Opinion
1:18-cr-00068-DAD-BAM
09-14-2022
(Doc. No. 55)
ORDER DENYING DEFENDANT MAGANA'S MOTION TO SUPPRESS
This matter is before the court on defendant Ramon DeJesus Magana's motion to suppress all evidence obtained by the government as a result of its search of his cellular telephone, including data that recovered from that cell phone approximately two years after it was first seized by law enforcement during a traffic stop of defendant. (Doc. No. 55.) Defendant filed the pending motion on May 13, 2022 pursuant to Federal Rules of Criminal Procedure 12 and 41(g) and the Fourth Amendment of the Unites States Constitution. (Id. at 6.) The government filed an opposition to that motion to suppress evidence on July 5, 2022 (Doc. No. 61), and defendant filed his reply thereto on August 12, 2022 (Doc. No. 64).
A hearing on defendant's motion was held on August 15, 2022, at which Assistant Federal Defender Reed Grantham appeared on behalf of defendant Magana and Assistant United States Attorney Jessica Massey appeared on behalf of the government. (Doc. No. 65.) At the conclusion of the hearing, the court took defendant's pending motion under submission. For the reasons set forth below, the court will deny defendant's motion to suppress evidence.
BACKGROUND
The facts pertinent to the pending motion are not in dispute. Defendant was arrested during a traffic stop on February 21, 2018 in connection with an undercover operation conducted by the Drug Enforcement Agency (DEA) and other agencies. (Doc. No. 55 at 7-8.) During the traffic stop, officers searched the vehicle in which defendant was a passenger and recovered five kilograms of fentanyl and one kilogram of 4-ANPP, an analog to fentanyl, in the trunk. (Id. at 8; Doc. No. 55-1 at 6.) Officers also found four electronic devices in the vehicle-three cellular telephones and one iPad. (Doc. No. 55 at 8.) One of the electronic devices was a black LG cellular telephone with a black protective cover located in the front passenger seat where defendant was sitting, and which was identified as “N-3” in the DEA's property seizure report. (Id.) Defendant Magana, along with the driver of the vehicle, co-defendant Maurillo Serrano Cardenas, were both arrested and charged by way of a federal criminal complaint on March 8, 2018, with conspiracy to distribute fentanyl in violation of 21 U.S.C. §§ 846, 841(a)(1), 841(b)(1)(A). (Doc. No. 1.) A federal indictment later was later returned by the grand jury for this district on April 5, 2018, charging co-defendants Cardenas and Magana in Count 1 with conspiracy to distribute fentanyl and aiding and abetting, in violation of 21 U.S.C. §§ 846, 841(a)(1), 841(b)(1)(A), and 18 U.S.C. § 2; and in Count 2 with possession of fentanyl with intent to distribute and aiding and abetting, in violation of 21 U.S.C. §§ 841(a)(1), 841(b)(1)(A), and 18 U.S.C. § 2. (Doc. No. 13.)
Defendant Cardenas is currently scheduled to appear before the court for a change of plea hearing on September 26, 2022, pursuant to a plea agreement filed on the court's docket on March 16, 2022. (Doc. Nos. 46, 59.) Defendant Cardenas has not joined in the pending motion to suppress evidence.
On the same day the indictment was returned, the government applied for and obtained a search warrant authorizing agents to search the four electronic devices that had been recovered during the February 21, 2018 traffic stop (the “first search warrant”). (Doc. Nos. 55 at 8; 55-1 at 36-41.) This first search warrant “authorize[d] the search and forensic examination of [] electronic devices . . . for the purposes of identifying the electronically stored information described” and was to be executed on or before April 19, 2018 (i.e., execution was not to exceed 14 days from the signing of the search warrant). (Doc. No. 55-1 at 36-41.) The first search warrant further stated in its Attachment B describing the items to be seized under the heading “nature of examination” that “[p]ursuant to Fed. R. Crim. P. Rule 41(e)(2)(B) . . . this warrant permits the examination of [the four electronic devices seized on February 21, 2018] . . . [and] may require authorities to employ techniques, including but not limited to computer-assisted scans of the entire medium . . . .” (Id. at 40.) On April 9, 2018, all four of the seized electronic devices were searched, and logical extractions created, but the extraction report for device N-3 contained no data. (Id. at 9.) The government has conceded, however, that it never filed a return of the first search warrant so reflecting with the court. (Doc. No. 61 at 7.)
More specifically, “[a] data extraction was conducted on the SIM card” for N-3, but the extraction could not access any of the information sought by the first search warrant, such as contacts, call logs, audio recordings, text messages, photos, videos, GPS information, internet browsing history, and so on. (Doc. No. 55-1 at 39, 58.)
Approximately one year later, on March 27, 2019, the government applied for and obtained a second search warrant to search N-3 and another cellular telephone (N-2) (the “second search warrant”). (Doc. No. 55 at 9.) In the government's application for this second search warrant, it stated that the first search warrant had been executed on four electronic devices on April 9, 2018, but that the data extracted from two of those devices, N-3 and N-2, “reported minimal information” because the search “was limited by the technology available.” (Doc. No. 55-1 at 58.) The government reported it was seeking the second search warrant “[d]ue to the advanced software and technology now available” and because the government “believe[d] that a search today may be more successful at extracting evidence than on April 9, 2018.” (Id.) Like the first search warrant, the second search warrant was to be executed within 14 days of its issuance and sought the search for and seizure of the same categories of information, which were to be obtained “[p]ursuant to Fed. R. Crim. P. Rule 41(e)(2)(B).” (Id. at 88, 92.) In the affidavit submitted in support of the application for the second search warrant-and in contrast to the affidavit submitted in seeking the first search warrant-the issuing magistrate judge interlineated in handwriting the following language: “If an original device does not contain any data falling within the list of items to be seized pursuant to this warrant, the government will return the original device to its owner within 90 days if it can be lawfully possessed; seal any image made and not review sealed image.” (Id. at 65.) After the second search warrant was issued on March 27, 2019, it was purportedly executed on April 1, 2019 at the DEA's Sacramento district office, however, again no additional data or information was successfully extracted from N-3. (See Doc. Nos. 55 at 10-12; 61 at 8.)
The undersigned notes that this interlineation by the issuing magistrate judge was made on the affidavit in support of the issuance of the requested search warrant and not on the search warrant itself.
There is a dispute between the parties regarding what it means for the second search warrant to have been “executed” and when the execution of that warrant occurred. (Doc. Nos. 61 at 9-11; 64 at 3-5.) This legal question will be addressed in the court's analysis below.
Over seven months later, on November 25, 2019, a DEA agent indicated in a report of the investigation that the “case remains open pending the service of a search warrant on [] N-3, which is a cellular telephone with a lock feature that is yet to be disabled” but that there were “continuing efforts to gain access to [] N-3 and perform the search.” (Doc. No. 55-1 at 75.) Finally, in a subsequent DEA report of the investigation dated April 24, 2020, a DEA agent reported that in “[e]arly 2020 . . . an updated software [became] available for the phone data transfer device” and that on April 7, 2020, DEA Investigative Technology Specialist (ITS) Jeremy Look “successfully downloaded the phone data from [] N-3.” (Id. at 76.) The extracted data from N-3 was later produced to defendant's counsel in discovery on July 1, 2020. (Doc. No. 55-1 at 78.) According to the government's opposition to the pending motion, defendant Magana's cellular telephone, N-3, has remained in the custody of the DEA since its initial seizure on February 21, 2018, but the government again never filed a return following the execution of the second search warrant, even after the successful extraction of data from N-3 occurred on April 7, 2020. (Doc. No. 61 at 6, 8.)
Defendant Magana has moved to suppress all evidence obtained as a result of the purportedly unlawful search of his cell phone (N-3), specifically the evidence derived from the successful April 7, 2020 extraction of data from N-3. (Doc. No. 55.)
ANALYSIS
Defendant Magana makes two principal arguments in moving to suppress all evidence recovered from N-3: (1) the government's execution of the second search warrant violated the warrant's terms by not being conducted within 14 days of its issuance, which thereby rendered the search conducted on April 7, 2020, a warrantless search; and (2) the government's retention of N-3 for over two years violated the terms of both search warrants and was unreasonable in violation of the Fourth Amendment to the United States Constitution.
A. The Timeliness of the Government's Execution of the Second Search Warrant
Federal Rule of Criminal Procedure 41(e) generally requires that a warrant to search for and seize property must direct law enforcement officers to “execute the warrant with a specified time no longer than 14 days.” Fed. R. Crim. P. 41(e)(2)(A)(i). Rule 41(e) also provides that a warrant “may authorize the seizure of electronic storage media or the seizure or copying of electronically stored information.” Fed. R. Crim. P. 41(e)(2)(B). In such cases, “[u]nless otherwise specified, the warrant authorizes a later review of the media or information consistent with the warrant” because “[t]he time for executing the warrant . . . refers to the seizure or on-site copying of the media or information, and not to any later off-site copying or review.” Id.; see also United States v. Cleveland, 907 F.3d 423, 431 (6th Cir. 2018) (holding that “under Rule 41, an execution period specified in a warrant applies to the time to seize the device or to conduct onsite copying of information from the device” and that the execution period deadline “does not apply to the time to analyze and investigate the contents of the device off-site”). “This rule acknowledges the need for a two-step process: officers may seize or copy the entire storage medium and review it later to determine what electronically stored information falls within the scope of the warrant.” Fed. R. Crim. P. 41(e)(2)(B), advisory committee's note to 2009 amendment. As the advisory committee further explained, “[a] substantial amount of time can be involved in the forensic imaging and review of information” due to “the sheer size of the storage capacity of media, difficulties created by encryption and booby traps, and the workload of the computer labs.” Id.
The parties disagree regarding precisely when the second search warrant was executed here. (See Doc. Nos. 55 at 11-14; 61 at 9-15.) While defendant argues the government had only 14 days from the date the second search warrant was issued to complete its search of N-3, the government maintains that it merely needed to “seize” N-3 within the 14 days and was permitted to conduct a later review of its data pursuant to Rule 41(e)(2)(B). (See Doc. Nos. 55 at 11-14; 61 at 9-15.) The government's position is that it seized N-3-a device already in its custody at the time-and executed the second search warrant by making an attempt to extract date from that cell phone on April 1, 2019, five days after the warrant was issued, and that the year-later successful extraction of data was permissible under Rule 41(e)(2)(B). (See Doc. No. 61 at 9-15.) In his reply, defendant contends that the government's argument is “misplaced because the [second] search warrant itself-and not Rule 41-governed the timing of the search.” (Doc. No. 64 at 1.) Specifically, defendant contends that the language appearing in the second search warrant, its application, the DEA reports of investigation, and the DEA declarations filed in support of the government opposition all “establish” that the second search warrant only authorized the government to complete its “search” or “examination” of a device within 14 days of the issuance of that warrant. (Id. at 3-7.)
The court concludes that the government did not violate the terms of the second search warrant by conducting the data extraction from N-3 outside the 14-day time period specified in that warrant because “[t]he time for executing the warrant . . . refers to the seizure or on-site copying of the media or information.” Fed. R. Crim. P. 41(e)(2)(B). Here, the second search warrant was timely executed because “the electronically stored information [wa]s seized and brought within the government's control” as a result of the government's already existing custody of N-3. See United States v. Carrington, 700 Fed.Appx. 224, 232 (4th Cir. 2017) (“[A]n initial seizure of [defendant's] telephone after the 14-day expiration period would have contravened the terms of the warrant-but that is not what happened here, where the phone already was in government custody pursuant to a lawful seizure.”); see also United States v. Estime, No. 19-cr-711-NSR, 2020 WL 6075554, at *14 (S.D.N.Y. Oct. 14, 2020) (“Accordingly, this Court agrees with the majority of courts that, under Rule 41(e)(2)(B), a search warrant for ESI is executed through ‘the seizure . . . of the media' which is accomplished when the physical storage device is in the custody of the government.”); United States v. Sosa, 379 F.Supp.3d 217, 222 (S.D.N.Y. 2019) (rejecting the argument that a search warrant for a cellular telephone was not “executed” before the warrant's 14-day deadline when it had remained in the government's possession since its original seizure incident to arrest and the cellular telephone's data was not extracted until after the 14-day period). Even if some action was required to be taken by the government within 14 days of the issuance of the warrant to “seize” a cellular telephone that was already in its custody, and thus to “execute” the second search warrant under Rule 41(e)(2)(B), that action occurred within 14 days of the issuance of the second search warrant. Although defendant contends that “it remains unclear what precisely occurred with the device on April 1, 2019,” the exhibits attached to the government's opposition reflect that N-3 was-at the very least-transferred to DEA Investigative Technology Specialist (ITS) Jeremy Look on April 1, 2019 for the purposes of conducting a “Cellebrite Mobile Device Extraction,” and that an attempt to extract data from N-3 ///// ///// was made that same day by ITS Look. (Doc. Nos. 61-1 at 2, 7, 14, 17; 55-1 at 73-74, 97.) In other words, even if the government's continuing custody of N-3 alone was insufficient to constitute the “execution” of the second search warrant, then the government's showing summarized above is sufficient to establish that the second search warrant was executed no later than on April 1, 2019, within 14 days of its issuance. See Cleveland, 907 F.3d at 431 (finding that the execution of a warrant authorizing the search of a cellular telephone that was already in law enforcement custody “occurred when the cell phone was removed from its location and shipped to the analytics laboratory”); see also Estime, 2020 WL 6075554, at *14 (finding that a “seizure” under Rule 41(e)(2)(B) is “accomplished when the physical storage device is in the custody of the government”).
Defendant Magana does not challenge the government's February 21, 2018 seizure of his cellular telephone. Moreover, the court's analysis focuses only on the second search warrant because defendant Magana does not appear to contend that that the first search warrant was not timely executed. (See Doc. No. 55 at 11-14.)
Citation to this unpublished Fourth Circuit opinion is appropriate pursuant to Fourth Circuit Local Rule 32.1.
In another context, defendant refers to what took place on this date as the “April 1, 2019 search.” (Doc. No. 55 at 20.)
Defendant points to the fact that a November 25, 2019 DEA report of investigation stated that the “case remains open pending the service of a search warrant ” as evidence that the second search warrant went unexecuted within the 14-day time period. (Doc. No. 64 at 5-6) (emphasis added). However, the author of that November 25, 2019 report submitted a corrected report and a declaration in support of the government's opposition stating that he had misunderstood the status of the second search warrant when he wrote his November 25, 2019 report and at the time “had recently been assigned the case.” (Doc. No. 61-1 at 5, 19.) Moreover, an earlier August 1, 2019 report, authored by the special agent who actually transferred N-3 to ITS Look for the Cellebrite extraction, had written that the second search warrant was “executed” on April 1, 2019. (See Doc. No. 55-1 at 73-74.)
It is true that the attempt to extract data on April 1, 2019 is not clearly documented by way of any declaration of ITS Look, but the government has represented that because ITS Look unexpectedly passed away in 2021, no such declaration could be offered. (Doc. No. 61 at 8 n.3.) Nevertheless, the government has submitted the following documents in support of its opposition evidencing that an attempt to extract data from N-3 did occur on April 1, 2019: a property receipt reflecting that ITS Look received N-3 on April 1, 2019; the final extraction report as to N-3 reflecting a time/date of April 1, 2019, indicating that N-3 was turned on or otherwise accessed in some manner on that date; and a declaration from Special Agent Trang Le, who transferred the phone to ITS Look, stating that ITS Look “executed the Second Search Warrant on April 1, 2019, by plugging the device into a phone data transfer device.” (Doc. No. 61-1 at 14, 17, 23.)
Moreover, defendant's contention that the second search warrant-and its requirement of execution within 14-days of its issuance-referred only to completing a search of, and not the seizing of, N-3 is not supported by a review of the second search warrant. (See Doc. Nos. 55 at 13-14; 64 at 2-5); see also Fed. R. Crim. P. 41(e)(2)(B) (“ Unless otherwise specified, the warrant authorizes a later review of the media or information consistent with the warrant.”) (emphasis added). Here, there was simply no time limit imposed by on the executing agents by the issuing magistrate judge for the completion of an off-site review of the electronically stored information that had been seized. Cf. United States v. Nicholson, 24 F.4th 1341, 1351-52 (11th Cir. 2022) (concluding that the government's negligent violation of an “addendum appended to the warrant that required that any search of electronic media be completed within sixty days” by waiting six months to complete its search did not require the suppression of evidence ultimately obtained because the probable cause underlying the warrant did not dissipate during any delay, the defendant was not prejudiced by the delay, and the government did not deliberately disregard the warrant's time limit), cert. denied,U.S., 142 S.Ct. 2795 (2022). In fact, the second search warrant appears to track the language of Rule 41(e)(2)(B) in stating that “[p]ursuant to Fed. R. Crim. P. Rule 41 (e)(2)(B), this warrant permits the examination of [N-3] . . . [and] may require authorities to employ techniques, including but not limited to computer-assisted scans of the entire medium” and authorized the executing agents to “search for and attempt to recover deleted, hidden, or encrypted data.” (Doc. No. 55-1 at 71-72) (emphasis added). Indeed, as the advisory committee has explained, when conducting searches for electronic data, certain obstacles such as encrypted data are among the reasons that “[a] substantial amount of time can be involved in the forensic imaging and review of information.” Fed. R. Crim. P. 41(e)(2)(B), advisory committee's note to 2009 amendment. For this reason, the advisory committee concluded that there was “no presumptive national or uniform time period within which any subsequent off-site copying or review of the media or electronically stored information would take place” after it had been seized. Id. (“[T]he practical reality is that there is no basis for a ‘one size fits all' presumptive period.”). As such, defendant's insistence that there was a 14-day time limit for the government to complete its search of N-3 for electronic data is inconsistent with the text of both the second search warrant and Rule 41(e)(2)(B).
To the extent defendant relies on the magistrate judge's interlineation on the affidavit in support of the second search warrant application, the undersigned observes that the added language, at most, imposed only a conditional limit on the government's retention of defendant's cellular telephone. (See Doc. No. 55-1 at 65) (“If an original device does not contain any data falling within the list of items to be seized pursuant to this warrant, the government will return the original device to its owner within 90 days if it can be lawfully possessed; seal any image made and not review sealed image.”) Here, the government could not access the data within N-3 to determine whether it fell within the scope of the second search warrant until April 7, 2020. (Id. at 76.) Thus, the conditional language requiring return of N-3 within 90 days could not have been triggered before that date. See Estime, 2020 WL 6075554, at *15 (finding that the government was not required to return cellular telephones despite language in the warrant requiring their return within 60 days “[i]f the Government determines that the Subject Devices are no longer necessary to retrieve and preserve the data on the devices” because the data had still not been successfully extracted from the devices and the government had made no such determination).
Accordingly, the court concludes that the second search warrant did not specify a specific deadline within which the search of N-3 for electronic data had to be completed and that the second search warrant was timely executed pursuant to Rule 41(e)(2)(B) when the government “seized” N-3 within 14 days of the issuance of the warrant on April 1, 2019.
In addition, because the court concludes that the government's transfer of the N-3 to an investigative technology specialist on April 1, 2019 for purposes of conducting a data extraction constituted an execution of the second search warrant, the court need not-and does not- determine whether the government merely continuing to keep N-3 in its custody on April 1, 2019 constituted an execution of the second search warrant.
B. The Reasonableness of the Government's Retention of Defendant's Cellular
Telephone (N-3)
Defendant next argues that the government's retention of his cellular telephone (N-3) for over two years-as counted from the initial seizure of N-3 during the traffic stop on February 21, 2018 until the successful extraction of the data from it on April 7, 2020-is unreasonable and in violation of the Fourth Amendment. (Doc. No. 64 at 7-9.) Defendant also contends that the government's retention of N-3 violated the terms of both search warrants that were issued, thus making any evidence obtained from the data search of N-3 the “fruit of the poisonous tree” and subject to suppression pursuant to the exclusionary rule. (Doc. No. 55 at 15-21.)
“The general touchstone of reasonableness which governs Fourth Amendment analysis . . . governs the method of execution of the warrant.” United States v. Ramirez, 523 U.S. 65, 71 (1998). “[S]earches pursuant to a warrant will rarely require any deep inquiry into reasonableness, for a warrant issued by a magistrate normally suffices to establish that a law enforcement officer has acted in good faith in conducting the search.” United States v. Leon, 468 U.S. 897, 922 (1984) (internal citation and quotations omitted). Nevertheless, “[t]he reasonableness of the officer's acts both in executing the warrant and in performing a subsequent search of seized materials remains subject to judicial review.” United States v. Hill, 459 F.3d 966, 978 (9th Cir. 2006). In the context of search warrants for electronic data, “there is no established upper limit as to when the government must review seized electronic data to determine whether the evidence seized falls within the scope of a warrant.” United States v. Metter, 860 F.Supp.2d 205, 215 (E.D.N.Y. 2012); see also United States v. Schesso, 730 F.3d 1040, 1046 & n.3 (9th Cir. 2013) (upholding a search warrant as reasonable under the Fourth Amendment when it allowed for the seizure and “off-site analysis and recovery . . . of [defendant's] entire computer system and associated digital storage devices” and noting that the process is “not out of the ordinary” and is expressly contemplated by Rule 41(e)(2)(B)); United States v. Ivers, 430 Fed.Appx. 573, 575 (9th Cir. 2011) (affirming the denial of a motion to suppress despite the government's unspecified delay in searching defendant's computer and noting that “[electronic data searches may take longer than traditional searches because ‘ [electronic storage facilities intermingle data making them difficult to retrieve' without close analysis ‘in a controlled environment.'”) (quoting United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1175 (9th Cir. 2010)).
Citation to this unpublished Ninth Circuit opinion is appropriate pursuant to Ninth Circuit Rule 36-3(b).
Rule 41(e)(2)(B) also supports the conclusion that there is no established upper time limit on how long the government has to complete its search of seized electronic data:
While consideration was given to a presumptive national or uniform time period within which any subsequent off-site copying or review of the media or electronically stored information would take place, the practical reality is that there is no basis for a “one size fits all” presumptive period. A substantial amount of time can be involved in the forensic imaging and review of information. This is due to the sheer size of the storage capacity of media, difficulties created by encryption and booby traps, and the workload of the computer labs. The rule does not prevent a judge from imposing a deadline for the return of the storage media or access to the electronically stored information at the time the warrant is issued. However, to arbitrarily set a presumptive time period for the return could result in frequent petitions to the court for additional time.Fed. R. Crim. P. 41(e)(2)(B), advisory committee note to 2009 amendment; see also Schesso, 730 F.3d at 1050 (“Ultimately, the proper balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures of electronic data must be determined on a case-by-case basis.”).
Although the government's delay in completing the search of defendant's cellular telephone and extracting the data from it was significant-approximately two years-similar delays due to the government's inability to obtain access to data from electronic devices, whether due to encryption or an inability to access a locked cell phone, have been found to be reasonable under the Fourth Amendment. See, e.g., United States v. Jarman, 847 F.3d 259, 266-67 (5th Cir. 2017) (affirming denial of motion to suppress computer data seized pursuant to a search warrant when the government retained the data and took 23 months to complete its review because the government needed to conduct both a “taint process” to segregate attorney-client privileged materials and a “forensic examination”); United States v. Dixon, No. 3:20-cr-00003-TCB-RGV, 2021 WL 2327063, at *6 (N.D.Ga. Apr. 15, 2021) (“Accordingly, although the government's 24-month delay in searching the iPhone was ‘certainly lengthy,' it ‘does not furnish a basis to suppress evidence obtained from [the iPhone].'”), report and recommendation adopted, 2021 WL 1976679 (N.D.Ga. May 18, 2021); see also United States v. Morgan, 443 F.Supp.3d 405, 406 (W.D.N.Y. 2020) (denying a defendant's motion to return a locked iPhone that had been seized 22 months earlier when the government still had not been able to unlock the iPhone, concluding that “with trial not scheduled to commence until next year . . . there is still plenty of time for the government to access the iPhone's contents”); United States v. Pinto-Thomaz, 352 F.Supp.3d 287, 312 (S.D.N.Y. 2018) (denying a motion to return a locked iPhone that the government had held for 10 months without successfully extracting its data and concluding that “the Government has not exceeded any constitutional or Rule 41 deadline for concluding its search of the iPhone given the difficulties posed by encryption”). The court notes that this is a case in which the executing agents experienced delay in being able to gain access to the device's electronic data and not one in which the executing agents gained access to that data initially and merely returned to review and study the accessed data repeatedly over a lengthy period of time for evidence potentially helpful to the prosecution.
The government cites a Ninth Circuit decision for the proposition that a five-year delay in conducting a review of data extracted from a defendant's cellular telephone is permissible under the Fourth Amendment. (Doc. No. 61 at 13) (citing United States v. Johnston, 789 F.3d 934, 942 (9th Cir. 2015)). However, the decision in Johnston is inapposite here because it did not concern the length of time an electronic device was retained following the issuance of a warrant due to the government's inability to access the data within the device. Rather, in Johnston, the defendant challenged a government search that occurred five years after his computer was seized, arguing that the government was “rummaging for more offenses” beyond the scope of authority authorized by the search warrant, since the government had already searched the computer two times before and recovered evidence against the defendant. Johnston, 789 F.3d at 942. The court rejected defendant's argument, finding that the plain language of the search warrant authorized the scope of the last search of the computer that led to the discovery of evidence with respect to additional, closely related charges against defendant. See id.
Here, the government maintains that the “sole reason for the delay in downloading and reviewing the data . . . was due to the technological limitations in attempting to bypass the device's lock feature.” (Doc. No. 61 at 15.) The government's cited basis for the delay in recovering the sought after data in question has “been credited by the advisory committee when it noted that ‘[a] substantial amount of time can be involved in the forensic imaging and review of information' because of ‘difficulties created by encryption.'” Estime, 2020 WL 6075554, at *15 (quoting Fed. R. Crim. P. 41(e)(2)(B), advisory committee notes to 2009 amendment and holding that the government's retention of a still-unlocked cellular telephone for more than 10 months was not unreasonable under the Fourth Amendment); see also Sosa, 379 F.Supp.3d at 222 (finding that delays of 10 and 15 months to search cellular telephones were reasonable even though the government provided no basis for the delay in extracting data and the searches were ultimately completed only three months before defendant's trial).
In addition, defendant Magana does not allege any misconduct by the government in its review of the electronically stored information collected from N-3 such as, for example, that the government unnecessarily maintained possession of data falling outside the scope of the warrant or relied on data falling outside the scope of the warrant in its prosecution of him. See Estime, 2020 WL 6075554, at *15. Nor has defendant Magana argued that he was prejudiced in some manner by the government's lengthy retention of his cell phone (N-3), or that the probable cause underlying the search warrant became stale before the government completed its search for the data stored on N-3. See United States v. Aboshady, 951 F.3d 1, 7 (1st Cir. 2020) (“An ‘unreasonable delay' in conducting a search that had been authorized by a warrant could ‘result[ ] in the lapse of probable cause,' but there is no evidence in the record here that suffices to show that probable cause had lapsed at the time that any particular search of the data may have been conducted.”) (internal citations and footnotes omitted). Indeed, defendant Magana did not even seek the return of his cellular telephone (N-3) until after the government's successful extraction of the data from it and well after the government obtained a second search warrant based upon a showing of probable cause halfway through its two-year retention of it. (See Doc. No. 55-1 at 67.) Rather, defendant's principal argument in seeking suppression of evidence is that the government retained an unaccessed cellular telephone (N-3) for a period of time that was unreasonable under the Fourth Amendment. However, the district court decisions put forth by defendant Magana in his reply brief suggesting the government's retention of his cell phone was unreasonable are readily distinguishable from the circumstances presented in this case. (See Doc. No. 64 at 8-9.)
For instance, defendant Magana's reliance on the decision in United States v. Metter, 860 F.Supp.2d 205, 211-16 (E.D.N.Y. 2012), is misplaced because in that case the government did not have difficulty accessing the data it sought to review. Instead, the electronic data evidence was suppressed in Metter because the government never reviewed the successfully imaged data even after the passage of 15 months, and in fact, had “no plans whatsoever to begin review of that data to determine whether any irrelevant, personal information was improperly seized.” Metter, 860 F.Supp.2d at 214-15 (“The point at which the government faltered is its delay in reviewing the imaged evidence to determine whether the evidence that the government seized and imaged fell within the scope of the categories of information sought in the search warrants.”). Similarly, United States v. Nasher-Alneam, 399 F.Supp.3d 579, 593-94 (S.D. W.Va. 2019), cited by defendant, is inapplicable here. Although the government's search of electronic data in Nasher-Alneam occurred 15 months after defendant's computer was seized, that search was determined to be unlawful because it exceeded the scope of the warrant authorizing it, not due to the passage of 15 months. See id. Specifically, in that case the warrant “authorized a search of defendant's electronic data for evidence of violations of the Controlled Substances Act” but the government instead relied on that warrant to “search for evidence of healthcare billing fraud.” Id. at 594 (holding that “the government should have gotten a second warrant to conduct its search for evidence of healthcare billing fraud”). Similar to the decision in Metter, Nasher-Alneam did not concern the length of the government's retention of an unaccessed digital device containing electronic data.
The last two district court decisions cited by defendant in his reply brief are also distinguishable and do not support the suppression of evidence in this case. See, e.g., United States v. Filippi, No. 5:15-cr-133 BKS, 2015 WL 5789846, at *4 (N.D.N.Y. Sept. 9, 2015) (denying a motion to suppress where the government committed a “technical violation” of Rule 41 by searching a cellular telephone 25 days after a warrant's 60-day deadline for the government to complete its search because the court found that the search was nonetheless reasonable under the Fourth Amendment); United States v. Brunette, 76 F.Supp.2d 30, 42 (D. Me. 1999) (finding that where a search warrant imposed a specific time frame within which the government was to begin its search for electronic data but the government failed to do so, any evidence gathered from the search was to be suppressed), aff'd, 256 F.3d 14 (1st Cir. 2001). Both of these decisions are distinguishable because, unlike the search warrants in this case, the search warrants in Filippi and Brunette both imposed specific deadlines by which the government was required to complete its search of electronic devices for data and, in both cases, the government failed to follow the search warrant's explicit time limitation requirement. See Filippi, 2015 WL 5789846, at *4; Brunette, 76 F.Supp.2d at 42.
Finally, defendant Magana argues that the government unlawfully retained possession of his cellular telephone (N-3) in violation of the terms of both the first and second search warrants, thus making any evidence obtained from N-3 “fruit of the poisonous tree” and subject to suppression under the exclusionary rule. (Doc. No. 55 at 15-21.) However, the language that defendant points to is actually only found in the first search warrant and in the application to the second search warrant and, in any event, the language that defendant contends required N-3's return is conditional and the triggering condition never occurred. (See id. at 15) (“If, after conducting the initial search, law enforcement personnel determine that the devices contain any data falling within the list of items to be seized pursuant to this warrant, the government will retain the original device.”) (emphasis added); (id. at 16) (“ If an original device does not contain any data falling within the list of items to be seized pursuant to this warrant, the government will return that original device to its owner within 90 days if it can be lawfully possessed. . . .”) (emphasis added). As the government correctly points out, it could not have violated either of these provisions before it had successfully extracted the data from N-3 on April 7, 2020 because until that extraction was completed, the government could not have determined whether any of the data stored on N-3 fell within the scope of the search warrants. (Doc. No. 61 at 16-17.) Moreover, it would be disingenuous to claim that the government's initial unsuccessful attempt to extract data from N-3 in 2018 meant that the device did not “contain any data falling within the list of items to be seized pursuant to [the first search warrant].” (Doc. No. 61 at 7.) As correctly stated in the government's opposition, the DEA at that time did conduct “a logical extraction from the SIM card contained within” N-3, which “did not contain any data from the device itself.” (Id.) Defendant does not cite any persuasive legal authority supporting his argument that the government's retaining of the electronic devices was illegal and requires suppression of the electronic data evidence eventually retrieved therefrom. Indeed, it appears that defendant Magana has abandoned any such argument in his reply brief. (See Doc. Nos. 55 at 18-20; 64 at 7-9.) Accordingly, the court concludes that the government did not unlawfully retain defendant Magana's cell phone (N-3) in a manner that violated the terms of either the first or second search warrants. Thus, suppression of that evidence, as the tainted fruit of the “poisonous tree” or otherwise, is not appropriate.
The only authority that defendant relies on in support of this argument is a concurring opinion from the Ninth Circuit's decision in United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1178-80 (9th Cir. 2010) (Kozinski, C.J., concurring), but the specific language quoted from that decision, in fact, confirms the conclusion reached by the court in this case. (Doc. No. 55 at 18.) As then-Chief Judge Kozinski advised magistrate judges on issuing search warrants for electronically stored information, “[o]nce the data has been segregated . . . any remaining copies should be destroyed or, at least so long as they may be lawfully possessed by the party from whom they were seized, returned along with the actual physical medium that may have been seized (such as a hard drive or computer).” Comprehensive Drug Testing, 621 F.3d at 1179 (emphasis added). Here, no data from defendant's cell phone had even been accessed by the government until April 2020, let alone reviewed and segregated.
In the end, although the delay of approximately two years was certainly lengthy, and could be problematic under different circumstances, see, e.g., Metter, 860 F.Supp.2d at 211-16, the amount of time that passed before the data was recovered from the seized electronic device was not unreasonable under the Fourth Amendment where, as here, the sole reason for the delay was the government's inability to gain access to a locked cellular telephone and when the search was promptly completed after such access was achieved.
C. Good Faith Exception and Return of Property
The court need not reach the parties' arguments regarding the applicability of the good faith exception to exclusionary rule because the court has concluded that neither Rule 41 nor the Fourth Amendment were violated. (See Doc. Nos. 61 at 18-20; 64 at 9-12); see also Cleveland, 907 F.3d at 432 n.4 (“Because we hold that extraction of the cellular data did not violate the warrant at issue, we need not reach the parties' alternative argument regarding the good-faith exception to the exclusionary rule.”).
Moreover, although the parties have only briefly addressed the return of property aspect of defendant's pending motion, it appears given the court's conclusion that the April 7, 2020 search was lawful, the government was also permitted to retain possession of N-3 under the terms of the second search warrant because it found data falling within the list of items to be seized pursuant to the warrant. (See Doc. No. 55-1 at 72) (“If, after conducting the initial search, law enforcement personnel determine that the devices contain any data falling within the list of items to be seized pursuant to this warrant, the government will retain the original digital device . . . .”).
Accordingly, to the extent defendant's pending motion seeks the return of his cellular telephone (N-3) pursuant to Rule 41(g), the motion will also be denied.
CONCLUSION
For the reasons explained above, 1. Defendant Magana's motion to suppress (Doc. No. 55) is denied in its entirety;
2. This case is scheduled for a status conference on September 28, 2022 at 1:00 p.m.
before Magistrate Judge Barbara A. McAuliffe; and
3. The Clerk of the Court is directed to now reassign this case to U.S. District Judge Ana I. de Alba and the parties are advised that all future filings in this case shall bear the new case number of 1:18-cr-00068-ADA-BAM.
IT IS SO ORDERED.