Elawyers Elawyers
Ohio| Change

U.S. v. ALVAREZ, 14-cr-00120-EMC. (2016)

Court: District Court, N.D. California Number: infdco20160613a84 Visitors: 7
Filed: Jun. 10, 2016
Latest Update: Jun. 10, 2016
Summary: ORDER DENYING DEFENDANT REAL'S MOTION TO SUPPRESS Docket No. 627. EDWARD M. CHEN , District Judge . Defendant Rogelio Real filed a motion to suppress evidence seized during a search of Mr. Real's residence. See Docket No. 627 ("Motion"). The Court heard argument on the Motion on June 3, 2016. Having considered the parties' briefs and the arguments presented at the hearing, the Court DENIES Mr. Real's Motion to Suppress. A. Factual Background On March 11, 2014, Special Agent Alicia
More

ORDER DENYING DEFENDANT REAL'S MOTION TO SUPPRESS

Docket No. 627.

Defendant Rogelio Real filed a motion to suppress evidence seized during a search of Mr. Real's residence. See Docket No. 627 ("Motion"). The Court heard argument on the Motion on June 3, 2016. Having considered the parties' briefs and the arguments presented at the hearing, the Court DENIES Mr. Real's Motion to Suppress.

A. Factual Background

On March 11, 2014, Special Agent Alicia MacDonald of Homeland Security Investigations ("HSI") applied for a warrant to search Mr. Real's residence. Mot. at 3. A magistrate judge issued the requested search warrant that day, and the search was executed on March 12. Id.

The warrant attached a "List of Items to be Searched and/or Seized," which stated officers would seize "gang-related clothing and accessories, such as, but not including, blue bandanas and belts." Ex. A at SW-0082. The warrant also attached a "Protocol for Searching Devices or Media that Store Data Electronically." See Ex. A at SW-0083 ("Protocol"). The Protocol requires the government to "begin by ascertaining whether all of part of a search of a device or media that stores data electronically . . . can be completed at the site within a reasonable time." Id. at ¶ 1. If it cannot, "the government must determine whether all or part of the authorized search can be completed by making a mirror image of . . . the contents of the device and then completing the search of the mirror image off site." Id. at ¶ 2. If neither of these two steps is possible, then the government may remove the device in order to complete its search. Id. at ¶ 3. The government may also remove a device if "(1) removing the device is necessary to preserve evidence, or (2) the device is contraband, a forfeitable instrumentality of the crime, or fruit of crime." Id.

During the search, officers seized a blue bandana. Mot. at 3. Officers also removed electronic media and devices from the premises, including ten cellular telephones, a digital camera, and "electronic media disc[s]" which Mr. Real said was done without first attempting to search or mirror image those devices on site. Id. at 3, 6. Mr. Real also states that the Protocol required the search of his devices to be completed within 30 days, which it was not.

With its Opposition, the Government filed several declarations. In the first, Agent MacDonald states that the phrase excluding belts and bandanas from the search "was an inadvertent mistake," and "[t]he phrase should have read, `such as, but not limited to, blue bandanas and belts,' or `including, but not limited to, blue bandanas and belts.'" See Docket No. 678 ("MacDonald Affidavit") ¶ 6. Agent MacDonald also attached the wrong version of the Protocol; she intended to attach the version that allowed for a 120-day period of review rather than 30 days. Id. ¶ 8.

With regard to the search itself, Agent MacDonald states that "it would not be reasonable, and likely not even possible," to search or mirror-image all devices on-site. Id. ¶ 9. Mr. Real's residence was "considered [a] high-risk location," which "require[s] specially trained tactical teams to enter the residence." Id. Moreover, five searches were being executed at once and HSI's San Francisco office does not have enough Computer Forensic Agents ("CFA's") to conduct that many simultaneous searches. Id. Because of technical difficulties with various devices, Agent MacDonald states that CFA's find on-site searching and mirror-imaging impossible "between 80% and 90% of the time." Id. Another agent submitted a declaration explaining that he attempted to search the devices on-site, but "most, if not all of the cell phones and the digital camera had batteries that were not charged sufficiently to search the devices on site." See Docket No. 679 ¶ 4.

Agent MacDonald also states that the Government requested and received an extension of the review time. MacDonald Affidavit at ¶ 11.

B. Analysis

Mr. Real does not challenge the warrant on probable cause grounds. See generally, Mot. Instead, he argues the evidence seized following the search should be suppressed because the searching officers exceeded the scope of the warrant, id. at 8-9, and because the officers did not follow the Protocol, id. at 5-8.

1. Scope

Mr. Real argues that the blue bandana should be suppressed because it was excluded from the list of items that may be searched or seized. Mot. at 8. The Court addressed similar arguments in deciding Mr. Hernandez's motion to suppress, see Docket No. 731 ("Hernandez Order"), where it explained that officers are permitted to correct obvious errors in a warrant. See United States v. Winkler, No. 3:08-CR-14, 2008 WL 5136463, at *4 (E.D. Tenn. Dec. 4, 2008) (warrant not stale though ostensibly issued in 2006 and not acted on until 2007, where the 2006 date was a simple typo); U.S. v. Hattrick, 182 F. App'x 649 (9th Cir. 2006) (holding evidence did not need to be suppressed where the warrant's failure to include officers' authority to seize evidence was "a mere technical mistake"). For the reasons explained in the Hernandez Order, the Court concludes that the inclusion of the phrase "but not including" was obviously a typographical error (there was no reason to exclude blue bandanas and belts from seizure). The Motion to Suppress is DENIED as to the blue bandana.

2. Protocol

Mr. Real also argues that the data from electronic devices should be excluded, because the searching officers failed to follow the Protocol. Mot. at 5-8. The Government argues that the Protocol was not violated, Opp. at 6-7, and that a violation of the Protocol would not amount to constitutional error, id. at 8.

With regard to the time it took to search the devices, the Court agrees with the Government. The Government appears to have properly requested an extension of the time allotted for searching the devices after they were seized. Because they sought and received an extension, the officers do not appear to have exceeded the scope of the protocol.

As to the removal of the devices from the premises, the Court finds the Government failed to comply with the protocol. However, the Court also agrees with the Government that the violations do not rise to the level of constitutional error, and so will not suppress.

The Government argues that a search does not need precautionary search protocols. Opp. at 6, 8. While arguably it may not have been required to include the Protocol in the warrant as a constitutional matter, the Government led the magistrate judge to believe that it would comply with the Protocol. See generally, Ex. A. Because the magistrate was told that the officers would remove devices from the search site only after attempting to mirror-image them, the officers should have at least attempted to make a mirror image of those devices. However, the Government did not arrange for a CFA to be on-site. While the Court understands there was no CFA on-site because there simply are not enough CFA's in HSI's San Francisco office, it failed to demonstrate that if the San Francisco office does not have enough CFA's, why it could not ask to borrow a CFA from another office. The officers perhaps could have scheduled their searches so that there are enough CFA's to go on each search to which the Protocol applies. More importantly, the officers could have informed the magistrate judge of the situation, and asked the magistrate to strike out those portions of the Protocol with which the government will not be able to abide.1 Any of these solutions would have been preferable to promising the magistrate judge the officers will perform tasks and then not complying.

However, though the officers violated the Protocol, this does not warrant suppression. The exclusionary rule is meant to be invoked for "exceptional reason[s], typically the protection of a constitutional right." United States v. Harrington, 681 F.2d 612, 615 (9th Cir. 1982) (refusing to suppress evidence where it was "seized by an officer who, for some technical reason, should not have conducted the search").2

The Ninth Circuit has addressed defectively executed warrants. In United States v. Ivers, the FBI took more than the ten days allotted by the Rules of Criminal Procedure to execute a warrant to search the defendant's computer. 430 F. App'x 573, 575 (9th Cir. 2011). The Ninth Circuit affirmed the district court's decision not to suppress the evidence seized from the computer, holding that "suppression [wa]s not appropriate because there [wa]s no constitutional violation, no evidence that [the defendant] `was prejudiced' by the delay, and no indication that the officers acted in intentional and deliberate disregard of" the Rules of Criminal Procedure. Id. Similarly, in United States v. Chen, the government obtained a warrant to install "a" video camera in a warehouse. 979 F.2d 714, 718 (9th Cir. 1992). When the officers arrived, they realized that one camera did not cover the entire square footage of the warehouse, and installed a second camera to "fulfill the purposes of the surveillance warrant." Id. The Ninth Circuit held that this was no more than a "de minimis intrusion," and the camera had not been installed in "flagrant disregard" of the warrant's terms. Id. at 718.3

Conversely, in United States v. Comprehensive Drug Testing, Inc., law enforcement learned that ten professional baseball players had tested positive for drugs in tests administered by Comprehensive Drug Testing, Inc. ("CDT"). 621 F.3d 1162, 1166, 1171-72 (9th Cir. 2010). The government obtained a warrant "limited to the records of the ten players as to whom the government had probable cause," id., and the seized data was to be reviewed by computer personnel rather than by case agents, id. at 1171. However, the government seized and searched the "records for hundreds of players," id. at 1166, and the data was reviewed by case agents, id. at 1171. The Ninth Circuit held "[t]his was an obvious case of deliberate overreaching by the government in an effort to seize data as to which it lacked probable cause." Id. at 1172 (emphasis added). It affirmed the trial court's order that the illegally obtained data must be returned. Id.

Here, the violation does not implicate circumvention of the probable cause requirement. The seized cell phones and camera fell within the terms of the warrant and the search was supported by probable cause. See Ex. A at SW-0082 (the "List of Items to be Searched and/or Seized" included "cellular telephones . . . and other devices and/or electronic media that can store the indicia of membership"). While the warrant envisioned these items would be searched on-site in ideal circumstances, it permitted the officers to remove them if circumstances were less than ideal. See id. at SW-0083 (allowing the officers to remove electronic devices if they could not be searched or mirror-imaged on site). The officers' deviation from the terms of the Protocol which required an attempt to mirror on-site was not the "but-for cause of obtaining evidence." See Hudson v. Michigan, 547 U.S. 586, 592 (2006). "Whether that preliminary misstep had occurred or not," the officers would have searched the cellular phones and camera. Id. (emphasis in original). Because these items were seized pursuant to "a valid search warrant [that] entitled officers to" seize them, "[r]esort to the massive remedy of suppressing evidence . . . is unjustified." United States v. Hector, 474 F.3d 1150, 1155 (9th Cir. 2007) (quoting Hudson, 547 U.S. at 599).

While there may be instances where a flagrant violation of the protocol might give rise to the extreme remedy of suppression that remedy is not warranted here. See, e.g., United States v. Hunter, 13 F.Supp.2d 574, 585 (D. Vt. 1998) (refusing to suppress, even though DEA agents were participated in search of property in clear violation of protocol prohibiting their presence, where the violation did not rise to the level of "flagrant disregard" of the warrant). Although it appears the Government could have done more to comply with the warrant or seek its modification in conducting its search, it did try to power the devices on and found that most of the devices seized could not be powered on. See Docket No. 679 ¶ 4. Also, Defendant has not demonstrated there is an established pattern of non-compliance and disregard of search warrant terms by the Government.

The Court is nevertheless disturbed by the actions taken here and failure to fulfill their representations to the magistrate judge. While the evidence will not be suppressed, should the credibility of the officers be called into question at trial, defense counsel will be permitted to cross-examine them about this violation, including their apparent violation of the Protocol. Nor is the Government immune to a suppression remedy in the future should a pattern of non-compliance develop.

For the reasons stated above, the Court DENIES Defendant Real's motion to suppress.

This order disposes of Docket No. 627.

IT IS SO ORDERED.

FootNotes


1. For this reason, the Government's argument regarding the high-risk nature of this search is unpersuasive. If many searches are too high-risk to have a CFA present, the Government should inform the United States District Court for the Northern District of California of this fact so that the courts in this District may adapt the Protocol accordingly.
2. See also United States v. Caceres, 440 U.S. 741, 754-55 (1979) ("In view of our conclusion that none of respondent's constitutional rights has been violated here, either by the actual recording or by the agency violation of its own regulations, our precedents enforcing the exclusionary rule to deter constitutional violations provide no support for the rule's application in this case."); United States v. Collins, 764 F.2d 647, 655 (9th Cir. 1985) (refusing to exclude evidence, though it was seized by Customs when the DEA should have conducted the search); Herring v. United States, 555 U.S. 135, 144 (2009) ("To trigger the exclusionary rule, police conduct must be sufficiently deliberate that exclusion can meaningfully deter it, and sufficiently culpable that such deterrence is worth the price paid by the justice system.") (refusing to exclude evidence where it was seized based on a recalled warrant).
3. While the Ninth Circuit suppressed evidence collected from a third camera, it did so because this camera "focused . . . on an area outside the warehouse," which was not included in the warrant. Id. The second camera "was never used to record any evidence," and so did not gather evidence beyond the scope of the warrant. Id.
Source:  Leagle

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer