JOHN M. FACCIOLA, UNITED STATES MAGISTRATE JUDGE.
On September 27, 2013, this Court was presented with an application for a search warrant pursuant to Rule 41 of the Federal Rules of Criminal Procedure and 18 U.S.C. § 2703(a), (b) and (c), to compel Facebook, Inc. to disclose certain records and contents of electronic communications relating to the Facebook account identified by the user name "Aaron.Alexis." See generally Affidavit in Support of an Application for a Search Wain-ant [# 1-1].
As part of its investigation into the September 16, 2013, shooting at the Washington Navy Yard, perpetrated by Aaron Alexis, the government learned that Alexis had a Facebook account where he posted "long statements about his perspectives on life and would write about those things or people who bothered him ... most postings were depressing and negative in nature and could be described as mini-rants." [# 1-1] at 6.
The government subsequently filed with the Court its application for a search warrant, which was intended to operate in a bifurcated manner. First, the government outlined the information that it wanted Facebook to "disclose" to the government:
Attachment B at 1-2.
Id. at 3-4.
The Court was concerned that the government's requested warrant was overbroad, evaded the fundamental requirement that a search warrant particularly describe what items are to be seized, and failed the necessity of showing that the items seized were contraband, instruments of committing a crime, or evidence of a crime's commission. See Fed. R. Crim. P. 41(c). Thus, the search requested by the
In response, this Court crafted an Order that limited Facebook's disclosure to information about Alexis's account and the content of messages that he sent. [# 2] at 1-2. Facebook was also ordered to disclose records of communications—but not the content of communications—between third parties and Alexis's account. Id. at 2. The government was permitted to "seize" only information directly related to its investigation, and the Order specified that "[a]ll records and content that the government determines [were] NOT within the scope of the investigation, as described above, must either be returned to Facebook, Inc., or, if copies (physical or electronic), destroyed." Id. at 3.
For the sake of completeness, the relevant portions of the Court's Order are reproduce below:
Id. at 1-3.
The Court has two primary concerns about the government's application: 1) no probable cause existed for the search and seizure of information related to third parties; and 2) the government did not provide any explanation for what it would do with information disclosed by Facebook but deemed irrelevant to this investigation and not "seized."
The Supreme Court has recognized two constitutional protections served by the warrant requirement of the Fourth Amendment. "First, the magistrate's scrutiny is intended to eliminate altogether searches not based on probable cause. The premise here is that any intrusion in the way of search or seizure is an evil, so that no intrusion at all is justified without a careful prior determination of necessity." Coolidge v. New Hampshire, 403 U.S. 443, 467, 91 S.Ct. 2022, 29 L.Ed.2d 564 (1971). Thus, it is this Court's duty to reject any applications for search warrants where the strict standard of probable cause has not been met. Second, "those searches deemed necessary should be as limited as possible. Here, the specific evil is the `general warrant' abhorred by the colonists, and the problem is not that of intrusion per se, but of a general, exploratory rummaging in a person's belongings." Id. These twin inquiries are inseparably intertwined by the text of the Fourth Amendment: "no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." U.S. Const, amend. IV. To follow the dictates of the Fourth Amendment and avoid issuing a general warrant, a court must be careful to ensure that probable cause exists to seize each item specified in the warrant.
The government's application, however, wholly failed to provide any explanation whatsoever for why there was probable cause to search and seize information about third parties. Instead, there were only bare requests, such as for "[r]ecords relating to who created, used, or communicated with the user ID, including records about their identities and whereabouts." [# 1-1] Attachment B at 4 (emphasis added). Without probable cause to seize this material, this Court cannot issue a warrant authorizing its seizure.
In addition to the lack of probable cause, a separate constitutional concern arises from the government's apparent attempt to obtain information about any Facebook groups that Alexis may have joined. The application requests "[a]ll information about the Facebook pages that the account is or was a `fan' of," as well as "[r]ecords, information, and items related to any organization, entity, or individual in any way affiliated with Alexis." Id. at 2-3. The plain language of this request would require Facebook to turn over membership lists, which implicates the right to free association found in the First Amendment. See NAACP v. Alabama, 357 U.S. 449, 462, 78 S.Ct. 1163, 2 L.Ed.2d 1488 (1958) ("This Court has recognized the vital relationship between freedom to associate and privacy in one's associations."). Whether these groups were potentially political advocacy groups is immaterial, as this constitutional protection "pertain[s] to political, economic, religious or cultural matters, and state action which may have the effect of curtailing the freedom to associate is subject to the closest scrutiny." Id. at 460-61, 78 S.Ct. 1163.
Depending on what the government found after a search of Alexis's account, probable cause could exist to leam more information about another individual or a group. But no such probable cause existed for the initial foray into Alexis's Facebook profile, and it was therefore premature for the government to seek so much information about third parties.
The Court is particularly concerned because this is the second time this year that it has rejected an overly broad search and seizure warrant application directed to Facebook, at least in part because it unduly invaded the privacy of third parties. In a previous opinion, which remains sealed, the Court noted that the government's application "casts a remarkable dragnet over communications that surely have nothing to do with this case, including those to and from third parties, who will never know of the government's seeing their communications with John Doe about unrelated matters." In the Matter of the Search of Information associated with Facebook Account: http://faeebook.com/tJohn.Doe] that is stored at premises controlled by Facebook, Inc., 13-MJ-485, slip op. at 2 (D.D.C. June 14, 2013) (Facciola, M.J.) (sealed). The government should exercise caution and more narrowly tailor future warrant applications directed at Facebook; individuals may voluntarily share their information with Facebook, but the government, by seeking a search warrant, justly reasons that probable cause for searching within a Facebook account is still a constitutional necessity, particularly when it will have to see third party communications that are innocuous and irrelevant and sent by persons who could not possibly have anticipated that the government would see what they have posted.
As an initial matter, it may be strange that a court would even need to raise concerns about what the government might do with information that it collects that falls outside the scope of a search and seizure warrant. After all, such collection would appear to be a per se. violation of the Fourth Amendment. But due to the current "reality that over-seizing is an inherent part of the electronic search process" that gives the government "access to a larger pool of data that it has no probable cause to collect," this Court is obliged to create minimization procedures to limit the possibility of abuse by the government. United States v. Schesso, 730 F.3d 1040, 1042 (9th Cir.2013) (citing United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1177 (9th Cir.2010) (en banc) (per curiam)). See also Comprehensive Drug Testing, 621 F.3d at 1178 (Kozinksi, J. concurring) (suggesting procedures magistrate judges should follow to prevent "turning all warrants for digital data into general warrants").
Part of the problem comes from Rule 41, which creates a two-step procedure for the search and seizure of electronic information that necessarily allows seizing far more information than a warrant specifies. See Fed. R. Crim. P. 41(e)(2)(B). Under that Rule, a warrant "may authorize the seizure of electronic storage media or the seizure or copying of electronically stored information. Unless otherwise specified, the warrant authorizes a later review of the media or other information consistent with the warrant." Id, According to the 2009 notes from the Advisory Committee, this procedure was codified because "it is often impractical for law enforcement to review all of the [electronic] information.during execution of the warrant at the search location .... officers may seize or copy the entire storage medium and review it later to determine what electronically stored information falls within the scope of the warrant." Fed. R. Crim. P. 41 advisory committee's notes.
It is with the two-step procedure in Rule 41 in mind that the government has created the fiction that, although a great deal of information will be disclosed to it by Facebook, it will only "seize" that which is specified in the warrant. Compare [# 1-1] Attachment S at 1 with [# 1-1] Attachment B at 3; See generally In re Applications for Search Wan-ants for Information Associated ivith Target Email Accounts/Skype Accounts, Nos. 13-MJ-8163, 13-MJ-8164, 13-MJ-8165, 13-MJ-8166, 13-MJ-8167, 2013 WL 4647554, at *1 (D.Kan. Aug. 27, 2013) ("In re App.") (the government's search warrant applications used the same bifurcated distinction between information disclosed and information "seized"). By distinguishing between the two categories, the government is admitting that it does not have probable cause for all of the data that Facebook would disclose; otherwise, it would be able to "seize" everything that is given to it. Yet despite this attempted distinction— which has no apparent basis in the Fourth Amendment—even the material that is not within this second "seizure" category will still be turned over to the government, and it will quite clearly be "seized" within the meaning of that term under the Fourth Amendment. See Bwwer v. County of Inyo, 489 U.S. 593, 596, 109 S.Ct. 1378, 103 L.Ed.2d 628 (1989) (noting that a "seizure"
However, other courts to consider this issue have determined that copying electronic data or taking the original hard drives offsite—even if the government knows that the information contained within is beyond the scope of the warrant— does not violate the Fourth Amendment. See, e.g., Guest v. Lets, 255 F.3d 325, 334-35 (6th Cir.2001) (citing cases from the First, Ninth, and Tenth Circuits) ("In the instant cases, when the seizures occurred, defendants were unable to separate relevant files from unrelated files, so they took the computers to be able to sort out the documents off-site. Because of the technical difficulties of conducting a computer search in a suspect's home, the seizure of the computers, including their content, was reasonable in these cases to allow police to locate the offending files."). These cases, which all predate the 2009 Amendments to Rule 41, remain persuasive until the Supreme Court or the D.C. Circuit rule otherwise. See United States v. Evers, 669 F.3d 645, 652 (6th Cir.2012); see also United States v. Winther, 2011 WL 5837083, at * 11-12 (E.D.Pa. November 18, 2011) (citing cases that have upheld the constitutionality of a two-step procedure even when that procedure takes longer than the time allocated in the warrant for execution).
In light of the substantial authority upholding the process authorized by Rule 41, this Court will continue to issue warrants employing the two-step procedure. However, the Court does think it appropriate to incorporate appropriate minimization procedures into the warrants to comply with the Fourth Amendment.
The Court is aware of the concerns raised by Magistrate Judge David Waxse and others that "the initial section of the warrants authorizing the electronic communications service provider to disclose all email communications (including all content of the communications), and all records and other information regarding the account is too broad and too general." In re App., 2013 WL 4647554 at *8. The current two-step procedure that has been codified in Rule 41 is born from an attempt to balance the practical needs of the government with the requirements of the Fourth Amendment. Without question, the requirements of the Fourth Amendment are paramount; if the government cannot create a practical way to perform electronic searches and seizures that does not violate the Fourth Amendment, then it is simply not entitled to that information. This is clearly an evolving area of the law, but the Court is not yet prepared to go as far as Magistrate Judge Waxse and conclude that that the two step procedure authorized by Rule 41—seize all data and segregate what the warrant permits to be seized from what it does not at a later time—is now to be condemned as a violation of the Fourth Amendment.
This Court will insist, however, that some safeguards must be put in place to prevent the government from collecting and keeping indefinitely information to which it has no right. As with the decision by Magistrate Judge Rian Owsley in In the Matters of the Search of Cellular Telephone Towers, this Court is satisfied—for the time being—that it can lessen any potential Fourth Amendment violation by enforcing minimization procedures on the government. See 945 F.Supp.2d 769, 771 (S.D.Tex.2013) (requiring the government, which obtained a warrant to "dump" all phone numbers from cell towers, to "return any and all original records and copies, whether hardcopy or in electronic format
With this issue in mind, this Court began issuing, in September 2013, "Secondary Orders" to search and seizure warrants for electronic records. These "Secondary Orders" explicitly require that contents and records of electronic communications that are not relevant to an investigation must be returned or destroyed and cannot be kept by the government. See, e.g., In the Matter of the Search of Information Associated with [Redacted] That is Stored at Premises Controlled by Yahoo! Inc., 13-MJ-728 (D.D.C. September 25, 2013) (sealed) (Facciola, M.J.) ("All contents and records that the United States government determines are not within the scope of Attachment B(II)(A), (B), and (C) shall be either returned to Yahoo!, Inc., or, if copies, destroyed."). Without such an order, this Court is concerned that the government will see no obstacle to simply keeping all of the data that it collects, regardless of its relevance to the specific investigation for which it is sought and whether the warrant authorized its seizure.
The basis in the Fourth Amendment for those orders, and the minimization order here, is that the government had not established probable cause for the entirety of Alexis's Facebook account—which its more narrow "seizure" section of the application tacitly admitted. Thus, it would violate the Fourth Amendment for the government to permanently seize all contents, records, and other data related to the account. The Court's Order required that "[a]ll records and content that the government determines are NOT within the scope of the investigation, as described above, must either be returned to Facebook, Inc., or, if copies (physical or electronic), destroyed." [# 2] at 3. This minimization procedure was intended to help strike the appropriate balance between the competing interest of the government and the requirements of the Fourth Amendment, and the Court is satisfied, for the moment, with that approach.
Minimization procedures may be an appropriate way to protect the purpose of the Fourth Amendment even when changes in technology dramatically change the way in which search and seizures actually occur in the real world. However, it is clear that they are not perfect. While there has never been anything stopping the government from exceeding the scope of an otheiwise valid warrant when searching a physical place, it is clearly easier to do so when the government has an identical copy of an entire hard drive or database. Perhaps of even bigger concern is the potential applicability of the "plain view" doctrine with respect to electronicsearches, which has been the subject of considerable consternation in the Ninth Circuit. See U.S. v. Comprehensive Ding Testing, 579 F.3d 989, 997-99 (9th Cir. 2009) ("the government should, in future warrant applications, forswear reliance on the plain view doctrine or any similar doctrine that would allow it to retain data to which it has gained access only because it was required to segregate seizable from non-seizable data. If the government doesn't consent to such a waiver, the magistrate judge should order that the seizable and non-seizable data be separated by an independent third party under the supervision of the court, or deny the warrant altogether.") superseded by 621 F.3d 1162, 1178 (9th Cir.2010) (en banc) ("The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.").
The government has once again relied on boilerplate language that is inapposite to the relevant facts. See In the Matter of the Application of the United States of America for an Order Authorizing Disclosure of Historical Cell Site Information for Telephone Number [Redacted], 1:13-MC-199, 1:13-MC-1005,1:13-MC-1006, 20 F.Supp.3d 67, 72 (D.D.C. Oct. 31, 2013) (Facciola, M.J.) ("Generic and inaccurate boilerplate language will only cause this Court to reject future § 2703(d) applications."). Counsel for the government represented to the Court that the list of requested items in the application was the standard list used by the Department of Justice for search warrants involving Facebook accounts, although the Court notes that this application requested the production of more information than the request that was previously denied in 13-MJ-485. The facts in this case clearly do not warrant such disclosure.
This Court is also troubled that its minimization procedure approach—while acceptable in this case—may not be appropriate to curb excessive searches and seizures in the future. Other courts have suggested alternatives, including:
See In the Matter of Applications for Search Warrants for Case Nos. 12-M8119-DJW and Information Associated with 12-MJ-9191-DJW Target Email Address, Nos. 12-MJ-8119, 12-MJ-8191, 2012 WL 4383917, at *10 (items 1-2); Comprehensive Drug Testing, 621 F.3d at 1180 (Kozinski, J. concurring) (items 3-5); see also In re Search Warrant, 193 Vt. 51, 71 A.3d 1158, 1186 (2012) (upholding nine ex ante restrictions on a search warrant for electronic data but holding that the issuing officer could not prevent the government from relying on the plain view doctrine). This list is non-exhaustive, and the government should take time to seriously consider how to minimize the amount of information that its search warrant applications seek to be disclosed. There is no doubt that the current state of affairs, as evidenced by the government's original application for Alexis's Facebook account, is untenable. If the government cannot adopt stricter search parameters in future applications, it may find this Court unwilling to issue any search and seizure warrants for electronic data that ignore the constitutional obligations to avoid "general" electronic warrants that are as offensive to the Fourth Amendment as the searches that led to its enactment.