From Casetext: Smarter Legal Research

In re Search Warrants for Info. Associated with Target Email Address

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS
Sep 21, 2012
Case No. 12-MJ-8119-DJW (D. Kan. Sep. 21, 2012)

Opinion

Case No. 12-MJ-8119-DJW Case No. 12-MJ-8191-DJW

09-21-2012

IN THE MATTER OF APPLICATIONS FOR SEARCH WARRANTS FOR INFORMATION ASSOCIATED WITH TARGET EMAIL ADDRESS


MEMORANDUM AND ORDER

The United States has submitted two Applications and Affidavits for Search Warrant pursuant to 18 U.S.C. §§ 2703(a), 2703(b)(1)(A), and 2703(c)(1)(A) requiring two providers of electronic communication services, Yahoo! and UnityFax, to disclose copies of electronic communications—including the content of email and facsimile ("fax") communications—and other account-related information for the e-mail account identified in the Applications ("target email address"). In the affidavit in support of probable cause, the government alleges that the individual being investigated launched an email spam campaign to defraud individuals. The email offered the recipients a service for various prices. It also instructed the recipients to fax their service requests to a fax number and they would then be contacted on how to make a credit card payment. The government asserts that the identified fax number was traced to an account with UnityFax, a web-based fax provider. The UnityFax account was set up by a subscriber using the target email address. Yahoo! is the electronic communications service provider for the target email account. The government alleges that the target email account was utilized to create the UnityFax fax account which was, in turn, utilized to receive fax communications from potential victims of the scheme to defraud recipients, in violation of 18 U.S.C. § 1030 (Unauthorized Access of a Computer) or 18 U.S.C. § 1343 (Wire Fraud). The government seeks search warrants to obtain stored electronic communications and other information from UnityFax and Yahoo! in its search for fruits, evidence and/or instrumentalities of the violation of these laws. For the reasons discussed below, the applications for search warrant are denied without prejudice.

I. Proposed Search Warrants

The proposed search warrants are structured so that they identify two categories of information: (1) information to be disclosed by the providers of electronic communications services to the government under 18 U.S.C. § 2703, and (2) information to be seized by the government. The first section of the Yahoo! warrant orders Yahoo! to disclose to the government copies of the following records and other information, including the content of the communications, or each account or identifier associated with the target email address:

The contents of all e-mails associated with the account, including stored or preserved copies of e-mails sent to and from the account, draft e-mails, deleted e-mails, e-mails preserved pursuant to a request made under 18 U.S.C. § 2703(f), the source and destination addresses associated with each e-mail, the date and time at which each e-mail was sent, and the size and length of each e-mail;
All records or other information regarding the identification of the account, to include full name, physical address, telephone numbers and other identifiers, records of session times and durations, the date on which the account was created, the length of service, the types of service utilized, the IP address used to register the account, log-in IP addresses associated with session times and dates, account status, alternative e-mail addresses provided during registration, methods of connecting, log files, and means and source of payment (including any credit or bank account number);
All records or other information stored by an individual using the account, including address books, contact and buddy lists, calendar data, pictures, and files;
All records pertaining to communications between Yahoo!, Inc., UnityFax, and any person regarding the account, including contacts with support services and records of actions taken; and
The contents of all facsimiles and communications associated with the account, including stored or preserved copies of facsimiles and communications sent to and from the account, draft communications, deleted communications, communications preserved pursuant to a request made under 18 U.S.C. § 2703(f), the source and destination addresses associated with each communication, the date and time at which each communication was sent, and the size and length of each communication.
The first section of the UnityFax warrant orders UnityFax to disclose to the government copies of the following records and other information, including the content of the communications, for each account or identifier associated with the target email address:
All records or other information regarding the identification of the account, to include full name, physical address, telephone numbers and other identifiers, records of session times and durations, the date on which the account was created, the length of service, the types of service utilized, the IP address used to register the account, log-in IP addresses associated with session times and dates, account status, alternative e-mail addresses provided during registration, methods of connecting, log files, and means and source of payment (including any credit or bank account number);
All records or other information stored by an individual using the account, including address books, contact and buddy lists, calendar data, pictures, and files;
All records pertaining to communications between Yahoo!, Inc., UnityFax, and any person regarding the account, including contacts with support services and records of actions taken; and
The contents of all facsimiles and communications associated with the account, including stored or preserved copies of facsimiles and communications sent to and from the account, draft communications, deleted communications, communications preserved pursuant to a request made under 18 U.S.C. § 2703(f), the source and destination addresses associated with each communication, the date and time at which each communication was sent, and the size and length of each communication.

Upon the government's receipt of the requested information from the electronic communications service provider, the second sections of the proposed warrants further provide that government-authorized persons will review that information for what constitutes fruits, evidence, and/or instrumentalities of violations of 18 U.S.C. §§ 1030 or 1343, involving the email account since inception of the account including information pertaining to the following matters:

All stored electronic mail of any kind sent to, from, or through the [target email account] and all related subscriber accounts from account inception to the date of the search warrant to include communications involving a scheme to defraud individuals or entities with domain registrations;
All stored communications/facsimiles of any kind sent to, from, or through the UnityFax account associated with [target email account] and all related subscriber accounts from account inception to the date of the search warrant to include communications involving a scheme to defraud individuals or entities with domain registrations; and
Records relating to who created, used, or communicated with both accounts or identifiers, including records about their identities and whereabouts.

II. Relevant Law

A. The Stored Communications Act, 18 U.S.C. §§ 2701 et seq.

The applications for search warrant in this case seeks authorization to obtain and search electronic communications from providers of electronic communications services pursuant to 18 U.S.C. §§ 2703(a), 2703(b)(1)(A), and 2703(c)(1)(A). Under 18 U.S.C. § 2703(a), a government entity may require a provider of electronic communication services to disclose the contents of a wire or electronic communication that is in electronic storage for 180 days or less pursuant to a warrant issued in compliance with the Federal Rules of Criminal Procedure. For communications stored for more than 180 days, the statute authorizes a government entity to require a provider of electronic communication services to disclose the contents of the communications under the procedures outlined in subsection (b). Section 2703(b)(1)(A) authorizes a government entity to require a provider of remote computing services to disclose the contents of any wire or electronic communication without notice to the subscriber or customer if the government obtains a warrant issued pursuant to the Federal Rules of Criminal Procedure. Section 2703(c)(1)(A) authorizes a government entity to require a provider of electronic communication service or remote computing service to disclose records or other information pertaining to a subscriber or customer if the government obtains a warrant issued pursuant to the Federal Rules of Criminal Procedure.

Id.

B. The Fourth Amendment and its Application to Stored Electronic Communications

The Fourth Amendment of the United States Constitution guarantees the right of citizens against unreasonable searches and seizures:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The fundamental purpose of the Fourth Amendment "is to safeguard the privacy and security of individuals against arbitrary invasions by government officials."

Camara v. Mun. Court of City & Cnty. of San Francisco, 387 U.S. 523, 528 (1967).

Not all government actions are invasive enough to implicate the Fourth Amendment. A search is defined in terms of a person's "reasonable expectation of privacy" and is analyzed under a two-part test first set out Katz v. United States.This standard breaks down into two discrete inquiries: First, has the individual manifested a subjective expectation of privacy in the object of the challenged search? Second, is society willing to recognize that expectation as reasonable?

California v. Ciraolo, 476 U.S. 207, 211 (1986) (citing Smith v. Maryland, 442 U.S. 735, 740 (1979)).

The Supreme Court has not addressed whether there is reasonable expectation of privacy in email or fax communications stored with third-party electronic communications service providers. The Supreme Court has held that there is a reasonable expectation of privacy in other forms of communications, such as telephone communications and mail. In Katz v. United States, the Court found that telephone users were "surely entitled to assume that the words . . . utter[ed] into the mouthpiece w[ould] not be broadcast to the world," leading to a holding that has brought telephone conversations fully under the shelter of the Fourth Amendment. In United States v. Jacobsen, the Court found that "[l]etters and other sealed packages are in the general class of effects in which the public at large has a legitimate expectation of privacy," based on the premise that a search arises any time the government "infringes upon 'an expectation of privacy that society is prepared to consider reasonable."' In the more recent 2010 case, City of Ontario, California v. Quon,the Supreme Court addressed the reasonableness of a government employer's search of text messages sent and received on an employee's pager. While it did not directly decide the issue, the Court assumed arguendo that the employee had a reasonable expectation of privacy in text messages sent and received on the government employer-owned pager. The Court commented that "[t]he judiciary risks error by elaborating too fully on the Fourth Amendment implications of emerging technology before its role in society has become clear."

389 U.S. 347 (1967).

Id. at 352.

466 U.S. 109 (1984).

Id. at 113.

Id. at 2630.

Id. at 2629.

Although the Supreme Court has not addressed whether there is reasonable expectation of privacy in electronic communications such as email or faxes, the Sixth Circuit in United States v. Warshak has extended Fourth Amendment protection to emails stored with third-party electronic communications service provider. The court held that the reasonable expectation of privacy for communication via telephone and postal mail, recognized by the Supreme Court respectively in Katz and Jacobsen, extends to emails stored with third parties, bringing stored emails within the protection of the Fourth Amendment. In Warshak, the court addressed whether law enforcement officers violated the defendant's Fourth Amendment rights by obtaining the content of the defendant's emails from his internet service provider without a warrant. In analyzing the issue and reaching its decision, the Warshak court reasoned that emails are analogous to phone calls and letters, and an internet service provider the functional equivalent of a post office or telephone company, thereby entitling email communications to the same strong Fourth Amendment protections traditionally afforded to telephone and letter communications. The court emphasized that the police cannot intercept a letter without a warrant even after that letter has been handed over to third parties intermediaries such as mail carriers for delivery. The court found the same to be true of phone calls, which must be transmitted through a service provider, who has the capacity to monitor and record the calls."Given the fundamental similarities between email and traditional forms of communication, it would defy common sense to afford emails lesser Fourth Amendment protection." Based on this analysis, the court held that "a subscriber enjoys a reasonable expectation of privacy in the contents of emails 'that are stored with, or sent or received through, a commercial [internet service provider].'" The government may not compel a commercial internet service provider to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because the government failed to obtain a warrant, its agents violated the Fourth Amendment when they obtained the contents of the defendant's emails.The court also observed that "the mere ability of a third-party intermediary to access the contents of a communication cannot be sufficient to extinguish a reasonable expectation of privacy."

631 F.3d 266, 282-88 (6th Cir. 2010).

Id. at 285-87 (citing Katz, 389 U.S. at 352, and Jacobsen, 466 U.S. at 113).

Id. (discussing Katz, 389 U.S. at 352-53 and Ex Parte Jackson, 96 U.S. 727, 733 (1877)).

Id. at 285 (citing Ex Parte Jackson, 96 U.S. at 733).

Id. (citing Katz, 389 U.S. at 352).

Id. at 285-86.

Id. at 288.

Id.

Id.

Id. at 286 (emphasis in original).

The Court finds the rationale set forth in Warshak persuasive and therefore holds that an individual has a reasonable expectation of privacy in emails or faxes stored with, sent to, or received thorough an electronic communications service provider. Accordingly, the Fourth Amendment protections, including a warrant "particularly describing" the places to be searched and communications to be seized, apply to a search warrant seeking such communications. A warrant seeking stored electronic communications such as emails or faxes therefore should be subject to the same basic requirements of any search warrant: it must be based on probable cause, meet particularity requirements, be reasonable in nature of breadth, and be supported by the affidavit.

C. Fourth Amendment Requirements

Having determined that the Fourth Amendment protections apply to warrants seeking emails or faxes stored with an electronic communications service provider, the Court next determines whether the warrants proposed by the Government meet the particularity and breadth standards imposed by the Fourth Amendment.

The warrant clause of the Fourth Amendment commands that "no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched and the persons or things to be seized." The search warrant probable cause and particularity requirements serve two constitutional protections:

First, the magistrate's scrutiny is intended to eliminate altogether searches not based on probable cause. The premise here is that any intrusion in the way of search or seizure is an evil, so that no intrusion at all is justified without a careful prior determination of necessity. The second, distinct objective is that those searches deemed necessary should be as limited as possible. Here, the specific evil is the "general warrant" abhorred by the colonists, and the problem is not that of intrusion per se, but of a general, exploratory rummaging in a person's belongings. The warrant accomplishes this second objective by requiring a "particular description" of the things to be seized.

Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971) (citations omitted).

Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971) (citations omitted).

The Fourth Amendment thus categorically prohibits the issuance of any warrant except one particularly describing (1) the place to be searched, and (2) the persons or things (or in this case electronic communications) to be seized. The particularity requirement first mandates that warrants describe with particularity the place to be searched. "The test for determining the adequacy of the description of the location to be searched is whether the description is sufficient 'to enable the executing officer to locate and identify the premises with reasonable effort, and whether there is any reasonable probability that another premise might be mistakenly searched.'" In the digital realm, whether a description of a place to be searched is sufficiently particular is a complicated question because of the differences between the physical and digital worlds.

United States v. Lora-Solano, 330 F.3d 1288, 1293 (10th Cir. 2003) (quoting United States v. Pervaz, 118 F.3d 1, 9 (1st Cir. 1997)).

Nichole Friess, When Rummaging Goes Digital: Fourth Amendment Particularity and Stored E-Mail Surveillance, 90 Neb. L. Rev. 971, 987 (2012).

The manifest purpose of the Fourth Amendment particularity requirement is to prevent general searches. By limiting the authorization to search the specific areas and things for which there is probable cause to search, the particularity requirement ensures that the search will be carefully tailored to its justifications, and will not become a wide-ranging, exploratory search the Fourth Amendment prohibits. Thus, the scope of a lawful search is:

Maryland v. Garrison, 480 U.S. 79, 84 (1987).

Id.

defined by the object of the search and the places in which there is probable cause to believe that it may be found. Just as probable cause to believe that a stolen lawnmower may be found in a garage will not support a warrant to search an upstairs bedroom, probable cause to believe that undocumented aliens are being transported in a van will not justify a warrantless search of a suitcase.

The purpose of the particularity requirement is not however limited to the prevention of general searches. A particular warrant also provides assurances to the individual whose property is searched or seized of the lawful authority of the executing officer, the officer's need to search, and the limits of the officer's power to search.

Id. at 84-85.

Id. at 84-85.

Groh v. Ramirez, 540 U.S. 551, 561 (2004).

Id. (citations omitted).

In addition to the places to be searched, the warrant must also describe the things to be seized with sufficient particularity. This is to avoid a "general exploratory rummaging of a person's belongings," and was included in the Fourth Amendment as a response to the evils of general warrants. First, the description of the things to be seized must be "confined in scope to particularly described evidence relating to a specific crime for which there is demonstrated probable cause." Second, a warrant must describe the things to be seized with sufficiently precise language so that it informs the officers how to separate the items that are properly subject to seizure from those that are irrelevant. This has been stated another way: "As to what is to be taken, nothing is left to the discretion of the officer executing the warrant." A warrant is overly broad if it does not contain sufficiently particularized language that creates a nexus between the suspected crime and the things to be seized.

United States v. Campos, 221 F.3d 1143, 1147 (10th Cir. 2000).

Mink v. Knox, 613 F.3d 995, 1010 (10th Cir. 2010).

See Davis v. Gracey, 111 F.3d 1472, 1478-79 (10th Cir. 1997) ("We ask two questions: did the warrant tell the officers how to separate the items subject to seizure from irrelevant items, and were the objects seized within the category described in the warrant?").

Marron v. United States, 275 U.S. 192, 196 (1927).

Campos, 221 F.3d at 1147.

In United States v. Leary, the Tenth Circuit set out the general standard for evaluating when the Fourth Amendment's particularity requirement for things to be seized has been met:

846 F.2d 592, 600 (10th Cir.1988).

A description is sufficiently particular when it enables the searcher to reasonably ascertain and identify the things authorized to be seized. Even a warrant that describes the items to be seized in broad or generic terms may be valid when the description is as specific as the circumstances and the nature of the activity under investigation permit. However, the fourth amendment requires that the government describe the items to be seized with as much specificity as the government's knowledge and circumstances allow, and warrants are conclusively invalidated by their substantial failure to specify as nearly as possible the distinguishing characteristics of the goods to be seized.

Id. at 600 (internal quotations and citations omitted).

Id. at 600 (internal quotations and citations omitted).

In United States v. Carey, the Tenth Circuit applied the particularity requirement to a warrant authorizing the search of computer files. The court noted that comparing computers to closed containers or file cabinets may be inadequate and lead to oversimplification of a complex area of Fourth Amendment doctrines by ignoring the realities of massive modern computer storage. "Since electronic storage is likely to contain a greater quantity and variety of information than any previous storage method, computers make tempting targets in searches for incriminating information." It proposed that a court could alternatively acknowledge that computers often contain "intermingled documents." Under this "intermingled documents" approach, law enforcement must engage in the intermediate step of sorting various types of documents and then only search the ones specified in a warrant. The court stated that the magistrate judge should then require officers to specify in a warrant which type of files are sought.

172 F.3d 1268, 1275 (10th Cir. 1999).

Id. (citing Raphael Winick, Searches and Seizures of Computers & Computer Data, 8 Harv. J.L. & Tech. 75, 104 (1994)).

Id.

Id.

In United States v. Otero, the Tenth Circuit recognized that the Fourth Amendment's warrant particularity requirement has increased importance with respect to electronically stored information.

563 F.3d 1127, 1132 (10th Cir. 2009).

The modern development of the personal computer and its ability to store and intermingle a huge array of one's personal papers in a single place increases law
enforcement's ability to conduct a wide-ranging search into a person's private affairs, and accordingly makes the particularity requirement that much more important. Because of this, our case law requires that "warrants for computer searches must affirmatively limit the search to evidence of specific federal crimes or specific types of material."

In Otero, the defendant, a former postal carrier, was indicted for offenses in connection with alleged theft of credit cards, personal identification numbers, and billing statements from residents along her delivery route. The government obtained a search warrant for her residence. The warrant contained two subsections: "Items to be Seized" and "Computer Items to be Seized." Each paragraph under the first section limited the search to evidence of specific crimes or evidence pertaining to specific persons along defendant's delivery route. Each paragraph under the second section, however, had no limiting instruction whatsoever. The court found that reading the computer-items sections of the warrant alone, they each authorize a search and seizure of "[a]ny and all" information, data, devices, programs, and other materials and there was no explicit or even implicit incorporation of the limitations of the first section. The computer-related paragraphs did not even refer to the rest of the warrant. The court concluded that the presence of limitations in the first section but absence in the second suggested that the computer searches were not subject to those limitations. The court further rejected the government's argument that under a natural reading of the warrant the portion authorizing the computer search was limited to information pertaining to the alleged mail fraud and credit card theft. It concluded that the paragraphs of the warrant authorizing the computer search were subject to no affirmative limitations. Recognizing that "practical accuracy rather than technical precision controls the determination of whether a search warrant adequately describes the place to be searched," the Tenth Circuit concluded that the warrant failed to describe the items to be seized with either "technical precision" or "practical accuracy," because the section of the warrant pertaining to seizure of the computer items did not limit the search to evidence of specific crimes or to specific persons on the defendant's delivery route.

Id. (quoting United States v. Riccardi, 405 F.3d 852, 862 (10th Cir. 2005)) (emphasis in original).

Id. (quoting United States v. Riccardi, 405 F.3d 852, 862 (10th Cir. 2005)) (emphasis in original).

Id. at 1132.

Id. at 1133.

Id.

Id.

Id.

Id. at 1132.

III. Whether the Proposed Search Warrants Comport with the Fourth Amendment

Although there are many cases addressing the Fourth Amendment's particularity requirements as to computer searches, there is little guidance on the particularity that should be applied to search warrants seeking email or fax communications stored in an account provided by an electronic communications service provider. Due to the sealed nature of applications for search warrants, few reported opinions exist addressing the factors or standards that should be used in determining whether search warrants seeking electronic communications—such as email accounts or fax accounts from electronic communication service providers—are sufficiently particular under the Fourth Amendment.

The Court was able to locate only a few cases involving a search warrant served on an electronic communications service provider for the contents of an email account. In all three cases, the defendants argued that the warrants authorizing the searches of the email accounts lacked sufficient particularity in describing the items to be seized, and in all three cases the courts denied the respective motion to suppress on those grounds. All the courts further agreed that the Fourth Amendment does not require executing authorities to delegate a pre-screening function to the electronic communications service provider or to ascertain which emails are relevant before copies are obtained from the electronic communications service provider for subsequent searching. This Court does not disagree with those cases with respect to the their statement that the Fourth Amendment does not require the government to delegate a pre-screening function to the electronic communications service provider to ascertain which electronic communications are relevant before obtaining them. The Court, however, does disagree with those cases to the extent that they find the warrants were not overly broad in their authorization for the electronic communications service provider to disclose the content of all emails and other account-related information without limitation.

See United States v. Taylor, 764 F. Supp. 2d 230, 236-37 (D. Me. 2011); United States v. Bickle, No. 2:10-cr-00565-RLH-PAL, 2011 WL 3798225, at *13 (D. Nev. July 21, 2011); United States v. Bowen, 689 F.Supp.2d 675, 682 (S.D.N.Y. 2010).

In Bickle, 2011 WL 3798225, at *13, however, the court granted the motion to suppress as to information or emails sent, received, drafted or stored in in email account before March 1, 2009.

Taylor, 764 F. Supp. 2d at 237; Bickle, 2011 WL 3798225, at *20; Bowen, 689 F.Supp. 2d at 682.

As to the current pending applications, the Court finds that the warrants proposed by the government violate the Fourth Amendment. First, the initial section of the warrants authorizing the electronic communications service provider to disclose all email or fax communications (including all content of the communications), all records and other information regarding the account is too broad and too general. The warrants fail to set any limits on the email or fax communications and information that the electronic communications service provider is to disclose to the government, but instead requires the electronic communications service provider to disclose all email or fax communications in their entirety and all information about the account without restriction. Most troubling is that these sections of the warrants fail to limit the universe of electronic communications and information to be turned over to the government to the specific crimes being investigated. Second, even if the Court were to allow a warrant with a broad authorization for the content of all email and fax communications without a nexus to the specific crimes being investigated, the warrants would still not pass Constitutional muster. They fail to set out any limits on the government's review of the potentially large amount of electronic communications and information obtained from the electronic communications service providers. The warrants also not identify any sorting or filtering procedures for electronic communications and information that are not relevant and do not fall within the scope of the government's probable cause statement, or that contain attorney-client privileged information. In Bickle,the search warrant seeking the content of all emails sent to or from the defendant's Hotmail email account was supported by an affidavit that set out the government's filtering procedure for emails containing privileged communications.

2011 WL 3798225, at *2 (the affidavit in support of the search warrant seeking all communications made or received via defendant's email account provided that a filter agent would be assigned to review and remove any potentially privileged materials).

Although the sections of the search warrants authorizing the government-authorized review of the information provided by the electronic communications service provider are sufficiently particular in that they link the information to be seized to the alleged crimes, the sections requiring the initial disclosure by the electronic communications service provider under 18 U.S.C. § 2703 are not. They fail to create a nexus between the suspected crime and the email or fax communications and related account information to be obtained and searched. The warrants order the electronic communications service provider to disclose the content of all communications associated with the account, including deleted communications, as well as all records and information regarding identification of the email or fax account, and other information stored by the account user, including address books, contact lists, calendar data, pictures and files. Email accounts likely contain large numbers of emails and files unrelated to the alleged crimes being investigated or for which the government has no probable cause to search and seize. The government simply has not shown probable cause to search the contents of all emails ever sent to or from the account or for all the information requested from Yahoo! or to search the contents of all faxes and other electronic communications associated with the account from UnityFax. The government thus has not shown probable cause for the breadth of the warrants sought here. The warrants also fail to set any limits on the universe of information to be disclosed to and searched by the government, such as limiting the disclosure and search to information relating to a specific crimes being investigated and for which the government has demonstrated probable cause to search. The Court finds the breadth of the information sought by the government's search warrant for the either the fax or email account—including the content of every email or fax sent to or from the accounts—is best analogized to a warrant asking the post office to provide copies of all mail ever sent by or delivered to a certain address so that the government can open and read all the mail to find out whether it constitutes fruits, evidence or instrumentality of a crime. The Fourth Amendment would not allow such a warrant. The Fourth Amendment should therefore not permit a similarly overly broad warrant just because the information sought is electronic communications versus paper ones.

Even had the government shown probable cause for the electronic communications service provider to disclose the content of all email or fax communications and information connected to the target email account, the Court is concerned by the lack of any limits on the government's review of the information, such as filtering procedures for emails, faxes, and information that do not fall within the scope of probable cause or contain attorney-client privileged communications. Under the government's proposed warrant to Yahoo!, a government-agent would be authorized to review the content of all the emails ever sent or received on the email account among a host of other information provided by the electronic communications service provider. Likewise, the UnityFax warrant would permit a government-authorized person to review the content of all fax communications ever sent or received to that account. While the government's enforcement purposes should not be hindered, there must be an appropriate balance between allowing law enforcement to do its job effectively and protecting the Fourth Amendment rights of those being investigated. The warrants as currently proposed give the government virtual carte blanche to review the content of all electronic communications associated with the accounts and fail to adequately limit the discretion of the government-authorized agents executing the warrants. The lack in the warrant of any limitations on the government's review of the content of all email or fax communications obtained from the electronic communications service providers is in violation of the Fourth Amendment.

The government has provided a memorandum addressing the Court's concerns regarding applications requesting warrants pursuant to 18 U.S.C. § 2703 to search the contents of email accounts. The government argues that nothing in Section 2703 or Fed. R. Crim. P. 41 precludes it from requesting the full content of a specified email account to permit its agent to search for the electronically stored information that is subject to seizure. While nothing in Section 2703 or Fed. R. Crim. P. 41 may specifically preclude the government from requesting the full content of electronic communications in a specific email or fax account, the Fourth Amendment does.

The government maintains that its agent should be permitted to briefly peruse all the emails in the target email account and all of the faxes in the target fax account with no specific search protocols required. It argues that the Fourth Amendment does not require warrants to contain search protocols. It points out that the Tenth Circuit has stated that it has "never required warrants to contain particularized computer search strategy. We have simply held that officers must describe with particularity the objects of their search."

United States v. Brooks, 427 F.3d 1246, 1251 (10th Cir. 2005).

The Court agrees with the government that the Tenth Circuit has not required particularized computer search strategy—at least in warrants authorizing searches of computers. The Tenth Circuit has not spoken on the issue of whether warrants such as the ones sought here— authorizing an electronic communications service provider to disclose the content of all electronic communications—require a description of the search protocol or some other limit on the government's search of that information. The Tenth Circuit has however suggested an approach for an "intermingled documents," in which law enforcement engage in the intermediate step of sorting various types of documents and then only search the ones specified in a warrant. Under this approach, "the magistrate judge should then require officers to specify in a warrant [the] type of files [that are being] sought." The Court is not suggesting that the warrants must have a particularized search strategy or even identify by certain key word searches the electronic communications that will be reviewed by the government, only that the warrants must contain some limits on the government's search of the electronic communications and information obtained from the electronic communications service provider. To comport with the Fourth Amendment, the warrants must contain sufficient limits or boundaries so that the government-authorized agent reviewing the communications can ascertain which email and fax communications and information the agent is authorized to review.

Id.

The Court leaves the suggestion of an appropriate procedural safeguard up to the government. While not endorsing or suggesting any particular safeguard, some possible options would be asking the electronic communications service provider to provide specific limited information such as emails or faxes containing certain key words or emails sent to/from certain recipients, appointing a special master with authority to hire an independent vendor to use computerized search techniques to review the information for relevance and privilege, or setting up a filter group or taint-team to review the information for relevance and privilege.

The Sedona Conference® Best Practices Commentary on the Use of Search and Information Retrieval Methods in E-Discovery, 8 Sedona Conf. J. 189, 210 (2007).
--------

IT IS THEREFORE ORDERED that the Applications for Search Warrant are DENIED without prejudice. The government may resubmit applications for the requested search warrants, but any such applications should be limited as set forth in this Memorandum and Order.

IT IS SO ORDERED.

Dated in Kansas City, Kansas on this 21st day in September, 2012.

________________________

David J. Waxse

U.S. Magistrate Judge


Summaries of

In re Search Warrants for Info. Associated with Target Email Address

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS
Sep 21, 2012
Case No. 12-MJ-8119-DJW (D. Kan. Sep. 21, 2012)
Case details for

In re Search Warrants for Info. Associated with Target Email Address

Case Details

Full title:IN THE MATTER OF APPLICATIONS FOR SEARCH WARRANTS FOR INFORMATION…

Court:UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Date published: Sep 21, 2012

Citations

Case No. 12-MJ-8119-DJW (D. Kan. Sep. 21, 2012)

Citing Cases

United States v. Scully

This is unconstitutional because "[t]he government simply has not shown probable cause to search the contents…

In re Three Hotmail Email Accounts: [Redacted]@hotmail.Com [Redacted]@hotmail.Com [Redacted]@hotmail.Com

Outsiders wondered if this was the beginning of a "magistrates' revolt."In re Applications for Search…