island identification card in the name of David LaPlant at the instruction of Scott. This ID card was obtained by Braintree police, and the Braintree police disclosed that the ID card was issued on December 14, 1998. (Id. ¶ 40.) A photocopy of the AAA and Shaw’s cards obtained by Jackson, allegedly at the instruction of Scott, were seized by law enforcement officials after Jackson was arrested by Braintree police at Kay Jewelers. (Id. ¶ 26.) Kay Jewelers confirmed that Jackson applied for store credit in the name of David A. LaPlante, 900 Post Road, Warwick, RI 02888. (Id. ¶ 45.) Braintree police confirmed that Jackson was arrested on December 22, 1998, for attempting to purchase a diamond ring at Kay Jewelers with a fraudulent ID. (Def.’s Ex. A ¶ 45.)
Jackson reported that he received a check for $18,000 from BankBoston to purchase “Madrigal’s” car. He further reported that a BankBoston branch divided the $18,000 check into two $9,000 checks. “Records of BankBoston confirm that the $18,000 cashier’s check was exchanged for two $9,000 cashier checks at a BankBoston branch in Canton, MA, at approximately 11:37(AM) on December 22, 1998.” (Id. ¶ 42.) The “real” David A. Laplante was contacted by BankBoston, and he gave an affidavit denying that he was the loan applicant, denying that he received any benefit from the transaction, and claimed the endorsement of the $18,000 check was a forgery. (Id. ¶ 43.)
Photocopies of Bank Boston’s loan file corroborate that on December 15, 1998, (one day after the LaPlant Rhode Island ID was issued) a telephone request from a “David A. LaPlante” for $18,000 to buy a Mercedes was received. LaPlante gave his address as 900 Post Road, Warwick, Rhode Island. (Id. ¶ 47.) An employee at BankBoston’s Emerald Square location became suspicious of LaPlante’s attempt to cash the $18,000 check and refused to do so without ID. (Id.) Subsequently, La-Plante went to a BankBoston branch located within a Stop & Shop Supermarket in Kingston, Massachusetts and received the $18,000 check. (Def.’s Ex. A ¶ 49.) Finally, BankBoston loan records confirmed that an individual who identified himself as “LaPlante” obtained two $9,000 cashier’s checks from the BankBoston branch in Canton, Massachusetts in exchange for the $18,000 check.
3. Inculpatory Statements Made by Kent and Jackson and Cross Corroboration of their Accounts. .
In
Schaefer,
the First Circuit noted that “[t]he fact that an informant’s statements are against his or her penal interest adds credibility to the informant’s report.”
United States v. Schaefer,
The First Circuit also stated that “[cjourts often have held that consistency between the reports of two independent informants helps to validate both accounts.” Id. Kent and Jackson, who grew up together and have been friends for a long time, (Def. Ex. A ¶ 16), met with Graham individually and provided cross corroborating accounts of their illegal activities.
*194 4. Prior Criminal Histories of Kent and Jackson.
In
United States v. Rumney,
the First Circuit determined that “[a] criminal record, no matter how lengthy, does not necessarily impugn one’s veracity.”
United States v. Rumney,
Since 1991, Jackson has been arraigned thirty three times for various offenses. These offenses include operating after a suspended license three times, forgery, attempting to commit a crime, threatening offenses three times, leaving the scene of property damage two times, operating after a suspended registration, assault and battery with a dangerous weapon, two assault and battery charges, two assaults with a dangerous weapon, possession of marijuana, disorderly person, and fifteen unreadable offenses. (Def.’s Ex. K.)
5. Summary.
Based on the totality of the circumstances, it was not unreasonable for Magistrate Judge Bowler to have formed a commonsense belief that evidence of a crime would be found at 15/6 Mason Street. Without considering the information provided by Jackson, 2 the information provided by Kent is sufficient to support a magistrate “of reasonable caution” in finding probable cause. Kent’s description of Scott’s physical characteristics and description of the first floor of Scott’s residence were corroborated by law enforcement officials. In addition, all of Kent’s information stemmed from his own personal observation and direct contact with Scott.
The First Circuit in
Khounsavanh
stated that “it is not particularly probative for the informant to supply a lot of details about irrelevant facts that other people could easily know about and that are not incriminating ... [ujnless such details, combined with other circumstances, would in some way generate suspicion that criminal conduct has occurred or that contraband or evidence exists on the premises....”
Khounsavanh,
*195
Probable cause is further supported by law enforcement’s knowledge of Scott’s lengthy criminal record.
4
“An affiant’s knowledge of the target’s prior criminal activity or record clearly is material to the probable cause determination.”
Taylor,
B. Sufficient Probable Cause to Seize Computer Equipment.
The computers were seized pursuant to the affidavit requesting seizure of property that constituted evidence of criminal offenses, the fruits of crime, and the instrumentalities of criminal offenses. Specifically, the crime in question is a violation of 18 U.S.C. § 513(a) which prohibits “mak[ing], utterfing] or possessing] a counterfeited security of ... an organization ..., with intent to deceive another person, organization or government....” The statutory definition of a security includes a “check.” See 18 U.S.C. § 513(c)(3). Further, the statutory definition of “organization” is any “legal entity, other than a government, established , or organized for any purpose, and includes a corporation, company ... or any other association of persons which operates in or the activities of which affect interstate or foreign commerce.” 18 U.S.C. § 513(c)(4).
Scott argues that Graham’s affidavit fails to describe any offense that falls within the scope of 18 U.S.C. § 513(a), and its inclusion in the affidavit is a pretext by the government to accomplish an otherwise unlawful seizure ,of computer equipment. Scott also argues that the supporting affidavit failed to establish a sufficient nexus to support the seizure of the computer equipment and thus the seizure was just part of a “fishing expedition” by the government to obtain information for the Internal Revenue Service. 6
Since the decision of the neutral magistrate need only be supported by a commonsense belief that there is a fair probability of contraband or evidence of a crime present at the place to be searched,
Feliz,
Kent’s forging of checks produced by Scott from his computer and payable to various retail stores alone may not be sufficient to establish a violation of 18 U.S.C. § 513(a). In
United States v. Barone,
the Ninth Circuit concluded that “an entity can only constitute an ‘organization’ for purposes of § 513 if its activities — apart from the uttering of its forged securities— affect interstate commerce.”
United States v. Barone,
The Court need not resolve the issue at this juncture, however, since the alleged forged securities activity, in conjunction with the alleged violation of 18 U.S.C. § 1344, 9 is sufficient to support a finding of probable cause to seize the computers. Unlike the “shell” company in Barone, the ScotNKent association engaged in crimes beyond the mere forging of checks. Kent reported to Graham that he (Kent), acting as Kevin E. Burke (a name which Kent allegedly used to sign forged checks produced from Scott’s computer), “ ‘purchased’ an automobile ostensibly owned by Peter Caradonna, applied for a loan from BankBoston, a bank with deposits insured by the Federal Deposit Insurance Corporation, and obtained a $17,500 check made payable to Peter Caradonna.” (Def.’s Ex. A ¶ 30.) Kent then reported to Graham that he received $1,000 for acting as the “purchaser” and the remaining proceeds were divided between Scott, Chace, and the “seller.” The $17,500 loan check made payable to Peter Caradonna was confirmed by documentation from the loan file of BankBoston. The vehicle was identified as a 1996 Nissan Pathfinder and “was reported to be garaged at 15 Evergreen Drive, East Providence, Rhode Island, which is the address that appears on the Kevin E. Burke Rhode Island ID card that depicts a photograph of [Kent].” (Id. at ¶ 31.)
The alleged checks forged by Kent in the name of Kevin Burke and produced on Scott’s computer, in conjunction with Kent’s posing as Kevin Burke and committing bank fraud against BankBoston, creates a sufficient nexus to warrant a person
*197
of reasonable caution to make a commonsense determination that evidence of crimes involving a “Kevin Burke” might be found on Scott’s computer. Similar to the First Circuit’s determination in
Feliz
that it is reasonable to suppose a drug trafficker “possessed documents showing the names and telephone numbers of customers and suppliers” at his residence, Feliz,
Graham’s April 8, 1999 affidavit likewise contains sufficient information to support probable cause to search the hard drives of the Compaq Presario CPU 4660 computer and IBM Thinkpad computer seized during the execution of the March 16, 1999 search of Scott’s residence. The search warrant sought evidence of two offenses. These offenses are a violation of 18 U.S.C. § 287 and a violation of 18 U.S.C. § 1343. 10
According to Graham’s April 8,1999 affidavit, Special Agent Rittenour (“Ritten-our”) was able to conduct a “text string” mirror-image search of the computers’ hard drives. (Defi’s Ex. D ¶ 7.) After querying the search for “hits” associated with names involved in Graham’s original affidavit, Rittenour obtained hits for the names Caradonna and Burke. (Id.)
The name Caradonna was used in the fraudulent $17,500 loan obtained from BankBoston, and Rittenour detected a hit for Caradonna on the hard drive of the Compaq Presario. (Id. ¶ 9.) The hit corresponded to an e-mail message sent on January 28,1999 from the computer seized in the initial search and “made reference to an application for purchase of $17,500 of the Reserve Primary fund.” (Id.) The account at Reserve Funds in the name of Peter Caradonna was confirmed by Justus Sackett at Reserve Funds in New York, and Sackett confirmed that an e-mail message was sent to Reserve Funds on January 28, 1999. (Id. ¶ 10-11.)
Rittenour also detected numerous hits for the name Kevin Burke. The hits contained different social security numbers and address information for various “real” Kevin Burkes. (Def.’s Ex. D ¶ 13.) Although none of this information identically matched the Kevin Burke involved in the bank fraud, Graham extrapolated from the BankBoston loan application and the information on the Compaq Presario that the “Kevin Burke” involved in the bank scheme was created by mixing and matching information concerning various “real” Kevin Burkes. (Id. ¶¶ 14-16.)
In addition, Rittenour found the name Kevin Burke with references to tax information. 11 On April 2, 1999, Graham and Special Agent Gianoukos visited the first “real” Kevin Burke whose social security and address information was found on the Compaq Presario. The “real” Kevin Burke knew nothing about the $17,500 loan, did not know Scott or Peter Caradon-na, had not yet filed his tax return, and did not request that a refund of $3,149 be electronically deposited to a Chase Man *198 hattan Bank account. (Id. ¶ 18.) Graham and Gianoukos then interviewed the father of Kevin A. Burke (real Kevin Burke # 2) and were told that he has “no knowledge of his son ever owning a Nissan Pathfinder _” (Id. ¶ 19.) Finally, Graham and Gianoukos attempted to visit a third “real” Kevin Burke and learned that he did not reside at the given address. They did learn, however, that he had not filed a tax return and did not know Scott. (Id. ¶ 20.) No one could be reached at the address of the fourth “real” Kevin Burke obtained from a search of the Compaq Presario.
The information obtained in the mirror-image text string search coupled with Graham’s subsequent interviews with “real” Kevin Burkes, as well as with Gianoukos’ knowledge of Scott’s modus operandi and Scott’s prior criminal record, provides sufficient evidence to establish probable cause to search the hard drives of the two computers.
C. The Particularity of the Search Warrants.
Scott argues that the search warrants issued on March 12 and April 8, 1999 were both prohibited general warrants. Specifically, Scott argues that the warrants gave only generic characterizations of the documents sought, authorized the seizure of items far exceeding the scope of the criminal activity described in the affidavit and did not limit the scope of the seizure to a time frame consistent with the stated criminal scheme.
The Fourth Amendment’s requirement that a warrant describe with particularity the place to be searched and the things to be seized “arises out of the hostility to the Crown’s practice of issuing ‘general warrants’ taken to authorize the wholesale rummaging through a person’s property in search of contraband or evidence.”
United States v. Upham,
1. Search Warrants Gave Generic Characterizations of the Documents Sought and Authorized the Seizure of Items Exceeding the Criminal Activity Described in the Affidavits.
Scott argues that even though the affidavits set forth specific names and entities that were allegedly used in conjunction with the suspected criminal activity, the search warrants made no attempt to confine the objects of the search to those specific names and entities. Further, Scott argues that the search warrants authorized the seizure of items beyond those for which the affidavits established probable cause.
The Court must determine whether the list of items to be seized attached to the search warrant is stated with the appropriate particularity.
12
“The cases on ‘particularity’ are actually concerned with at least two rather different problems: one is whether the warrant supplies enough information to guide and control the agent’s judgment in selecting what to take ... and the other is whether the category as specified is too broad in the sense that it in-
*199
eludes items that should not be seized.”
Upham,
Scott argues that the March 12 search warrant authorized the seizure of any and all “savings account passbooks, checkbooks, check ledgers, deposit slips, withdrawal slips, bank statements, money orders, drafts, cancelled checks, lists of names, lists of telephone numbers, correspondence to/from banks, credit card issues; Federal Express receipts, etc.,” and had no limitation as to name, entity, or time period, (Def.’s Mot. to Suppress at 23), concluding that the search warrant is not sufficiently particular so that “ ‘nothing is left to the discretion of the officer executing the warrant.’ ”
Fuccillo,
In addition, Scott argues that the warrant’s authorization of the seizure of inter alia, “credit cards; application for credit cards; cash advances; cameras; undeveloped film and the undeveloped images thereon; savings account passbooks, money orders; drafts; canceled checks; list of banks; correspondence to/from credit card issuers, Federal Express receipts; and evidence of off-site storage facilities, including rental agreements, payment slips and receipts,” was beyond the scope established by probable cause. 13
The search warrant authorized the seizure of property that constituted evidence of criminal offenses, the fruits of crime, and the instrumentalities of criminal offenses, to wit, making a counterfeit security, unlawfully producing an identification document, bank fraud, using intimidation to prevent communication of a federal offense, and conspiring to commit the foregoing offenses. Only the Federal Express receipts fall outside the scope of the probable cause established by the warrant. They are, accordingly, suppressed.
2. Limiting the Scope of the Seizure to the Stated Time Frame of the Scheme.
Scott argues that even though the affidavits gave a narrow time frame of suspected criminal activity, the search warrants did not place any corresponding restriction on the permissible scope of the seizure. In
Lafayette Academy, Inc.,
the search warrant allowed for “seizure of most every sort of book or paper at the described premises.... ”
Lafayette Academy, Inc.,
Although a time limitation helps to make a search warrant sufficiently particular, it is not an absolute necessity. The First Circuit addressed this matter specifically in
United States v. Bucuvalas,
and adjudged that “[tjemporal delineations
*200
are but one method of tailoring a warrant description to suit the scope of the probable cause showing.”
United States v. Bucuvalas,
D. Government So Exceeded Scope in Execution of Search Warrant That Suppression Is Mandated.
Scott argues that the executing officers exhibited a blatant and flagrant disregard for the terms of the search warrant and that the items unlawfully seized “were more than 50% of the total number of items that were seized.” (Def.’s Mot. to Suppress at 29.) Scott argues that
United States v. Fuccillo
is directly on point and controlling here. In
Fuccillo,
the court determined that the FBI could have put specific information into the search warrant which would have allowed the executing agents to differentiate the cartons of contraband women’s clothing from legitimate ones. Since the agents failed to do this, the court ruled the search warrant to be unconstitutional as a general warrant.
See Fuccillo,
The First Circuit recently addressed the issue of seizing items outside the scope of the' warrant in
United States v. Hamie.
In
Hamie,
the court stated that “[a]l-though courts have periodically applied the extraordinary and drastic remedy of suppressing all evidence seized, this has occurred only in extreme situations, such as when the lawful basis of a warrant was a pretext for the otherwise unlawful aspects of a search or when the officers flagrantly disregarded the terms of the warrant.”
United States v. Hamie,
165 F.3d
80, 83-
84 (1st Cir.1999). The First Circuit further stated that “the improper seizure of ‘many items outside [a] warrant’s scope ... does not alone render the whole search invalid and require suppression and return of all documents seized.’ ”
Id.
at 84 (quoting
United States v. Young,
Even though items were seized outside the scope of the search warrant and not under any exception,
15
the “normal remedy is to suppress the use of any items improperly taken.”
Hamie,
E. Plain View.
In addition, Scott argues that the plain view exception for items seized outside the scope of the warrant is in-applicable here. Scott argues that each item seized must be individually justified under the plain view analysis and that with the exception of two books,
Inside Money Laundering
and
How to Investigate by Computer,
no attempt was made to do this. The First Circuit recently addressed the plain view exception in
Hamie.
The Court stated that “the ‘plain view’ doctrine permits law enforcement agents to seize evidence in plain view during a lawful search even though the items seized are not included within the warrant’s scope.”
Hamie,
The plain view doctrine is established by a two-part test. “First, ‘an essential predicate to [the seizure of evidence not within a warrant's purview is] that the officer did not violate the Fourth Amendment in arriving at the place from which the evidence could be plainly viewed.’ ”
Id.
(quoting
Horton v. California,
Applying a practical, nontechnical probability analysis to the items seized by the government under the plain view doctrine, it remains for the Court to determine which items, if any, fall outside the warrant and also outside the purview of the plain view exception. Despite the thorough record proposed by the parties, the government’s bold assertion of “plain view” will not carry the day with respect to items (not discussed above) which were seized outside the warrant. The parties shall prepare a joint list of such items and shall brief, as to each particular item, the applicability vel non of the plain view doctrine. This done, the items themselves shall be submitted to the Court for review prior to decision. Items seized pursuant to the plain view exception do not have to be contraband or actual evidence of criminal activity. Rather, there needs only to be enough facts for the reasonable person to believe that the items may be contraband or evidence of criminal activity.
F. Search and Seizure of Scott’s Wallet Incident to Arrest.
Scott argues that the seizure of his wallet incident to his arrest was invalid because he was arrested in front of his residence, and his wallet was located in a night stand drawer in a second floor bedroom. The government returned the wallet to Scott on June 15, 1999, and has stated that *202 it does not intend to offer the contents of the wallet in evidence. The matter is thus moot.
G. Compliance with Federal Rule of Criminal Procedure 41(d).
Rule 41(d) of the Federal Rules of Criminal Procedure states, “[t]he officer taking property under the warrant shall give to the person from whom or from whose premises the property was taken a copy of the warrant and a receipt for the property taken or shall leave the copy and receipt at the place from which the property was taken.” Fed.R.Crim.P. 41(d). The First Circuit has stated that “ ‘Rule 41(d) does require federal officers to serve upon the person searched a copy of the warrant and a receipt describing the materials obtained, but it does not invariably require that this be done before the search takes place.’”
United States v. Bonner,
Scott argues that upon his arrest • and prior to being taken from his residence, he asked for a copy of -the arrest and search warrants and his request was denied. 18 Further, Scott argues that he was given a copy of the affidavit in support of the warrants a few hours later, but he was never given a copy of the search warrant nor was a copy of the search warrant left at his premises. 19 Moreover, Scott argues that his receiving a copy of the search warrant on April 8, 1999 pursuant to the government’s automatic discovery was an attempt to circumvent suppression motions then pending before Judge O’Toole in another case, 20 with the result that Scott was unable to determine whether to file a further suppression motion in that case. Finally, Scott argues that the 41(d) violation was deliberate because the agents executing the warrant had over twenty-five years of experience in the aggregate and would have known that they were required to leave a copy of the search warrant at the residence searched.
*203 Since this motion has been submitted on the papers, the Court must take the facts in the light most favorable to Scott. Even so, Scott is unable to show that he was legally prejudiced by receiving the search warrant on April 8, 1999. Scott argues that the continuation of the February 28, 24, and 26 suppression hearings before Judge O’Toole was set for March 27th. The March 27th hearing, however, was further postponed to April 26, 1999, a continuance that occurred well after March 16, 1999, the date of the search. Scott thus had from April 8th until April 26th to file a “new” suppression motion before Judge O’Toole. He did not. Had the suppression hearing been held on March 27th as originally scheduled, Scott might have been able to show legal prejudice in the matters pending before Judge O’Toole due to what this Court assumes was a Rule 41(d) violation. Regardless, the matter before Judge O’Toole is immaterial to these proceedings. Scott was not legally prejudiced or precluded from filing a suppression motion in that case.
In order to show prejudice, Scott must show that, absent the Rule 41(d) violation, the search would not have occurred or it would not have been as abrasive. Scott was arrested immediately and removed from the premises before the search was undertaken. As a result, it is reasonable to infer that the nature of the search would not have changed even if Scott had been given a copy of the warrant prior to the search. It is also reasonable to infer that the same search would have occurred whether or not a copy of the warrant was left at the premises. Had Scott been present during the search after being refused a copy of the search warrant, however, he might have been able to show prejudice as matter of law, 21 a point this Court need not now address.
H. Leon “Good Faith” Exception.
Since this Court upholds the warrant, further analysis is unnecessary. Still, for the sake of completeness, the Court considers whether the officers acted in “good faith.”
In
United States v. Leon,
(1) “When the magistrate ... was misled by information in an affidavit that the affiant knew was false or would have known was false except for his reckless disregard for the truth”; (2) “where the issuing magistrate wholly abandoned his [detached and neutral] judicial role”; (8) where the affidavit is “so lacking in indi-cia of probable cause as to render official belief in its existence entirely unreasonable”; and (4) where a warrant is “so facially deficient — i.e. in failing to particularize the place to be searched or the things to be seized — ’that the executing officers cannot reasonably presume it to be valid.”
United States v. Owens,
Scott argues that (1) the warrant affidavit did not supply a substantial basis for probable cause, (2) the officers’ objective good faith was totally undermined by the executing agents’ blatant and flagrant disregard for the terms of the search warrant, and (3) the search warrant was so *204 “facially deficient” that no reasonable well-trained federal officer could have relied upon it.
The Court has already rejected Scott’s arguments. The Court must still make a determination, however, whether the search warrant was so facially deficient in particularizing the things to be seized that the executing officers could not reasonably have presumed the warrant to be valid. It was not. While the warrant could have further subclassified certain items,
see United States v. Diaz,
IV. Conclusion.
For the reasons set forth above, the motion to suppress is ALLOWED as to the Federal Express receipts, but DENIED in all other respects save as to the items not identified in the warrant (and not otherwise identified in this opinion), the seizure of which the government must now justify under the “plain view” doctrine. As to these items, further proceedings are ordered pursuant to this opinion.
Notes
. According to Graham’s affidavit, (Def.’s Ex. A ¶ 15), Kent was still involved in the illegal activities as of the writing of the affidavit, but Jackson’s involvement ceased after he was arrested by Braintree police on December 22, 1998.
. It is questionable whether Jackson is a satisfactorily reliable informant. Unlike Kent, Jackson has not provided law enforcement officials with information in the past. In addition, Jackson’s criminal record includes forgery which seriously undermines his credibility. Although the Court in
Rumney
held that a criminal record does not per se impugn one’s veracity, the Court suggested that crimes similar to perjury or false statements could discredit trustworthiness.
See Rumney,
. In
United States v. Kessinger,
the Court found the informant reliable based upon the informant’s personal observation of Kessinger possessing cocaine in his apartment' and the informant’s description of the defendant, his cars, and his apartment.
Id.
at 499. The Court determined that this information was of
*195
a sufficiently detailed nature "so as tó assure that it was based on more than mere rumor or speculation.”
Id.
Also noteworthy is the fact that probable cause was found
in-Kessinger
applying the
Aguilar-Spinelli
two-prong test, a notably stricter standard than the totality of the circumstances standard adopted in
Illinois v. Gates,
.According to Graham's affidavit, Scott has been convicted of possessing a firearm without a permit, twice convicted of counterfeiting motor vehicle documents, and threatening and intimidating a material witness. (Def.'s Ex. A ¶ 4.) Further, Scott has two pending criminal charges against him. These charges are for bank fraud and conspiracy to make false claims against the United States Treasury. (See id. ¶¶ 6-8.)
. According to his affidavit, Graham has investigated offenses involving inter alia credit card fraud, bank fraud, and fraudulent negotiation of U.S. Treasury checks for the past eight years. (Def.'s Ex. Ail.)
. Scott argues that the seizure of the computer equipment was designed to aid IRS Agents James Donahue ("Donahue”) and Michael Gianoukos ("Gianoukos”) in their two criminal cases against Scott pending before Judge O'Toole. As support for his position, Scott notes the "virtually identical” nature of computer seizure sections of Graham's affidavit and Gianoukos' affidavit in support of a November 1997 Search of Scott's residence. (Def.'s Mot. to Suppress at 13.)
.Scott argues that this statement necessarily implies that the software was not installed on the computer, but instead was on a separate disk or CD-ROM. (Def.’s Mot. to Suppress at 12.) Scott also argues that one cannot "see” software that has been installed on the hard drive of a computer, and the Agents therefore had no basis for searching the computer when the software existed as a separate disk or CD-ROM. (Id.) Moreover, Scott argues that the seizure of the computers was improper because the government’s analysis of the seized computers revealed no such software and the only software seized were Versacheck software disks in their original unopened packages. (Id. at n. 2.)
This argument is unpersuasive for two reasons. First, software can often be “seen” on the hard drive of a computer through its corresponding icon. Second, allegedly seeing the software is only part of the evidence to support probable cause for seizing the computers and even without this piece, there is still sufficient information contained in Graham’s affidavit to establish probable cause.
. Scott argues that photographs taken by the Secret Service did not reveal reams of blank check stock, but instead only reams of copy paper. (Def.’s Reply Mem. at 3-4 n. 1.) Further, the government was only able to seize a small packet of check paper.
(Id.)
This is irrelevant, however, to whether the magistrate had sufficient probable cause to issue a search warrant. The standard for probable cause is not the actual presence of evidence, but the commonsense belief in the fair probability that evidence or contraband will be found.
See Gates,
. Section 1344 defines bank fraud as:
"knowingly executing], or attempting] to execute, a scheme or artifice ...
(2) to obtain any of the moneys [or] funds ... owned by, or under the custody or control of, a financial institution, by means of false or fraudulent pretenses, representations or promises.”
. Section 287 states, “[w]hoever makes or presents to any person or officer in the civil ... service of the United States, or to any department or agency thereof, any claim upon or against the United States, or any department or agency thereof, knowing such claim to be false, fictitious or fraudulent, shall be imprisoned
Section 1343 states, "[wjhoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money by means of false or fraudulent pretenses ... transmits ... by means of wire, radio or television communication in interstate ... commerce, any writings ... for the purpose of executing such scheme or artifice, shall be fined ... or imprisoned....”
. Graham provided Special Agent Gianou-kos with the different names, dates of birth, and social security numbers of the Kevin Burkes found on the Compaq Presario. Gia-noukos later informed Graham that these Kevin Burkes had filed tax returns and had received refunds electronically mailed to different accounts.
. Scott argues that the search warrants did not incorporate or otherwise make any reference to the affidavits nor was the affidavit attached to the search warrant. (Gov’t Exs. 2, 4.) In
United States v. Klein,
the First Circuit recognized that an affidavit may provide die necessary particularity if "the affidavit accompanies the warrant, and the warrant uses suitable words of reference which incorporate the affidavit.”
United States v. Klein,
. Scott also argues that there was insufficient probable cause to support the seizure of computer equipment, but this matter has been resolved above.
. In Lafayette Academy Inc., the search warrant was executed by thirty government agents who employed four or five trucks to remove the materials seized.
. The government concedes in its opposition to Scott’s motion to suppress that "the agents seized some items outside the scope of the warrant and under no exception to the warrant requirement_” (Gov't Opp. at 13.)
. In its opposition to Scott’s motion to suppress, the government argues that the majority of the evidence disputed by Scott is moot because it does not intend to introduce it at trial. In
Hamie,
the Court stated ”[t]o the degree that the unauthorized items were improperly seized, there was no need to suppress them because the government never sought to introduce them at Hamie's trial.”
Hamie,
. Bonner, however, deals with officers who searched a residence without having a copy of the warrant with them. In this case, Scott argues that the agents had the warrant and flatly refused to give a copy to him.
. This is disputed by the government in an affidavit by Graham. (Gov’t App. Ex. 7.)
. Scott's contention that he asked for a copy of the search warrant, and his contention that a copy of the search warrant was not left at his premises is also in dispute. According to the affidavit of special agent William Cameron, Scott did not ask for a copy of the warrant. (Gov’t App. Ex. 6 ¶ 8.) Further, the government argues that a copy of the search warrant and inventory was left at Scott's residence. (See Id. ¶ 12.)
In support of his claim, Scott makes four arguments: (1) Since Agent Cameron inaccurately recalled in September the clothes worn by Scott on March 16, he cannot be expected to have an accurate memory about whether or not Scott asked for a copy of the warrant. (2) Scott has been the subject of three previous searches by the IRS and has explicitly asked for such paperwork on each occasion in the past. (3) Had a copy been left at Scott’s residence, counsel would not have sought a copy from the First Assistant U.S. Attorney, Mark Pearlstein. (4) The sworn affidavit of Brian McKinnon that no copy of the search warrant was left at Scott’s residence was corroborated by the Plymouth Jail taped phone call that Scott placed to McKinnon that evening.
. Scott argues that the seizure of certain items in his wallet during the pendency of the suppression hearing before Judge O'Toole gives rise to the suspicion that the government was thereby attempting to circumvent the then pending suppression motions by establishing a new basis for introducing such evidence.
. This appears to be the case in the Ninth Circuit case of
United States v. Gantt,
