Upping the Ante



In re Application for Search Warrants, 2012 VT 102.

Here is the problem facing the SCOV in today’s decision.  A search warrant for specific information on a computer runs the risk of exposing much more that the warrant intends. 

This is because computers are our personal panopticons that effectively watch and preserve our every move.  Every on-line step we take leaves a record, and when we think we have deleted the information, the browsing history, it is usually still there. 

In this digital age, a lot of personal, mostly-legal, potentially-embarrassing information can always be found on our computers, and we have an interest in keeping this information private.  (As a professional, I do not want anyone to know about my extensive Fall Guy fan fictions—particularly the ones where Colt and Jody totally take it to the next level.) 


At the same time, police need a wide berth in these types of electronic searches because criminals can be clever with their files, mislabeling them, stripping out identifying data, or storing them in unusual areas of their hard drive. 

To put it in more concrete terms, how do the courts ensure that search warrants for computers focus on the particular, alleged criminal activity (child pornography, identity theft, etc.) and not on the legal but potentially embarrassing stuff that is likely to rise to attention during an invasive search (adulterous e-mails, embarrassing web searches, etc.)?

This is more difficult than it would seem.  Think of a filing cabinet.  If any of us have one, it is probably in the home office.  Its contents are limited.  Business records, receipts, bills, policies, some certificates, but overall, it is going to be limited in content.  That is because the filing cabinet is both a physical object of limited space and a physical repository (you actually have to put the papers in it). 

Thus if a search warrant is executed for the family’s business records, no privacy is likely to be violated by seizing or searching through the file cabinet. 

Now think of your computer.  If your house is like most others, the computer has taken a central role.  It is the instrument for record-keeping, bill paying, correspondence (professional and personal), social interactions, entertainment, hobbies, shopping, personal researches (what was the Sheriff’s name on the Dukes of Hazzard?), and more deviant activities (use your imagination). 

In other words, the computer has become the center of our lives, and unlike file cabinets or other storage sites in our house, it offers a complete and intact record of everything we and the rest of our household do. 

Here is where the problem comes to a head.  When the police have probable cause for a narrow issue—such as a case of identity theft—where there are only a handful of records involved—Does this limited scope of a warrant give entree to the suspect’s entire life? 

The answer is that it does not under the specific terms of the warrant, but it does in practice under the so-called plain view doctrine.   This doctrine states that if police—in the course of performing a legitimate search under a warrant—see evidence of a crime in plain view (such as the large bale of marijuana sitting on the kitchen counter), then they may seize this evidence without securing another warrant.

Let’s think of the file cabinet example again.  Under the plain view doctrine, if the police seize the cabinet under probable cause that the suspect has been running a Ponzi scheme, and they find child pornography in the filing cabinet alongside it, then they get to seize this evidence as well, and the suspect’s problems have just increased ten-fold.  This is reasonable because they were conducted a reasonable search focused on a particular set of records that were likely to have the documents subject to the search.  The fact that the suspect also chose to store his other illegal activity in the same space is his own fault (like the criminal who keeps the bale of marijuana on the counter).

You can see the problem, though, with a computer.  The files on a computer are broad and wide, and a search that starts off looking for something particular (proof that the suspect committed identity theft) could easily explode into a virtual audit of the suspect’s entire life. 

This goes against the spirit and the intent of the 4th Amendment.  Under this constitutional guarantee, we are protected from unreasonable searches and seizures, and police officers seeking to perform such searches must establish probable cause.  But the plain view doctrine together with the nature of a computer search has the potential to turn even the most limited warrant into a broad and invasive fishing expedition. 

The problem is vexing because while we, as a society, have a strong commitment to privacy, we also have an equally strong belief that the police need the tools and resources to investigate and detect crime.  So how do we stop a search warrant for a limited number of computer files from becoming an invasive fishing expedition?  And how do we do it so as not to frustrate the purpose of the warrant or the work of the police?

That is what the SCOV wrestles through in today’s lengthy decision.  The result splits the justices, albeit in fewer and less fundamental ways than you might suspect.

Let’s start with the facts.  Today’s case started out with some dogged police work.  New York police traced a case of identity theft back to Vermont.  The Burlington Police joined the investigation and tracked the source of the theft down to a specific wifi network, then to a specific address, and eventually to a specific person and e-mail address. 

The next step was to seek a warrant.  The police did so for any computer at the address they had found.  The warrant sought to seize the computers and review them, file-by-file if necessary.  The police sought all computers because they knew that it was likely that the suspect had hidden his criminal activity, possibly on a computer that was not his own.  The police also suspected that the suspect likely hid the incriminating files within the computer in way that they would not be marked or tagged.  As the SCOV mentions in its decision, the police did not limit their broad request but made a broad request to seize as many computers as they found and to conduct as invasive a search as they found necessary.

Once the warrant, supported by an officer’s probable cause affidavit was drafted, the investigating officers took it to a trial court judge to review and approve.  In this case, the reviewing judge signed the warrant but added ten ex ante conditions to the warrant.

These conditions broke down into roughly four categories of ex ante instructions.  First, the judge ordered the suspension of the plain view doctrine while executing the warrant.  Second, the judge ordered the search of the computer files to be completed by a third-party or police personnel segregated from the investigative team.  Third, the judge required the police to use focused search tools and not to use specialized search tools without additional, prior court authorization.  Fourth, the judge required the police to return or destroy any copies of data made that were not held for evidence. 

An ex ante condition is a condition imposed on a warrant by a judge before it is executed.  Rather than a post-warrant limitation on the evidence that is found, an ex ante condition is a limit on the way the warrant is to be executed to prospectively avoid seizures or searches outside the scope of the 4th Amendment.

As a rule, ex ante conditions are rare, and the SCOV takes up a significant portion of the decision deliberating whether such conditions are even legal.  The SCOV finds some legal precedent for such instructions in Vermont historic practice and unanimously approves their use. 

Yet beyond, this somewhat vague tradition, there is little case law or actual precedent to support attaching ex ante conditions to a search warrant.  Usually, the question is one of probable cause, particularity, and reasonableness.  If a warrant lacks one or more of these qualities, the judge will often decline the warrant and force the police to either sharpen the basis for the warrant or find another way to collect the evidence.  Allowing ex ante conditions is kind of a hedge on these conditions.  The judge is agreeing that probable cause, reasonableness, and particularity are there, she is just saying that it needs to be further limited. 

This is relatively new ground for the SCOV and for criminal practice.  In fact, the only modern case that the SCOV finds to support ex ante conditions comes from a review of search warrants stemming from the baseball doping case that arose in San Francisco. 

Yet, a unanimous SCOV is persuaded.  Ex ante conditions, while not required, are permissible, and there was no error by the trial court judge in this case by assign these conditions.  The SCOV indicates that while such conditions are rare, they serve the relatively common need here for balancing privacy with a warranted search. 

In this respect, let police, prosecutors, and defense attorneys take note.  Ex ante conditions have now been allowed and will, in principal, be upheld on appeal.  While an ex ante condition is not necessary (as the SCOV takes pains to point out), it is a valid tool for judges and will likely be used if a search warrant application appears to be using modest probable cause to take on a disproportionately large seizure. 

Tailor your warrant applications appropriately.

That said, the SCOV does not agree with all of the ex ante terms applied to this warrant.  First, the SCOV strikes down the trial court’s imposition of a ban on the plain view doctrine.  As the SCOV notes, the plain view doctrine is a legal principle and ex ante conditions cannot abrogate legal doctrines.  It can limit the mechanics of the search, but it cannot re-write the law. 

Furthermore, the plain view doctrine extends beyond the computer search.  It would be proper to invoke if the officers found evidence of criminal activity during the initial seizure of the computers, and it would be improper to limit them from using the doctrine in this manner.

Next comes the biggest controversy of the decision.  Whether to uphold the second category of conditions, which required the police to use a third-party or isolated police staff to conduct the actual computer search. 

For a majority of the SCOV, the conditions in this category are reasonable.  The separation achieves what the trial court intended—it prevents the police from simply rifling through the computer and invoking the plain view doctrine whenever it comes across something criminal.  Not that we want to protect criminal behavior, but such a blind limits the potential to misuse the Plain View Doctrine for everything on the computer.

Justice Burgess—joined by Chief Justice Reiber—dissents on this point.  For the dissent, the issue is one of privacy lost.  If the documents are reviewed, it does not matter if it is the investigating officer or a third-party.  The embarrassing documents have been disclosed to another.  In the view of the dissent, this “blind” is unnecessary.  Privacy has been compromised, and the only thing the blind does is unnecessarily restrict the police investigation.

The majority disagrees.  Privacy in this case has not been voluntarily waived and any limitation on who views the information represents a reasonable limitation that the trial court may legitimately invoke. 

For the two sides, this is where the bulk of the decision is spent.  Each spends several paragraphs trying to define what privacy is, what a reasonable expectation of it is, and why the trial court’s limitation on who can or cannot see the information makes sense in light of the privacy expectations surrounding computer records. 

The majority’s affirmation of this condition represents a substantial victory for those who champion the privacy side of the equation.  By upholding it, the SCOV affirms the trial court’s attempt to put some teeth into the unanimously accepted goal of avoiding situations where the plain view doctrine might be invoked.  The condition here will limit the police’s access to only those documents relating to the alleged identity theft documents.   

This has consequences that fall on both sides of the debate.  This limit means that if the suspect has been using his computer for other nefarious exploits, those documents will remain private.  But it also means that the suspect can also know that his embarrassing and bad (but legal) habits (that obsession with Justin Bieber, for example) recorded on his hard drive will not become part of the investigation.

For the dissent, the outcome is an unnecessary and unsupported restriction, and the police are limited for no purpose of privacy gain.

The remainder of the case is relatively short.  The SCOV unanimously agrees that the remainder of the ex ante conditions were reasonable, and they are affirmed.  The police are limited on their search mechanisms, and they must return or destroy any unused files at the end of the search.

So ends the SCOV’s review, but it marks two beginnings. 

Trial judges will be and have likely taken note of this decision and the door that it opens.  It arguably falls to the trial court now to use ex ante conditions to modify the execution of warrants.  Police and prosecutors will also likely take note, and it would be surprising if they were not inspired to preemptively offer limitations within the warrant application to make the proposed search and seizure more particular and reasonable in light of the probable cause showing and privacy concerns. 

In other words, today’s case might just be the end of a more freewheeling time when warrants for a particular allegation gave rise to large, widespread searches of computer files.  It certainly represents a bold stake laid out by the SCOV in favor of privacy preserving measures.  It remains to be seen whether this is the first of many or merely a high-watermark justified by a set of particular facts.

The other beginning is the suspect’s case.  With the confirmation of the warrants, the police can now complete the search of the seized computers, and depending on the results either prosecute the suspect or dismiss the investigation.

In the end, both beginnings promise more legal issues before the SCOV, which should keep us here busy for a little while longer.

Comments