UNITED STATES OF AMERICA v. JAMES RYAN TAYLOR; UNITED STATES OF AMERICA v. STEVEN VINCENT SMITH
No. 17-14915; No. 18-11852
United States Court of Appeals, Eleventh Circuit
August 28, 2019
D.C. Docket No. 2:16-cr-00203-KOB-JEO-1; D.C. Docket No. 4:16-cr-00312-VEH-JHE-1; [PUBLISH]
Appeals from the United States District Court for the Northern District of Alabama
(August 28, 2019)
Before TJOFLAT and NEWSOM, Circuit Judges, and ANTOON,* District Judge.
James Taylor and Steven Smith are the latest in a long line of child-pornography consumers to argue that the evidence of their crimes should be suppressed because the warrant that led to its discovery—issued by a magistrate judge in the Eastern District of Virginia but purporting to authorize a nationwide, remote-access computer search—violated the Fourth Amendment. By our count, we become today the eleventh (!) court of appeals to assess the constitutionality of the so-called “NIT warrant.” Although the ten others haven‘t all employed the same analysis, they‘ve all reached the same conclusion—namely, that evidence discovered under the NIT warrant need not be suppressed. We find no good*
reason to diverge from that consensus here, but the case nonetheless calls for careful consideration, as it implicates several important issues.
As an initial matter, did the NIT warrant violate
That leads us to the question of remedy, which we take in two parts: First, is exclusion required—without regard to the reasonableness of the officers’ reliance—where, as here, the warrant was void from the outset, as Taylor and Smith urge? Or, as the government contends, should a void
Second, even if the good-faith exception can apply when an officer relies on a void warrant, should the exception apply in the particular circumstances of this case? We hold that the officers’ warrant application here adequately disclosed the nature of the technology at issue and the scope of the intended search, that the officers reasonably relied on the magistrate judge‘s determination that the search was permissible, and, accordingly, that the good-faith exception applies in this case.
I
A
We begin with a bit of context. In the normal world of web browsing, an internet service provider—Comcast or AT&T, for example—assigns an IP address to every computer that it provides with internet access. An IP address is a unique numerical identifier, tantamount to a computer‘s name. (OK, in the laptop era it‘s slightly more complicated than that, because the “name” changes as the computer moves around and connects to different service providers’ networks—but you get the picture.) Websites can log IP addresses to keep track of the computers that visit, in essence creating a digital guest book. Internet browsing, therefore, isn‘t quite as private as most people think—it‘s actually pretty easy, for instance, for law enforcement to find out who visited what sites, when, and for how long simply by subpoenaing IP-address logs from service providers.
Not so when it comes to the “dark web,” the part of the internet “only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.” Blog.OxfordDictionaries.com.1 “The Onion Router“—usually abbreviated “Tor“—is one such software program. Tor, which was the brainchild of the U.S. Navy but has since been released to the public, works by routing a user‘s webpage requests through a series of computer servers operated by volunteers around the globe, rendering the user‘s IP address essentially unidentifiable and untraceable. In the words of the folks who currently administer the “Tor Project,” a Massachusetts-based § 501(c)(3) organization responsible for maintaining Tor, you might think of what Tor does as “using a twisty, hard-to-follow route in order to throw off someone who is tailing you—and then periodically erasing your footprints.”2
As you can imagine, Tor has plenty of legitimate uses—think military and law-enforcement officers carrying out investigations, journalists seeking to maintain anonymity, and ordinary citizens researching embarrassing topics. As you can also imagine, Tor has spawned—and effectively enables—a cache of unsavory sites for black-market trading, child-pornography file-sharing,
The hidden-service page at issue here, “Playpen,” was a child-pornography-distribution site accessible only through Tor. At the time the FBI began monitoring Playpen, the site contained more than 95,000 posts, had 160,000 members, and hosted up to 1,500 visitors per day. The FBI monitored the site for several months until, based on a foreign-government tip, it found and arrested the administrator. Rather than shuttering Playpen immediately, the FBI covertly took control of the site and began operating it out of a government server in Newington, Virginia, hoping to snare more users.
As a means of ferreting out Playpen visitors whose identities were masked by Tor, the FBI sought to deploy government-created malware—specifically, a computer code called the Network Investigative Technique (“NIT“)—that would transmit user information back to the FBI. Here‘s how the NIT worked: When a Playpen user downloaded images from a Tor-based site, the NIT would essentially “hitchhike” along, invade the host computer, and force it to send to the FBI (among other information) the computer‘s IP address, the computer‘s host name, and the username associated with the computer. Based on that information, the FBI could identify the user‘s internet service provider and the computer affiliated with the account that accessed Playpen, thereby unmasking the user and providing probable cause for the FBI to seek a warrant to seize computers and hard drives.
B
To effectuate this plan, FBI Agent Douglas Macfarlane submitted a search-warrant application to a magistrate judge in the Eastern District of Virginia, requesting authorization to deploy the NIT. The application wasn‘t a model of clarity or precision, particularly regarding the issue that most concerns us here—namely, the geographic scope of the requested search authority. In the case caption, the application described the “property to be searched“—seemingly without territorial restriction—as “COMPUTERS THAT ACCESS upf45jv3bziuctml.onion,” which we now know to be associated with Playpen. Just below, however, in the body, the application asserted a reasonable belief that evidence of child-pornography-related crimes was contained on property “located in the Eastern District of Virginia.” As part of the same statement—regarding the “property to be searched“—the application referred to an “Attachment A.” Attachment A in turn stated that the NIT was “to be deployed on the computer server . . . operating the [Playpen] website” and specified that the server was “located at a government facility in the Eastern District of Virginia.” Attachment A then went on to state, though, that the goal of deploying the NIT was to obtain information from “[t]he activating computers . . . of any user or administrator who logs into [Playpen] by entering a username and password.”
As is often the case, the NIT application also referenced an attached affidavit. Agent Macfarlane‘s affidavit summarized the applicable law, explained numerous technical terms of art, and described Tor
A magistrate judge in the Eastern District of Virginia signed the warrant and the FBI deployed the NIT.
C
Not long thereafter, NIT-transmitted data revealed to the FBI that a certain Playpen user was linked to a computer with the host name “RyansComputer.” After the user accessed several images of child pornography, the FBI sent an administrative subpoena to the user‘s internet service provider and discovered that the IP address associated with the computer was assigned to James Taylor in Birmingham, Alabama. A magistrate judge in the Northern District of Alabama then authorized a search warrant for Taylor‘s residence, where the FBI seized Taylor‘s laptop, hard drive, and USB drive. After analyzing the hardware twice, the FBI found what it was looking for.
Steven Smith‘s Playpen activities were discovered in a nearly identical way. As in Taylor‘s case, the NIT revealed that someone had used Smith‘s computer and IP address to log into Playpen. Based on the NIT data, the FBI subpoenaed records from an internet service provider and used that information to secure a warrant from a magistrate judge in the Northern District of Alabama, allowing officers to search Smith‘s residence in Albertville, Alabama. The search revealed child-pornography images on a thumb drive. After arresting Smith, the officers obtained a search warrant for his office and seized his work computer, which also contained child pornography.
Taylor and Smith were charged with receiving child pornography under
II
All here agree that the NIT‘s extraction and transmission of Taylor‘s and Smith‘s information was a “search” within the meaning of the Fourth Amendment.
A
1
We find two mismatches—one formal (but telling) and the other substantive. Initially, as a matter of form, although the
government‘s revisionism on appeal—invoking
Moreover, and in any event, we reject the government‘s tracking-device argument on the merits. For
We disagree. The NIT didn‘t reveal “locational information” at all—it didn‘t even send a locational snapshot, let alone the type of ongoing, GPS-coordinate transmissions that would “permit[] the tracking of the movement of a person or object” within the meaning of
To be clear, it‘s not just that the NIT isn‘t exactly a tracking device—it‘s that it‘s exactly not a tracking device. A GPS tracker stuck to the bottom of a car can‘t tell you the car‘s make and model, its owner, or its place of registration—but it can tell you whether the car is parked at Starbucks or cruising down I-20. By contrast, the NIT malware can and did transmit the equivalent of a computer‘s name, to whom it was registered, and other identifying information—but it didn‘t (and couldn‘t) reveal whether the computer was at the owner‘s home or office, at Starbucks, or in the car on the move. In short, while a tracking device transmits
location but not identifying information, the NIT sent identifying information but not location.10
To sum up, we hold that the NIT is not a “tracking device” within the meaning of
2
So, what effect? While constitutional violations may merit suppression—more on that later—mere “technical noncompliance” with a procedural rule results in the exclusion of evidence only when (1) “there was ‘prejudice’ in the sense that the search might not have occurred or would not have been so abrasive if the rule had been followed,” or (2) “there is evidence of intentional and deliberate disregard of a provision in the Rule.” United States v. Williams, 871 F.3d 1197, 1203 (11th Cir. 2017) (citation omitted).
Which do we have here—a constitutional violation or just a technical one? The government says that the violation in this case was merely technical because
Fair enough. As we‘ve recently been at pains to emphasize—following the Supreme Court‘s lead—not every mandatory proclamation or prohibition creates a jurisdictional bar, and we are loath to “jurisdictionalize” issues unnecessarily. See, e.g., Orion Marine Constr., Inc. v. Carroll, 918 F.3d 1323, 1328–29 (11th Cir. 2019); Sec‘y, U.S. Dep‘t of Labor v. Preston, 873 F.3d 877, 881–82 (11th Cir. 2017). Here, though, jurisdiction is squarely in play: While
We aren‘t breaking any new ground here. As now-Justice Gorsuch explained during his tenure on the Tenth Circuit,
To be fair, Krueger was an easier case—there, a magistrate judge in one district purported to authorize a search in an adjacent district, in which she clearly had no jurisdiction. The magistrate judge here, by contrast, issued a warrant purporting to allow a search of computers “wherever located“—which, of necessity, included her own district. But the fact that the warrant in its overbreadth happened to sweep in
Because the NIT warrant was void at issuance, the ensuing search was effectively warrantless and therefore—because no party contends that an exception to the presumptive warrant requirement applies here—violative of the Fourth Amendment. Accord United States v. Werdene, 883 F.3d 204, 214 (3d Cir.), cert. denied, 139 S. Ct. 260 (2018); United States v. Horton, 863 F.3d 1041, 1050 (8th Cir.
Cir. 2017), cert. denied, 138 S. Ct. 1440 (2018); United States v. Henderson, 906 F.3d 1109, 1116 (9th Cir. 2018), cert. denied, 139 S. Ct. 2033 (2019).12
B
So the search carried out under the NIT warrant violated not just
1
The “exclusionary rule“—which operates to bar the admission of evidence obtained in violation of the Fourth Amendment—appears nowhere in the Constitution‘s
constitutional right,” but rather a “judicially created” remedy, whose purpose is to “deter future Fourth Amendment violations” and “compel respect for the constitutional guaranty.” Davis v. United States, 564 U.S. 229, 236-37, 238 (2011) (citation omitted). This remedy, however, doesn‘t follow automatically; society must swallow the “bitter pill” of suppression when necessary, id. at 238, but only when the “benefit” of exclusion outweighs its “substantial social costs,” Illinois v. Krull, 480 U.S. 340, 352-53 (1987). The dual pillars of the exclusion decision, the Supreme Court recently emphasized, are deterrence and culpability: “Police practices trigger the harsh sanction of exclusion only when they are deliberate enough to yield ‘meaningfu[l]’ deterrence, and culpable enough to be ‘worth the price paid by the justice system.‘” Davis, 564 U.S. at 240 (alteration in original) (quoting Herring v. United States, 555 U.S. 135, 144 (2009)); see also id. (suppression not warranted because officer did not act “deliberately, recklessly, or with gross negligence“).
The good-faith exception is a “judicially created exception to this judicially created rule.” Id. at 248.13 In United States v. Leon, the Supreme Court explained that exclusion is not warranted when police act “in objectively reasonable reliance” on a subsequently invalidated search warrant—in other words, when they act in “good faith.” 468 U.S. 897, 922 (1984). “[O]ur good-faith inquiry is confined to the objectively ascertainable question whether a reasonably well trained officer would have known that the search was illegal’ in light of ‘all of the circumstances.‘” Herring, 555 U.S. at 145 (quoting Leon, 468 U.S. at 922 n.23).
To date, the Supreme Court has applied the good-faith exception when, among other things, officers reasonably relied on a warrant that was later deemed invalid for lack of probable cause, see Leon, 468 U.S. at 922, on a warrant that erroneously appeared outstanding due to an error in a court or police database, see Arizona v. Evans, 514 U.S. 1, 4 (1995); Herring, 555 U.S. at 137, on a statute that was later deemed unconstitutional, see Krull, 480 U.S. at 352-53, and on a judicial decision that was later overruled, Davis, 564 U.S. at 232. The Supreme Court hasn‘t, however, directly addressed the particular question before us today—whether the good-faith exception can be applied to a search conducted in reliance on a warrant that was void from the outset.
Taylor and Smith insist that the void-voidable distinction is critical. Reliance on a voidable warrant—issued in error, perhaps, but by a judge with jurisdiction to act—is different, they contend, from reliance
There is a certain logic to this argument: In fact, there was never a valid warrant, so the search was illegal all along. What matters for exclusionary-rule and good-faith purposes, though, isn‘t the validity of the warrant “in fact,” but rather the validity of the warrant as it would have reasonably appeared to an officer tasked with executing it. The appropriate question, therefore, is whether, from the perspective of a reasonable officer, there is any difference—for deterrence or culpability purposes—between the warrant issued in this case and the warrants issued in Leon, Evans, and Herring?
We don‘t think so. The exclusionary rule is concerned with deterring officer misconduct and punishing officer culpability—not with setting judges straight. See Herring, 555 U.S. at 142 (observing that the “exclusionary rule was crafted to curb police rather than judicial misconduct“). Viewed from an officer‘s perspective, relying on a facially valid warrant that, as it turns out, was void from the beginning is no different from relying on a facially valid warrant that, for instance, was later deemed improper based on a dubious determination of probable cause, see Leon, 468 U.S. at 925-26, or appeared outstanding thanks only to a database error, see Herring, 555 U.S. at 136-37. So long as an officer could reasonably have thought that the warrant was valid, the specific nature of the warrant‘s invalidity is immaterial.
In so holding, we join every court of appeals to consider the question, all of which have agreed that the good-faith exception applies—and the exclusionary rule doesn‘t—in a situation like this. See United States v. Eldred, No. 17-3367-cv, 2019 WL 3540415, at *8 (2d Cir. Aug. 5, 2019); United States v. Ganzer, 922 F.3d 579, 587-90 (5th Cir.), petition for cert. filed, No. 19-5339 (2019); United States v. Moorehead, 912 F.3d 963, 971 (6th Cir.), petition for cert. filed, No. 19-5444 (2019); Werdene, 883 F.3d at 216-17; United States v. McLamb, 880 F.3d 685, 691 (4th Cir.), cert. denied, 139 S. Ct. 156 (2018); United States v. Kienast, 907 F.3d 522, 527-28 (7th Cir. 2018), cert. denied, 139 S. Ct. 1639 (2019); Henderson, 906 F.3d at 1118; United States v. Levin, 874 F.3d 316, 323-24 (1st Cir. 2017); Horton, 863 F.3d at 1050; United States v. Workman, 863 F.3d 1313, 1319 (10th Cir. 2017), cert. denied, 138 S. Ct. 1546 (2018). As the Sixth Circuit summarized, “[t]he good-faith exception is not concerned with whether a valid warrant exists, but instead asks whether a reasonably well-trained officer would have known that a search was illegal.” Moorehead, 912 F.3d at 968. The Third Circuit similarly explained the “fundamental flaw” in the argument like the one that Taylor and Smith make here: “[I]t does not appreciate the distinction between the validity of the warrant and the deterrence rationale of the exclusionary rule and the good-faith exception.” Werdene, 883 F.3d at 216.
In light of the exclusionary rule‘s purpose of deterring culpable police misconduct, there is no reason to distinguish between good-faith reliance on a void warrant and any other warrant later deemed defective. We thus hold that the good-faith exception to the exclusionary rule can apply
2
Finally, then, to this particular case: Having determined that the good-faith exception can apply in situations involving void warrants, the question remains whether the exception should apply to the cases before us today. In Leon, the Supreme Court laid out several situations in which the good-faith exception should not apply: (1) where the magistrate judge was misled by information in a warrant application that the applicant knew was false or would have known was false but for a reckless disregard of the truth; (2) where the magistrate “wholly abandoned” her judicial role; (3) where the affidavit supporting the warrant application was “so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable“; or (4) where the warrant was “so facially deficient” that officers couldn‘t have reasonably presumed it to be valid. 468 U.S. at 923.
Here, Taylor and Smith contend—and the dissent agrees—that the magistrate was, within the meaning of Leon, “misled by information” in the application that the FBI officers knew, or should have known, to be false. The face of the application, they say, prominently represented that the “property to be searched” was “located in the Eastern District of Virginia” and, more specifically, asserted (in the incorporated Attachment A) that the Playpen server was “located at a government facility in the Eastern District of Virginia.” Br. of Appellant Taylor at 42; Br. of Appellant Smith at 41. It wasn‘t until page 29 of Agent Macfarlane‘s 31-page affidavit, Taylor and Smith say, that the application finally acknowledged that the NIT would search computers “wherever located.” Br. of Appellant Taylor at 42; Br. of Appellant Smith at 41. This approach, they contend, shows that the FBI intentionally misled the magistrate judge and belies any claim to good-faith reliance.
In responding that the good-faith exception should apply, the government begins with the contention that there is no deterrent benefit to exclusion here because Rule 41 was recently amended to add a new subsection to cover remote-access warrants to search electronic storage both within and outside of a magistrate judge‘s district—i.e., precisely the sort of search at issue in this case.14 But that argument cuts both ways. On the one hand, it indicates that we needn‘t necessarily deter this particular type of search on a going-forward basis. On the other, the recent amendment of Rule 41 to allow remote-access search warrants underscores that Rule 41(b) did not permit these warrants at the time the FBI deployed the NIT.
Even so, we find no indication that the FBI officers sought to deceive the magistrate judge or otherwise acted culpably or in a way that necessitates deterrence—and certainly no indication of the sort of “deliberate[], reckless[], or . . gross[ly] negligen[t]” conduct that the Supreme Court has recently highlighted as the focus of the exclusionary-rule/good-faith inquiry. Davis, 564 U.S. at 240; see also Herring, 555 U.S. at 144; Krull, 480 U.S. at 352-53. While the NIT-warrant application
So, was the warrant application here perfect? Not close. But does it evidence “chicanery,” “duplicity,” and “gamesmanship“? See Dissenting Op. at 16, 25. It doesn‘t. We conclude that, in their totality, the application and affidavit sufficiently disclosed the bounds of the intended search. In light of the square-peg/round-hole issue that they faced, the officers did what we would hope and expect—they fully disclosed the mechanics of the intended search, left the constitutional call to the magistrate judge, and acted in reasonable reliance on the resulting warrant.16 As already explained, the “exclusionary rule
AFFIRMED.
TJOFLAT, Circuit Judge, concurring in part and dissenting in part:1
As the majority points out, we are far from the first court to consider whether the NIT warrant passes constitutional muster. I agree with the majority that it does not. The majority also adds its voice to the unanimous chorus of ten other courts of appeals who have found that, regardless of any constitutional infirmity, the exclusionary rule should not apply. On this point, I must respectfully dissent.
The evidence obtained as a result of the NIT warrant should be suppressed because the law enforcement officials who sought the warrant are not entitled to the good faith exception. The officials knew or should have known that there was an issue with jurisdiction and that the search would occur outside the district. Yet, the officials told the magistrate repeatedly that the search would take place in the district.2 If the law condones this conduct, it makes a mockery of the warrant process.
I.
First, some background on the exclusionary rule. The purpose of the exclusionary rule “is to deter future Fourth Amendment violations.” Davis v. United States, 564 U.S. 229, 236-37 (2011). But the point is “to deter police misconduct rather than to punish the errors of judges and magistrates.” United States v. Leon, 468 U.S. 897, 916 (1984).
Courts look to all the officials involved in the warrant process, including those who sought the warrant in the first place. Id. at 923 n.24 (“It is necessary to consider the objective reasonableness, not only of the officers who eventually executed a warrant, but also of the officers who originally obtained it or who provided information material to the probable-cause determination.“). In this case, the officials who sought the warrant include, at least, the FBI agent who submitted the warrant application and the Assistant U.S. Attorney who reviewed it.
Whether to invoke the exclusionary rule turns largely on “the flagrancy of the police misconduct.” See id. at 911; see also Herring v. United States, 555 U.S. 135, 143 (2009). Courts ask whether law enforcement officials knew or should have known that their conduct was unconstitutional. See Herring, 555 U.S. at 143 (citing Illinois v. Krull, 480 U.S. 340, 348-49 (1987)).
Their conduct is evaluated under an objective reasonableness standard: “whether a reasonably well trained officer would have known that the search was illegal in light of all of the circumstances,” including this “particular officer‘s knowledge and experience.” Id. at 145 (quotation omitted). This standard “requires officers to have a reasonable knowledge of
If, under this standard, courts determine that law enforcement‘s conduct was deliberate, reckless, or grossly negligent, exclusion is likely warranted. Davis, 564 U.S. at 238. Alternatively, if law enforcement reasonably relied on a warrant, Leon, 468 U.S. at 922, or on binding judicial precedent, Davis, 564 U.S. at 249-50, exclusion is not warranted. This is the so-called good faith exception, and it makes sense: if law enforcement acted in objectively reasonable reliance, the conduct was not culpable—i.e., it wasn‘t deliberate, reckless, or grossly negligent—so there is no misconduct to deter.
That does not mean that whenever law enforcement obtains a warrant, the good faith exception applies. For example, if law enforcement officials misled the magistrate in the warrant application with material information that they knew or should have known was false, they are not entitled to good faith. Leon, 468 U.S. at 923 (“Suppression therefore remains an appropriate remedy if the magistrate or judge in issuing a warrant was misled by information in an affidavit that the affiant knew was false or would have known was false except for his reckless disregard of the truth.“). That is what happened here.
There is no question that law enforcement made a false representation in the NIT warrant application. On the application, the FBI agent told the magistrate, in no uncertain terms, that the property to be searched would be “located in the Eastern District of Virginia.” Of course, it is “undisputed” that the search did not take place within the district. Maj. Op. at 12. Thus, the issue is whether the officials seeking the warrant made this false representation deliberately or recklessly. This issue turns on what a reasonable officer standing in the shoes of the officials in this case knew or should have known. For this determination, we must consider the totality of the circumstances.
II.
A.
When the totality of the circumstances is considered, I have little doubt that a reasonable FBI agent and federal prosecutor should have known there was a jurisdictional problem. See United States v. Martin, 297 F.3d 1308, 1318 (11th Cir. 2002) (holding that courts “can look beyond the four corners of the affidavit and search warrant to determine whether” the good faith exception applies). Specifically, the Justice Department‘s efforts to change the
In 2013—two years before the warrant application in this case—the FBI applied to a magistrate judge in Texas for a strikingly similar warrant. See In re Warrant to Search a Target Comput. at Premises Unknown, 958 F. Supp. 2d 753, 755 (S.D. Tex. 2013). The FBI was attempting to identify “[u]nknown persons” who committed bank fraud and identity theft using “an unknown computer at an unknown location.” Id. The warrant sought authorization to “surreptitiously install” software on the target computer that would extract certain information and send it back to “FBI agents within this district.” Id.
In a published decision, the magistrate denied the warrant application because the search of the target computer would not take place within the district. See id. at 756-58. The court explained its decision: “Since the current location of the Target Computer is unknown, it necessarily follows that the current location of the information
Notably, unlike this case, the FBI addressed the jurisdictional issue in its supporting affidavit to the Texas magistrate. See id. at 756. The FBI “readily admit[ted] that the current location of the Target Computer [was] unknown,” but nevertheless maintained that the search would comply with
The point is that there was federal precedent addressing the precise jurisdictional issue raised by the NIT warrant. Thus, it is not true, as several of our sister circuits have suggested, that the jurisdictional issue was a “novel question . . . for which there was no precedent on point.” United States v. Levin, 874 F.3d 316, 323 (1st Cir. 2017); see also United States v. McLamb, 880 F.3d 685, 691 (4th Cir. 2018) (stating that officials seeking the NIT warrant were “[w]ithout judicial precedent for reference“), cert. denied, 139 S. Ct. 156 (2018).
Since the FBI sought the warrant in the Texas case, it seems fair to say that a reasonable FBI agent seeking a similar warrant should have been aware of the issues presented by remote searches of unknown sources. Granted, the FBI is a large organization, but the universe of people involved in these cutting-edge search warrants designed to uncover anonymous computer users is surely much smaller. Plus, we know that “the FBI consulted with attorneys at the . . . FBI‘s Remote Operations Unit” before applying for the warrant. McLamb, 880 F.3d at 689.
Additionally, a reasonable federal prosecutor who did any research into the legal issues raised by the NIT warrant should have come across the Texas case, so the Assistant U.S. Attorney who reviewed the warrant should have known about it. Thus, because of the Texas case, the officials applying for the NIT warrant should have been aware that there was a potential problem with the magistrate‘s jurisdiction to issue the warrant.
Of course, a magistrate‘s decision in Texas, even in a published opinion, is not binding precedent for a warrant application in Virginia. I do not suggest that the Texas case foreclosed officials from applying for the NIT warrant. Prosecutors and the FBI could honestly “believe that reasonable magistrate judges could differ on the legality of the NIT.” United States v. Werdene, 883 F.3d 204, 218 n.12 (3d Cir. 2018), cert. denied, 139 S. Ct. 260 (2018). For that reason, it would have been perfectly acceptable for these officials to have applied for the NIT warrant and explained to the magistrate why they believed there was jurisdiction. But it was unacceptable to ignore the jurisdictional issue altogether—to repeatedly assert that the search was within the district and fail to mention to the magistrate the problems that led another
Moreover, the Texas case was not an isolated occurrence. It had far-reaching consequences that make it almost unthinkable that the officials seeking the NIT warrant were unaware of the jurisdictional problem.
Less than six months after the Texas decision, the Justice Department sent a letter to the Advisory Committee on the Criminal Rules urging it to amend the rules to allow for warrants like the one sought in the Texas case. Letter from Mythili Raman, Acting Assistant Att‘y Gen., to Hon. Reena Raggi, Chair, Advisory Comm. on the Crim. Rules (Sept. 18, 2013). Specifically, the Justice Department proposed amending ”
While the committee considered the proposed amendment, the Justice Department continued to advocate for the change and submitted several memorandums defending the amendment. In one memo, dated about two months before the NIT warrant, the Justice Department explained as an example that the amendment would “ensure that a court is available” to issue warrants “investigating members of a child pornography group” using “the Tor network[] to hide from law enforcement.” Memorandum from David Bitkower, Deputy Assistant Att‘y Gen., to Hon. Reena Raggi, Chair, Advisory Comm. on the Crim. Rules (Dec. 22, 2014). These warrants would authorize “the use of the NIT” to “identify the location of the individuals accessing the site.” Id. Sound familiar?
Ultimately, the committee recommended adopting the amendment, which became effective on December 1, 2016. Memorandum from Hon. Reena Raggi, Chair, Advisory Comm. on Crim. Rules, to Hon. Jeffrey S. Sutton, Chair, Comm. on Rules of Practice and Proc. (May 6, 2015). The Justice Department‘s extensive involvement in the rule change—including the two highest ranking officials in the Criminal Division—makes it hard to accept that none of the Justice Department officials involved in the NIT warrant was aware of the jurisdictional issue.5
The Justice Department had a number of connections to the NIT warrant. First of all, there is the Assistant U.S. Attorney
The Texas case and the DOJ-requested rule change show that a reasonable officer in the shoes of the law enforcement officials seeking the warrant should have known that there was a jurisdictional issue. To be clear, I‘m not suggesting that the officials should have known that the magistrate did not have jurisdiction to issue the warrant. I‘m suggesting that because of these circumstances, they should have known that the magistrate‘s jurisdiction to issue the warrant was in doubt—that there was a potential problem with jurisdiction. And if they knew that there would be an issue with jurisdiction, they had an obligation to flag it for the magistrate.6
B.
It is also clear that the officials seeking the warrant knew that the search would not be contained to the Eastern District of Virginia. The FBI‘s investigation revealed that Playpen had over 150,000 members and that the site received over 11,000 unique users every week. It would be absurd to believe that all of the users’ computers would be in the Eastern District of Virginia. A reasonable official would have believed, correctly as it turns out, that the users’ computers would be found in districts all over the country.7
III.
Having established that the officials seeking the warrant knew or should have known that there was a potentially fatal jurisdiction problem with the warrant, let‘s take a closer look at how they presented this issue to the magistrate.8
The caption to the warrant application states that the search will be of “computers that access” the Playpen website. Beneath the caption, the FBI agent seeking the warrant attests, under penalty of perjury, that he has “reason to believe” the property to be searched is “located in the Eastern District of Virginia.”
The application directs the reader to “Attachment A” for a description of the property to be searched. Attachment A, titled “Place to be Searched,” explains that the “warrant authorizes the use of a network investigative technique (‘NIT‘) to be deployed on the computer server described below” to obtain certain information “from the activating computers described below.” Below, it explains that the “computer server is the server operating” the Playpen website, “which will be located at a government facility in the Eastern District of Virginia.” And it explains that the “activating computers are those of any user or administrator who logs into the [Playpen] by entering a username and password.”
Thus, on the face of the warrant application, officials informed the magistrate that the search would be in the Eastern District of Virginia. The application then seemingly supported this assertion by noting that the server is in the district—the only geographic reference in the application.
True, an especially discerning magistrate might have gathered that the search is of computers, not of the server, so the location of the server is irrelevant, and the computer of “any user” could be outside the district. But the question is not whether it was possible for the magistrate to detect the error—the exclusionary rule is concerned with police misconduct, not magistrates’ errors. See Leon, 468 U.S. at 916. The question is whether the magistrate was misled, and whether law enforcement officials were responsible for the deception. See id. at 923. Maybe the magistrate should have noticed. But the officials who sought the warrant understood the technology and how the search would work better than anyone, and if anyone should have noticed, it was they.
The affidavit supporting the warrant continues the charade. It mentions repeatedly that the server is located in the magistrate‘s district. Here are a few examples:
- “Accordingly, I request authority to use the NIT, which will be deployed
on the TARGET WEBSITE, while the TARGET WEBSITE operates in the Eastern District of Virginia, to investigate any user or administrator who logs into the TARGET WEBSITE by entering a username and password.” - “Under the NIT authorized by this warrant, the TARGET WEBSITE, which will be located in Newington, Virginia, in the Eastern District of Virginia, would augment [the content sent to visitor‘s computers] with additional computer instructions. When a user‘s computer successfully downloads those instructions from the TARGET WEBSITE, located in the Eastern District of Virginia, the instructions, which comprise the NIT” will cause the user‘s computer to send certain information to the FBI.
- “During the up to thirty day period that the NIT is deployed on the TARGET WEBSITE, which will be located in the Eastern District of Virginia, each time that any user or administrator logs into the TARGET WEBSITE by entering a username and password, this application requests authority for the NIT authorized by this warrant to attempt to cause the user‘s computer to send the above-described information to a computer controlled by or known to the government that is located in the Eastern District of Virginia.”
The repeated emphasis of the server‘s location is especially suspicious given that the location of the server was completely irrelevant. The search was of users’ computers, not of the server.
Why, then, did the affidavit repeatedly mention the server‘s location? It smacks of desperation, and it appears calculated to lull the magistrate into a false sense of jurisdictional security. I can think of no other reason to include so irrelevant a piece of information so many times.
In contrast, the affidavit is nearly silent on the decisive data point: the location of the computers. It is only on page 29 of 31 that the affidavit finally acknowledges (somewhat explicitly) that “the NIT warrant may cause an activating computer—wherever located—to send to a computer controlled by or known to the government” the information sought. This is the closest law enforcement comes to advising the magistrate that the search will occur outside the district. As a disclosure, it leaves much to be desired. The affidavit mentions this detail once, without any explanation of its impact. It does not say that, therefore, the search might occur outside the Eastern District of Virginia. It forces the magistrate to draw the conclusion. It is a breadcrumb, buried in a dense and complicated affidavit, left for the magistrate to follow.
In other warrant applications, law enforcement officials were not nearly so stingy with information about jurisdiction. For example, in the Texas case, the government confronted the jurisdiction problem and supplied the magistrate with an argument in the affidavit for why it thought there was jurisdiction. See In re Warrant, 958 F. Supp. 2d at 756. Courts should expect nothing less.
Even in the wiretap application—submitted simultaneously with the NIT application by the same Assistant U.S. Attorney—the application included a paragraph detailing the jurisdictional basis for the warrant, even though the jurisdiction for that order was straightforward and uneventful.9 Here, in contrast, where there
The comparison with these other examples illustrates why the officials in this case did not do what we “hope and expect” of law enforcement. Maj. Op. at 29. The disclosure in the affidavit was woefully inadequate.
The warrant‘s defenders argue that the disclosure on page 29 “cured” the warrant of any ambiguity. See, e.g., McLamb, 880 F.3d at 690–91 (“To the extent the form is misleading, [the affidavit] cured any ambiguity by informing the magistrate judge that the NIT would cause activating computers ‘wherever located’ to transmit data to the FBI.“). First of all, it‘s odd to say that the disclosure cured the warrant. The disclosure that the warrant authorized searches of computers “wherever located” is the fatal flaw; it‘s the reason the magistrate didn‘t have jurisdiction to approve the warrant. How could revealing the fatal flaw cure the warrant?
More accurately, the suggestion is that by eventually and indirectly revealing the warrant‘s defect, the officials seeking the warrant absolved themselves of any bad faith. In other words, law enforcement officials cannot be accused of bad faith so long as they technically, no matter how discreetly, disclose the truth somewhere in the warrant application. This sets too low a bar. It essentially gives officials permission to try to hoodwink magistrates: they can make false statements to the court so long as they include enough information to uncover their chicanery. If the magistrate fails to spot the issue, officials can cloak themselves in good faith reliance and execute the warrant without fear of suppression. I refuse to invite such gamesmanship. If law enforcement officials know of a problem with their warrant, they need to be forthcoming about it.
Here‘s the other problem with the “cure” argument: If the language in the application might have been enough to show the magistrate that the search would not be in the district, surely it was enough to reveal the same to the officials seeking the warrant. After all, wouldn‘t we expect the author to understand his writing better than the reader—especially when the subject concerns an exceedingly complex technology with which the author is familiar and the reader is not? And once the officials realize the problem, they need to address it, otherwise they are misleading the magistrate.
Furthermore, the argument that the application disclosed enough for the magistrate to discover the defect answers the wrong question. It focuses on whether the magistrate should have spotted the issue. Cf. United States v. Horton, 863 F.3d 1041, 1052 (8th Cir. 2017) (“Even if it were misleading to label the place to be searched as the Eastern District of Virginia, a reasonable reader would have understood that the search would extend beyond the boundaries of the district because of the thorough explanation provided in the attached affidavit.“) (emphasis added), cert. denied, 138 S. Ct. 1440 (2018). But, again, the exclusionary rule is concerned with curbing “police rather than judicial misconduct.” Herring, 555 U.S. at 142. Thus, the proper question is, given
If the officials knew that the search would be of computers outside the district, it was unacceptable to swear that the search would be within the district. If, perhaps, the officials had some other reasonable basis for believing that the search was still within the magistrate‘s jurisdiction, they needed to present it to the magistrate. It would be recklessly misleading to submit a warrant application to a magistrate repeatedly stating the search would be within the district, with one buried caveat, when the officials’ only reason for stating that is some novel theory they declined to share with the magistrate.
Tellingly, at no point in this appeal, nor to our knowledge in any of the other appeals concerning the NIT warrant, has the government defended the warrant on the grounds that the search did in fact occur in the Eastern District of Virginia. How could they? Instead, the government has argued that the NIT search functioned like a tracking device that was installed within the district, and thus satisfied
After the fact, courts can uphold a warrant on any basis. That same luxury should not extend to a good-faith analysis of the officials who sought the warrant. The FBI agent swore in the warrant application that he had “reason to believe” the property to be searched was in the Eastern District of Virginia. An official cannot make that representation if he does not actually have a reason, but is instead hoping for the magistrate to find one. Thus, the suggestion that because a few courts have upheld the warrant on a tracking-device theory it was reasonable for the officials seeking the warrant to believe there was jurisdiction, requires the assumption that the officials believed there was jurisdiction for the warrant on a tracking-device theory.
The problem with this logic is that law enforcement did not seek, nor did they obtain, a tracking-device warrant. See Maj. Op. at 13. To obtain a tracking-device warrant, law enforcement uses a different
A reasonable law enforcement official, especially an FBI agent with 19 years of experience, would understand the difference between a tracking-device warrant and a search warrant. A reasonable official would know that if the jurisdictional basis for the warrant was a tracking-device theory, he should seek a tracking-device warrant, or at least make the magistrate aware of the theory some other way. Bottom line: it is objectively unreasonable for law enforcement to believe there is jurisdiction on the basis of a warrant they did not seek and a theory they did not present.
*
*
*
To recap, the officials knew or should have known that there was a jurisdiction problem with the warrant. And they knew the search would not be within the district. If the search was of computers outside the district, the only possible basis for believing the magistrate had jurisdiction to issue the warrant would have been a tracking-device theory. But a reasonable official would know the warrant was not a tracking-device warrant, and it would be recklessly misleading to seek a regular search warrant based on a tracking-device theory without at least alerting the magistrate to the theory. As such, it appears to me that a reasonable official in these circumstances would have no basis for believing the magistrate had jurisdiction.
Even assuming the officials believed there was jurisdiction, the warrant application was misleading. The application states repeatedly that the search would be in the district, even though they knew the search would be of computers outside the district. They repeatedly emphasized the location of the server, which was irrelevant, and completely omitted any discussion of jurisdiction. The late disclosure that the computers could be “wherever located” did not eliminate the risk that the magistrate would be misled and did not give the officials license to make disingenuous representations elsewhere. For these reasons, I believe the officials deliberately or recklessly misled the magistrate.
IV.
Whether the exclusionary rule should apply is, ultimately, a question of whether the benefits of deterrence outweigh the costs of suppression. See Herring, 555 U.S. at 141. The costs—excluding reliable evidence and possibly allowing the guilty to go free—are high. Davis, 564 U.S. at 237 (“[Exclusion] almost always requires courts to ignore reliable, trustworthy evidence bearing on guilt or innocence. And its bottom-line effect, in many cases, is to suppress the truth and set the criminal loose in the community without punishment.“) (citation omitted). But what about the other side of the scale? What are the benefits of deterrence in this case?
Other courts have given short shrift to the benefits of deterrence in this case. They claim there is minimal deterrent value because (1) the blame lies with the magistrate for approving the warrant, and (2) the NIT warrant would now be lawful after the rule change. See, e.g., Moorehead, 912 F.3d at 970–71 (“The fact that any jurisdictional error here was made by the magistrate, coupled with the fact that Rule 41(b) has been amended to authorize warrants like the one at issue, means the benefits of deterrence cannot outweigh the costs.“) (quotation omitted). This misses the point. If the officials who sought the
There is a reason the Supreme Court has said that if police conduct is deliberate, reckless, or grossly negligent, “the deterrent value of exclusion is strong and tends to outweigh the resulting costs.” Davis, 564 U.S. at 238. If courts decline to invoke the exclusionary rule in the face of culpable misconduct, we condone and encourage it. We effectively establish a new standard for law enforcement. Thus, even though the NIT warrant would not be valid, this will not be the last time that law enforcement officials mislead a magistrate in their quest for a warrant of dubious validity.
With this case, ten courts of appeals have sanctioned the following standard: When law enforcement officials apply for a warrant, even if they know the warrant is constitutionally suspect, so long as they technically disclose the facts that would reveal the problem to a discerning magistrate, no matter how cursory or buried the disclosure, the warrant is effectively unimpeachable if the magistrate fails to detect the problem. I cannot believe that the law expects so little of law enforcement, or so much of magistrates.
This standard creates a warped incentive structure. It encourages law enforcement to obscure potential problems in a warrant application. Because officials can be less upfront about problems in a warrant application, the onus is on the magistrate to spot the issues. But it is well-established that if a magistrate makes a mistake—e.g., misses an issue, gets the law wrong—that mistake will almost always be forgiven because the police can generally rely on an approved warrant in good faith. See Leon, 468 U.S. at 922. This is a system designed to encourage mistakes.
Instead, we should demand the utmost candor in warrant applications. Before today, I thought we did. The warrant process is premised on the good faith of law enforcement. See Franks v. Delaware, 438 U.S. 154, 164 (1978) (“[T]he Warrant Clause . . . surely takes the affiant‘s good faith as its premise . . . .“). It is “unthinkable” that a warrant application, “revealed after the fact to contain a deliberately or reckless false statement,” would be beyond “impeachment.” Id. at 165. Indeed, if law enforcement officials were permitted to deliberately or recklessly include false representations in the warrant application, “and, having misled the magistrate, then [were] able to remain confident that the ploy was worthwhile,” it would neuter the Fourth Amendment. Id. at 168.
Similarly, candor underpins the rationale for the good faith exception. We extend good faith to police executing the warrant because they are entitled to presume that magistrates are competent. See Messerschmidt v. Millender, 565 U.S. 535, 547-48 (2012). But there is no reason to defer to magistrates’ judgments if law enforcement officials do not present the court with the full and accurate picture. See Leon, 468 U.S. at 914–15 (stating that courts should not defer to a warrant when the magistrate‘s determination was based on a “knowing or reckless falsity” or when the magistrate was not presented with “[s]ufficient information“).
It is especially important to demand candor in warrant applications. The warrant application process is ex parte, which increases the risk that false information will be accepted or problems will be overlooked.
I also don‘t think candor is too much to ask for. When executing a warrant, police are making decisions in real time. Plus, typically, they are not lawyers, so we don‘t expect them to have as much knowledge of the law as a magistrate reviewing a warrant application from the comfort of her chambers. These considerations do not apply, at least not to the same extent, to officials seeking a warrant. Generally, these officials have just as much, if not more, time for reflection while preparing the application, as the magistrate does while reviewing it. And in the frequent cases where police work with prosecutors to prepare a warrant application, it is fair to expect them to have a greater knowledge of the law.
I‘m not advocating to change the law—the law already requires candor in warrant applications. I‘m asking courts to take this requirement seriously.
When the Supreme Court established the good faith exception, the principal dissent warned that it would “put a premium on police ignorance of the law.” Leon, 468 U.S. at 955 (Brennan, J., dissenting). Justice Brennan predicted that in close cases “police would have every reason to adopt a ‘let‘s-wait-until-it‘s-decided’ approach in situations in which there is a question about a warrant‘s validity or the basis for its issuance.” Id. With this decision, his premonition has come true.
*
*
*
I recognize that my decision would have an unfortunate result. It would invalidate a warrant that led to the arrest and prosecution of hundreds who trafficked in child pornography. And it would suppress the evidence gathered under that warrant‘s authority, likely leading to the release of many of those offenders. But this unfortunate result is almost always the consequence when relevant, damning evidence is excluded. Such a result is the price we pay to protect the Fourth Amendment rights of the public. Therefore, we must follow the law even when faced with unpleasant outcomes. Otherwise, we excuse conduct, like the conduct at issue here, which invites strategic duplicity into the warrant process.
Because today‘s decision undermines the integrity of the warrant process—a process which plays a crucial role in protecting the rights guaranteed by our Constitution—I respectfully dissent.
