DOOLEY, J.
¶ 1. In this complaint for extraordinary relief, we are asked to determine whether a judicial officer has discretion to attach ex ante or prospective conditions to a search warrant. The State petitions this Court to strike ten such conditions pertaining to the search of a personal computer, seized by police as part of an identity theft investigation. The State contends that the conditions exceed the judicial officer's authority under the Fourth Amendment and unnecessarily impede law enforcement's ability to investigate crime. Two amici have filed
¶ 2. In December 2010, a Burlington Police Detective was assigned to investigate an identity theft case transferred from the New York State Police. In conjunction with the investigation, he applied for a warrant to search a home at 145 Pleasant Avenue in Burlington. The affidavit submitted in support of the warrant recites the following facts.
¶ 3. The crime was reported by a resident of New York. In an interview with the Vermont detective, the victim stated that someone had fraudulently attempted to apply for credit cards online using his name and identifying information and to change his address with the United States Postal Service. Based on this information, the detective contacted one of the banks involved and obtained the internet protocol (IP)
¶ 4. From the internet service provider, the detective learned that at the time the fraudulent application was submitted online, the IP address used belonged to a subscriber listed at 134 Pleasant Avenue. The detective visited the location and observed that there was an open (unprotected by a password) wireless internet (WIFI) connection coming from 134 Pleasant Avenue. He determined that the signal was likely strong enough to access from 145 Pleasant Avenue. The detective interviewed the resident of 134 Pleasant Avenue and obtained permission to access the router log to determine if other computers had used the wireless connection. From this log, the detective discovered that the previous month the router was accessed several times by a computer with an assigned name of GulfieldProp-PC.
¶ 5. Based on the foregoing information, the detective applied for a warrant to search 145 Pleasant Avenue for "evidence of the crime of Identity Theft." The application requested permission to seize records "in whatever form they are found," including any computers or other electronic medium. An attachment described the property to be seized in more detail, including:
¶ 6. Reciting general information about the large volume of information stored on a computer, the technical expertise required to search data that can be hidden, password protected, or encrypted, and the time involved in such a search, the application requested authorization to seize any computers for search off-site. The application further stated:
¶ 7. The judicial officer reviewing the request granted a warrant to search the residence and to seize electronic devices to be searched at an off-site facility for as long as reasonably necessary. In a separate order, however, the judicial officer stated only that "[t]he application to search the computer belonging to Eric Gulfield is granted," and attached conditions: (1) restricting the police from relying on the plain view doctrine to seize any incriminatory electronic record not authorized by the warrant — that is, "any digital evidence relating to criminal matters other than identity theft offenses"; (2) requiring third parties or specially trained computer personnel to conduct the search behind a "firewall" and provide to State investigatory agents only "digital evidence relating to identity theft offenses"
¶ 8. The State then filed a motion for extraordinary relief in this Court requesting that the Court strike the ex ante conditions from the warrant. In support of its petition, the State argues that the judicial officer lacked authority to impose ex ante restrictions on the search; that the conditions are unnecessary and impede legal development in the area of computer searches; and that the conditions impermissibly impede effective law enforcement investigation. The Defender General and the American Civil Liberties Union (ACLU)
¶ 9. We first must address the jurisdictional grounds for this action. This is an original jurisdiction case instigated by the State's direct petition for extraordinary relief. Extraordinary relief is a "flexible procedure" that is available when all other avenues are closed. In re Vt. Sup. Ct. Admin. Directive No. 17, 154 Vt. 392, 397, 579 A.2d 1036, 1039 (1990). Extraordinary relief is, however, limited to when "there is no adequate remedy by appeal" or by filing for extraordinary relief in the superior court. V.R.A.P. 21(b). In this case, there is no remedy by appeal because the State has no right of appeal from a judge's decision to grant, but condition, a warrant request. See 13 V.S.A. § 7403 (limiting State's ability to appeal in criminal cases to situations where prosecution has begun). The State argued that this is a rare case where extraordinary relief is appropriately brought in this Court in the first instance because the issue raised is a pure question of law that requires no factual development. Cf. In re
¶ 10. The Defender General moved to dismiss the petition for lack of jurisdiction, arguing that there was no live controversy because the State's contention of injury was speculative and that there were other available means for relief. The Defender General contended that the State should file its petition for extraordinary relief in the civil division in the first instance for further factual development. This Court denied the motion. We now reaffirm that denial. The petition for relief may be decided by this Court in the first instance given that the State is challenging the judicial officer's authority to impose the conditions, as in the nature of a mandamus action, which is a purely legal question that requires no evidentiary analysis. See, e.g., State v. Saari, 152 Vt. 510, 514-15, 568 A.2d 344, 347 (1989).
¶ 11. Although we conclude that there is jurisdiction, we also emphasize that extraordinary relief in the nature of mandamus is a limited remedy. It is to be granted only when the State shows that the judge's decisions "were usurpations of judicial power, clear abuses of discretion, or arbitrary abuses of power." State v. Pratt, 173 Vt. 562, 563, 795 A.2d 1148, 1149 (2002) (mem.). Therefore, we must determine whether the judicial officer's decision to impose ex ante restrictions was an abuse of power, clearly contrary to law.
¶ 12. Having found jurisdiction, we consider the scope of this appeal. The central premise of the judicial officer who issued the warrant, a premise reiterated by amici, is that the State is bound by the warrant conditions, hereinafter referred to as instructions. In general, this is settled law: warrant instructions are binding so that a violation of them renders the search unconstitutional. United States v. Brunette, 76 F.Supp.2d 30, 42 (D.Me.1999) ("It is settled law that the search and seizure of evidence, conducted under a warrant, must conform to the requirements of that warrant."). Enforcing an issuing judicial officer's directions ensures that the warrant requirement is meaningful and effective. See United States v. Leon, 468 U.S. 897, 914, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984) ("[T]he preference for warrants is most appropriately effectuated by according `great deference' to a magistrate's determination." (quoting Spinelli v. United States, 393 U.S. 410, 419, 89 S.Ct. 584, 21 L.Ed.2d 637 (1969))). Thus, for example, a failure to abide by the warrant's time restrictions may be cause for suppression of evidence obtained in the search pursuant to the warrant. See Sgro v. United States, 287 U.S. 206, 211, 53 S.Ct. 138, 77 L.Ed. 260 (1932); United States v. Bedford, 519 F.2d 650, 655 (3d Cir.1975) ("If the police were allowed to execute the warrant at leisure, the safeguard of judicial control over the search which the fourth amendment is intended to accomplish would be eviscerated.").
¶ 13. The State argues, however, that this settled law does not apply to ex ante instructions — that is, instructions imposed with the warrant on how to execute the warrant. The instructions in this case are ex ante instructions. Essentially, the State's position is that the requirements of the Fourth Amendment of the Federal Constitution and Chapter I, Article 11 of the Vermont Constitution do not extend to such instructions so that violation of these instructions would not itself make the
¶ 14. The issues in this case are unlike the search and seizure questions that we have resolved in the past. The difference involves the nature of the constitutional guarantee, as a right of a citizen to be free from a search and/or seizure that does not comport with constitutional requirements. In the usual case, a criminal defendant argues that certain evidence to be used by the State was obtained in violation of the constitutional mandate and cannot be used against defendant in the criminal proceeding. Here, the issue is whether the judicial officer in approving a search warrant can add instructions to protect the privacy interests of the person to be searched. The issue has never been addressed directly by the U.S. Supreme Court and has rarely been addressed by lower federal courts or courts in other states.
¶ 15. While the State has argued briefly that Article 11 creates no greater power to issue ex ante instructions as part of the constitutional mandate, and the Defender General argues to the contrary urging us to ground our decision on the Vermont Constitution, this case is fundamentally about the reach of the Fourth Amendment. The judicial officer relied upon Fourth Amendment decisions in imposing the instructions, and the parties have relied upon Fourth Amendment decisions in their arguments to this Court. In part, this is because there are no state constitution precedents. To be sure, we have noted on many occasions that Article 11 "may offer protections beyond those provided by the Fourth Amendment," State v. Roberts, 160 Vt. 385, 392, 631 A.2d 835, 840 (1993), and this case could involve a variation of this principle. Our first impression, however, is that this case is less about the scope of protections of a constitutional provision and more about the tools available to ensure that protection occurs. Thus, any holding we might ultimately make concerning the scope of Article 11 with respect to ex ante instructions will be based on a new analysis of the protections of that Article. In view of our disposition of the case under the Fourth Amendment, we decline to engage in such an analysis in this case.
¶ 16. Nor do we rest our decision on Vermont nonconstitutional law. While the State argued that Vermont law does not authorize a judicial officer to impose ex ante instructions, it addressed only Vermont Rule of Criminal Procedure 41. It argued that this criminal procedure rule does not authorize the magistrate to issue instructions on how the search shall be conducted. Although Rule 41 is relevant,
¶ 17. Before addressing the substantive claims of error raised, we briefly make three points that put our analysis in context and respond to one of the points made by the dissent. First, there are really two searches in this case — the first for the computer and the second of the computer. The first has occurred and is not in dispute; the issues relate solely to the second search. Second, the principal question before us is whether the warrant-issuing magistrate had the authority to issue the specific search instructions he did, not as the dissent suggests, whether imposing the instructions is necessary to comply with the Fourth Amendment or Chapter I, Article 11 of the Vermont Constitution. Third, the State has challenged the imposition (or effect) of the instructions in general. Assuming such instructions could be imposed and they are binding under either the federal or state constitution, the State has not argued that they were inappropriate in this case. We leave questions about the nature and extent of the magistrate's discretion in this area to another day.
¶ 18. We now proceed to the main question before us — whether a judicial officer issuing a warrant has the authority to place ex ante instructions on how a search may be conducted. We have stated the question broadly because the State has challenged the authority of the judicial officer to impose any ex ante instructions, not particularly those in this case.
¶ 19. Under the Fourth Amendment, people are protected "against unreasonable searches and seizures." U.S. Const. amend. IV. This right is echoed in the Vermont Constitution, which protects people's right to be "free from search or seizure." Vt. Const. ch. I, art. 11. "Absent exceptional circumstances, the federal and state constitutions instruct executive officers to conduct searches pursuant to a
¶ 20. In creating the instructions, the issuing judicial officer explicitly relied on United States v. Comprehensive Drug Testing, Inc. (CDT I), 579 F.3d 989 (9th Cir.2009) (en banc). That case arose out of a 2002 federal investigation into the Bay Area Lab Cooperative (Balco), which the government suspected of providing illegal steroids to professional baseball players. That year, Major League Baseball and the Player's Association agreed to test all players to determine if more than five percent of players tested positive for steroid use. Under the agreement, the results of the testing of individual players were to be kept confidential. The samples were collected by an independent business, Comprehensive Drug Testing, Inc. (CDT), and the tests were performed by a private laboratory, Quest Diagnostics, Inc. CDT retained the list of players and their respective test results while Quest kept the specimens.
¶ 21. As part of its Balco investigation, the government developed probable cause to believe ten players tested positive for steroids. The government secured a grand jury subpoena to obtain all drug testing records and specimens in CDT's possession. The players moved to quash this subpoena. The government also obtained a warrant authorizing a search of CDT. Although the warrant was limited to the records of the ten players for whom the government had probable cause, when the government executed the warrant, law enforcement seized and reviewed the drug testing records for hundreds of baseball players as well as other individuals. Litigation ensued challenging the government's action. CDT and the players moved for return of property under Federal Rule of Criminal Procedure 41(g), and the players moved to quash the subpoena.
¶ 22. The motions were heard by three different district court judges who all ruled against the government, granting the motions to return property and quashing the subpoena. All "expressed grave dissatisfaction with the government's handling of the investigation." Id. at 994. On appeal, a panel of the United States Court of Appeals for the Ninth Circuit reversed two decisions, concluding that the government's seizure did not violate the law. United States v. Comprehensive Drug Testing Inc., 473 F.3d 915 (9th Cir.2006). The court then granted a rehearing en banc
¶ 23. Dissatisfied, the government then moved for review by all twenty-one active judges of the Ninth Circuit, arguing that the search protocols announced in the decision were unnecessary to resolve the case, beyond the court's authority, and harmful to ongoing government investigations. Brief for the United States in Support of Rehearing En Banc by the Full Court, CDT I, 579 F.3d 989 (9th Cir.2009). In response, the initial en banc decision was revised and replaced with United States v. Comprehensive Drug Testing, Inc. (CDT II), 621 F.3d 1162 (9th Cir.2010) (en banc) (per curiam). While the revised decision retained the substantive analysis and legal outcome of CDT I, the guidelines were removed from the per curiam opinion, and instead were included in a concurrence. CDT II, 621 F.3d at 1180 (Kozinski, C.J., concurring). The instructions adopted by the judicial officer in this case are drawn from the guidelines that were set forth in CDT I and retained only in the concurring opinion in CDT II.
¶ 24. The State contends that the judicial officer in this case lacked authority to impose the instructions at issue. In the State's view, rather than authorizing a search at a particular location or for particular items, the judicial officer was attempting to dictate how law enforcement must conduct its search. In making this argument, the State draws heavily on an article written by Professor Orin Kerr following CDT I. See O. Kerr, Ex Ante Regulation of Computer Search and Seizure, 96 Va. L.Rev. 1241, 1242 (2010). Professor Kerr argues that "ex ante restrictions on the execution of computer warrants are constitutionally unauthorized and unwise." Id. He contends that ex ante restrictions are impermissible because they predetermine the reasonableness of a search — a matter that he contends is beyond a magistrate's authority under the Fourth Amendment.
¶ 25. The permissibility of imposing the ex ante instructions on computer searches is a relatively novel question for courts generally.
¶ 26. In this light, we reject the State's invitation to hold that all ex ante restrictions on the execution of a search warrant are universally of no effect in defining the constitutional requirement. Although the historical record is sparse at this point, we
¶ 27. We conclude that ex ante instructions are sometimes acceptable mechanisms for ensuring the particularity of a search. According to Professor Kerr's argument, which the State would have us adopt, a judicial officer's only concern ex ante should be with probable cause and particularity, not reasonableness. Kerr, supra, at 1290-91 ("[E]x ante assessment of probable cause and particularity serves a different function than ex ante assessment of how a search should be executed."). Accepting arguendo that such a bright dividing line exists, ex ante instructions may be a way to ensure particularity. Even in traditional contexts, a judicial officer may restrict a search to only a portion of what was requested — a room rather than an entire house, or boxes with certain labels rather than an entire warehouse. In other words, some ex ante constraints — of the form "here, not there" — are perfectly acceptable. Warrant applications describing the proposed scope of a search are not submitted to the court on a take it or leave it basis.
¶ 28. Often the way to specify particular objects or spaces will not be by describing their physical coordinates but by describing how to locate them. This is especially true in the world of electronic information, where physical notions of particularity are metaphorical at best. Cf. J. Goldfoot, The Physical Computer and the Fourth Amendment, 16 Berkeley J.Crim. L. 112, 123 (2011) ("The initial decision to treat storage media as having subcontainers departs from physical moorings; after that departure, metaphors are necessary to apply physical rules to the new virtual world."). Although the details of computer searches are new and evolving, the need for a nonphysical concept of particularity is one that courts have already confronted. Warrants for electronic surveillance routinely set out "minimization" requirements — procedures for how and under what conditions the electronic surveillance may be conducted — in order to "afford[] similar protections to those that are present in the use of conventional warrants authorizing the seizure of tangible evidence." Berger v. New York, 388 U.S. 41, 57, 87 S.Ct. 1873, 18 L.Ed.2d 1040 (1967); see, e.g., Ricks v. State, 312 Md. 11, 537 A.2d 612, 621 (1988) (describing specific minimization procedures such as when camera should be turned on and off and what could and could not be recorded in 22-page order granting warrant for video surveillance).
¶ 29. At this point, many jurisdictions have adopted statutes that not only permit, but require, that warrants for electronic surveillance include procedures for minimizing the capture of nonpertinent information. See, e.g., N.Y.Crim. Proc. § 700.30.7 (requiring that warrants contain "[a] provision that the authorization to intercept or conduct video surveillance ... shall be conducted in such a way as to minimize the interception of communications or the making of observations not otherwise subject to eavesdropping or video surveillance").
¶ 30. Further, we do not agree that one can draw a categorical line between the probable cause inquiry and considerations of privacy. Professor Kerr's argument suggests that consideration of the privacy interests of the person to be searched is ultimately irrelevant to a judicial officer issuing a warrant. See Kerr, supra, at 1290-92. But this picture is overly rigid, ignoring the fact that the relevant ex ante standards depend on the severity of the privacy infringement that is contemplated. A judicial officer might authorize a search of a person, including his pockets, without any particular basis for thinking that evidence will be found in the person's pocket as opposed to elsewhere on his person. But that same officer might permissibly refuse to authorize a search of the person's body cavities based on evidence of similar generality. See, e.g., United States v. Nelson, 36 F.3d 758, 760 (8th Cir.1994) (holding that probable cause to search defendant's "person" did not include probable cause to perform a body cavity search and that this case clearly exhibits "[t]he need to provide specificity in a warrant"). This is not because a person's rectal cavity is, in any meaningful sense, a more "particular" or "specific" location than his left pocket,
¶ 31. What we ask judicial officers to ensure, therefore, is not simply that there is a reason to believe evidence may be uncovered but that there is a reason that will justify an intrusion on a citizen's privacy interest. The investigatory promise must justify the collateral exposure. See State v. Savva, 159 Vt. 75, 86, 616 A.2d 774, 780 (1991) ("Although criminal defendants may seek court review of searches and seizures, these after-the-fact challenges do not serve Article 11's purpose of protecting the rights of everyone — law-abiding as well as criminal — by involving judicial oversight before would-be invasions of privacy." (emphasis added)). It is therefore essential that a judicial officer be cognizant of the general type of invasion
¶ 32. As a corollary, judicial officers may describe in general terms what sort of an invasion is authorized. See United States v. Banks, 540 U.S. 31, 36, 124 S.Ct. 521, 157 L.Ed.2d 343 (2003) ("[A] magistrate judge is acting within the Constitution to authorize a `no-knock' entry."); V.R.Cr.P. 41(c) (requiring that warrants "shall command the officer to search[] within a specified period of time"; that they shall be executed during the daytime "unless the warrant directs that it may be served at any time"; and that they shall "designate the court to which it shall be returned"); cf. Scott v. United States, 436 U.S. 128, 130, 98 S.Ct. 1717, 56 L.Ed.2d 168 (1978) (contemplating "judicial authorization which required ... minimization" of wiretap under 18 U.S.C. § 2518). To say this is not to deny that the ex ante perspective of the issuing officer is to some extent limited. Judicial officers should not micromanage the execution of the warrant. See Lo-Ji Sales, 442 U.S. at 326-27, 99 S.Ct. 2319. And because the ex ante assessment is general, it will not foreclose ex post reassessment insofar as "the Magistrate could not have anticipated in every particular the circumstances that would confront the officers." Richards, 520 U.S. at 396, 117 S.Ct. 1416.
¶ 33. It is a serious error, however, to infer from the fact that we must often evaluate ex post whether a search sufficiently respected a citizen's privacy to the conclusion that we can make no ex ante judgments about what sort of privacy invasions are and are not warranted. There is interplay between probable cause, particularity, and reasonableness that judicial officers reviewing a warrant application must consider in authorizing a form of privacy invasion. We therefore reject any blanket prohibition on ex ante search warrant instructions.
¶ 34. Having rejected a categorical prohibition on ex ante instructions, we examine the specific instructions imposed by the judicial officer in this case and consider whether each was an abuse of authority. For clarity in our analysis, we group the instructions into the following categories: the first — instruction (1) relating to the plain view doctrine; the second — instructions (2), (3), and (4) requiring that the search be performed by third parties or police personnel segregated from the investigators and requiring that the information be segregated and redacted prior to disclosure; the third — instructions (5) and (6) requiring police to use focused search techniques and prohibiting the use of specialized search tools without prior court authorization; and the fourth — instructions (7), (8), (9), and (10) pertaining to the copying, destruction and return of data. We address each of these categories in turn.
¶ 35. First, we consider instruction (1) related to the plain view doctrine. Generally, only the items specifically described in a search warrant may be seized by law enforcement officers. Under the plain view doctrine, however, "if police are lawfully in a position from which they view an object, if its incriminating character is immediately apparent, and if the officers have a lawful right of access to the object, they may seize it without a warrant." Minnesota v. Dickerson, 508 U.S. 366, 375, 113 S.Ct. 2130, 124 L.Ed.2d 334 (1993); see State v. Trudeau, 165 Vt. 355, 358, 683 A.2d 725, 727 (1996) (listing and applying requirements for plain view doctrine). This applies to items viewed during a warranted search. Thus, when law enforcement is conducting a search pursuant to a warrant, police are authorized to seize objects not listed in the warrant as long as the object is viewed from a lawful vantage point, the incriminating nature of the object is obvious, and it may be seized from a lawful right of access. Horton v. California, 496 U.S. 128, 136-37, 110 S.Ct. 2301, 110 L.Ed.2d 112 (1990).
¶ 36. The judge was apparently concerned about how, pursuant to a broad search warrant, the plain view doctrine could be used in this case to seize evidence from computers or other electronic devices that were unconnected to the identity fraud investigation. Therefore, borrowing from CDT I,
The State challenges this instruction on the same basis as all the others — that the court had no authority to delineate how law enforcement should conduct the search. Amici argue that it is necessary to abrogate the plain view doctrine in cases involving searches of computers because otherwise the search will transform into a general search violating individuals' privacy interests.
¶ 37. For two main reasons, we find this first instruction unnecessary for privacy protection and inappropriate. It is unnecessary because instructions (2), (3) and (4), requiring the segregation of the search from the investigation and limiting the results of the search that can be shared, obviate application of the plain view doctrine. Investigatory personnel will never be in the position to view incriminating
¶ 38. Second, we conclude that it is beyond the authority of a judicial officer issuing a warrant to abrogate a legal doctrine in this way. "Judicial supervision of the administration of criminal justice in the ... courts implies the duty of establishing and maintaining civilized standards of procedure and evidence." McNabb v. United States, 318 U.S. 332, 340, 63 S.Ct. 608, 87 L.Ed. 819 (1943). This supervisory power does not, however, go so far as to allow a judicial officer to alter what legal principles will or will not apply in a particular case. This proposition was established in United States v. Payner, 447 U.S. 727, 100 S.Ct. 2439, 65 L.Ed.2d 468 (1980), in which the trial court attempted to use its supervisory authority to suppress items seized in violation of a third party's constitutional rights, thereby avoiding the established rules for Fourth Amendment standing. In reversing, the Supreme Court concluded that, if it accepted such use of the supervisory power, it "would confer on the judiciary discretionary power to disregard the considered limitations of the law it is charged with enforcing." Id. at 737, 100 S.Ct. 2439. In this case, allowing instruction (1) would confer on a judicial officer the authority to pick and choose what legal doctrines would apply to a particular police search. Because we do not believe that a judicial officer holds such authority, we conclude that the State's petition for extraordinary relief must be granted with regard to instruction (1).
¶ 39. Next, we turn to instructions (2), (3), and (4) requiring that the search be performed by third parties or trained computer personnel separate from the investigators and operating behind a firewall. The principal instruction on this topic reads in full:
Further, the court directed that if segregated State investigators were used, they could not disclose information other than that related to the "identity theft offenses." If private third parties were employed, the court required them to deliver only "digital evidence relating to the offenses being investigated" and to segregate and redact it from nonevidentiary data "no matter how intermingled." These instructions are the heart of the court's ex ante order.
¶ 40. Again, the State contends that the judicial officer had no authority to impose these instructions because it was an attempt to dictate how law enforcement should reasonably conduct the search. See Kerr, supra, at 1277. The ACLU argues that the separation and screening instructions are necessary to protect privacy by ensuring that investigations have independent sources and that police objectives do not become comingled. The Defender General contends that the segregation procedures protect privacy by providing "the mechanism to ensure that the State would not gain access to data that it had no probable cause to collect." The Defender General also argues that the standard under the Vermont Constitution is more stringent than its federal counterpart because Article 11 requires
¶ 41. The application for the warrant in this case requested incredibly broad authorization. The affidavit in support of the search warrant application says that in some cases searching for evidence relevant to the charged crime can involve "carefully targeted searches that can locate evidence without requiring a time-consuming manual search through unrelated materials." It goes on to say, however, that in other cases these techniques will not yield all the relevant evidence because "[c]riminals can mislabel or hide files and directories, encode communications to avoid using key words, attempt to delete files to evade detection, or take other steps designed to frustrate law enforcement searches for information." The affidavit asserts that the criminal's steps "may require agents and law enforcement or other analysts with appropriate expertise to conduct more extensive searches, such as scanning areas of the disk not allocated to listed files, or peruse every file briefly to determine whether it falls within the scope of the warrant." The affidavit also states that because electronic data can easily be moved to other computers within the house, law enforcement must search all computers, even those belonging to persons not suspected of committing a crime.
¶ 42. In short, the warrant application could not have requested a broader authorization: that is, to search all files in all ways on all computers in the house. See P. Ohm, Response, Massive Hard Drives, General Warrants, and the Power of Magistrate Judges, 97 Va. L.Rev. In Brief 1, 11 (2011) ("Computer search warrants are the closest things to general warrants we have confronted in the history of the Republic."). Understandably, in the judicial officer's view, the warrant application did not provide probable cause for such a wide ranging search. See United States v. Otero, 563 F.3d 1127, 1132 (10th Cir.2009) ("The modern development of the personal computer and its ability to store and intermingle a huge array of one's personal papers in a single place increases law enforcement's ability to conduct a wide-ranging search into a person's private affairs, and accordingly makes the particularity requirement that much more important.").
¶ 43. The separation and screening instructions are the judicial officer's attempt to remedy this lack of particularity. To accomplish this, the instructions require that only the particular information for which there is probable cause to search will be laid bare to police investigators. See Marron v. United States, 275 U.S. 192, 196, 48 S.Ct. 74, 72 L.Ed. 231 (1927) ("The requirement that warrants shall particularly describe the things to be seized makes general searches under them impossible and prevents the seizure of one thing under a warrant describing another."). As opposed to exposing the entire contents of the hard drive to the police, the procedures ensure that only those files that relate to the suspected criminal activity will be viewed. In lieu of a particular description of the relevant files, the conditions create a procedure for identifying the relevant files and exposing only them to police investigators.
¶ 44. The State and the dissent raise two general objections to the instructions. The first, particularly raised by the dissent, is that the instructions have improperly eviscerated the plain view doctrine. Post, ¶ 84. Although the practical consequences of the instructions may be comparable to an abrogation of the plain view doctrine, the mechanism is critically different. Abrogating the plain view doctrine would mean that investigating police officers
¶ 45. In making their argument, the dissent is treating the plain view doctrine as some form of right of law enforcement officials. The dissent refers to "frustrat[ing]" and "interfer[ing]" with the plain view doctrine. Post, ¶¶ 84, 100. In fact, the plain view doctrine has a very limited role in Fourth Amendment jurisprudence. It is related only to seizures, not to searches. Horton, 496 U.S. at 134, 110 S.Ct. 2301 (stating that plain view is an "exception that is addressed to the concerns that are implicated by seizures rather than by searches"). The doctrine itself is concerned with the permissible actions of the investigator after he or she has seen the incriminating evidence, not before. As we said in State v. Birchard, the "plain-view doctrine comes into play as an exception only where an officer has observed the object in question." 2010 VT 57, ¶ 27, 188 Vt. 172.
¶ 46. An examination of the U.S. Supreme Court cases that developed the doctrine make it clear that it was crafted to be a narrow exception to the warrant requirement, permissible only as a convenience. The primary development of the doctrine was in the plurality opinion in Coolidge v. New Hampshire, which made the practical rational underlying the doctrine clear: "Where, once an otherwise lawful search is in progress, the police inadvertently come upon a piece of evidence, it would often be a needless inconvenience, and sometimes dangerous — to the evidence or to the police themselves — to require them to ignore it until they have obtained a warrant particularly describing it." 403 U.S. 443, 467-68, 91 S.Ct. 2022, 29 L.Ed.2d 564 (1971) (emphasis added). The opinion noted the reasons for the warrant requirement and stated, in part, that allowing the seizure of evidence in plain view without a warrant would not interfere with a primary rationale for the warrant requirement that "those searches deemed necessary should be as limited as possible." Id. at 467, 91 S.Ct. 2022. It would not do so, the Court found, because the plain view doctrine "does not convert the search into a general or exploratory one."
¶ 47. Having established the compatibility of the plain view doctrine and the constitutional principles at stake, the plurality found the exception acceptable: "As against the minor peril to Fourth Amendment protections, there is a major gain in effective law enforcement." Id. Later cases have recognized the same rationale. See Dickerson, 508 U.S. at 375, 113 S.Ct. 2130 ("The warrantless seizure of contraband [that officers see in plain view during a valid search] is deemed justified by the realization that resort to a neutral magistrate under such circumstances would often be impracticable and would do little to
¶ 48. It is difficult to imagine how we could frustrate a doctrine based on convenience to establish an exception to the warrant requirement. The rationale has nothing to do with a law enforcement officer's access to evidence; it determines only whether the officer must obtain a warrant to seize evidence to which the officer has access. Thus, we cannot accept the argument that the instructions impermissibly abrogate the plain view doctrine.
¶ 49. Second, the State and the dissent argue that allowing the information to be viewed by any third party — even one behind a firewall so the information cannot be viewed by a law enforcement officer — eliminates any legitimate privacy interest. Post, ¶ 90. Put another way, the issue is whether the conditions meaningfully advance privacy interests in a way that would justify their imposition on the State. Superficially, the answer is not obvious because a citizen's private information is being exposed one way or another, be it to a police officer or a third-party analyst.
¶ 50. What this argument fails to recognize, however, is that privacy concerns not only our interest in determining whether personal information is revealed to another person but also our interest in determining to whom such information is revealed. A more complex understanding of privacy — one not limited to mere concern with avoiding exposure altogether — will inevitably acknowledge that our interest in privacy is, at least in part, an interest in to whom information concerning us is exposed. See Nat'l Cable & Telecomms. Ass'n v. FCC, 555 F.3d 996, 1001 (D.C.Cir. 2009) ("It is widely accepted that privacy deals with determining for oneself when, how and to whom personal information will be disclosed to others."); Stone v. State
¶ 51. That exposure to one person may harm one's privacy interests more than exposure to another person is a familiar feature of human experience. If an embarrassing or humiliating piece of personal information must be revealed to someone, it is surely worse to have it revealed to the neighborhood busybody or to one's boss than it is to have it revealed to a stranger. See Beaumont v. Brown, 401 Mich. 80, 257 N.W.2d 522, 531 (1977) ("Communication of embarrassing facts about an individual to a public not concerned with that individual and with whom the individual is not concerned obviously is not a `serious interference' with plaintiff's right to privacy, although it might be `unnecessary' or `unreasonable.' An invasion of a plaintiff's right to privacy is important if it exposes private facts to a public whose knowledge of those facts would be embarrassing to the plaintiff."), overruled in part on other grounds by Bradley v. Saranac Cmty. Sch. Bd. of Educ., 455 Mich. 285, 565 N.W.2d 650, 658 (1997). Given that privacy interests are, in this way, deeply sensitive to the identification of the recipient of the information, and given that these interests are what undergird the warrant requirement in the first place, there is no reason that the warrant process should be barred from exhibiting a similar sensitivity.
¶ 52. The reason that we care about who receives the information is because what others know about us shapes our interactions with them. Exposure of embarrassing
¶ 53. A citizen's relationship with a police officer engaged in an investigation is asymmetric in power and laden with potential consequences. Unlike virtually any other person, an investigating police officer has the power to place a citizen at the mercy of the State. We have the greatest interest in keeping our private information from someone who could do the most damage with it. Moreover, the police officer is necessarily inquisitive. It is the detective's job to be skeptical, probing, and sometimes even relentless. Finally, the police officer assigned to a case is, by definition, not a detached individual and therefore inevitably has a certain perspective.
¶ 54. As a result of all of these features, it is natural to view exposure to a third party — insofar as exposure is required at all — as less of a setback to one's privacy interests than exposure to an investigating officer. In fact, the protections of the Fourth Amendment are built around the recognition that one's relationship with a detached third party will be different than with an investigating officer. See Johnson v. United States, 333 U.S. 10, 13-14, 68 S.Ct. 367, 92 L.Ed. 436 (1948) ("The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime.").
¶ 55. The recognition that exposure to a disinterested third party may be substantially less injurious than exposure to an interested party explains why we often rely upon third-party screening in other contexts. For example, third-party filtering or screening teams are frequently used to protect against the disclosure of privileged documents. See, e.g., Hicks v. Bush, 452 F.Supp.2d 88, 103 (D.D.C.2006) (allowing use of "filter teams" to protect attorney-client privilege with regard to mail seized from Guantanamo Bay detainees); United States v. Grant, No. 04 CR 207BSJ, 2004 WL 1171258 (S.D.N.Y. May 25, 2004) (endorsing government's proposed "privilege team" to screen seized documents for privileged materials); United States v. Triumph Capital Grp., Inc., 211 F.R.D. 31, 43 (D.Conn.2002) ("The use of a taint team is a proper, fair and acceptable method of protecting privileged communications when a search involves property of an attorney."); United States v. Hunter, 13 F.Supp.2d 574, 583 (D.Vt.1998) (accepting the use of "screening procedure designed by the government" in order to "limit invasion of confidential or privileged or irrelevant material").
¶ 57. Not surprisingly, courts and commentators have been drawn to these tools for the purposes of mitigating the invasiveness of computer searches. The judicial officer in this case was putting into effect these proposed legal innovations. See, e.g., CDT II, 621 F.3d at 1180 (Kozinski, C.J., concurring) (recommending that "[s]egregation and redaction of electronic data must be done either by specialized personnel or an independent third party"); J. Saylor, Note, Computers as Castles: Preventing the Plain View Doctrine from Becoming a Vehicle for Overbroad Digital Searches, 79 Fordham L.Rev. 2809, 2857 (2011) (advocating for a requirement that special masters be used "to segregate data that is within the scope of the warrant, while excluding non-relevant evidence unless it closely relates to the crime specified in the warrant or is contained in the same file as evidence that the warrant authorizes to be seized"); Recent Case, Fourth Amendment — Plain View Doctrine — En Banc Ninth Circuit Holds that the Government Should Waive Reliance on Plain View Doctrine in Digital Contexts, 123 Harv. L.Rev. 1003, 1010 (2010) (calling for a procedure in which "[d]esignated computer personnel or a third party would perform a search of the entire hard drive" and "[a]ll responsive information would be culled"). In the computer search context, using a disinterested third party is a natural way to protect a person's interest in who will view personal information.
¶ 58. The interest in who will view personal information is heightened when the information in question is not a single embarrassing fact but rather a vast array of private materials. Personal computers often store every aspect of a citizen's personal life. See O. Kerr, Searches and Seizures in a Digital World, 119 Harv. L.Rev. 531, 533 (2005) ("Computers are like containers in a physical sense, homes in a virtual sense, and vast warehouses in an informational sense."). Without caution, searches of computers threaten to authorize
¶ 59. Because modern computers contain a plethora of private information, exposing them to wholesale searches presents a special threat of exposing irrelevant but damaging secrets. Judge Kleinfeld of the Ninth Circuit puts the point vividly:
United States v. Gourde, 440 F.3d 1065, 1077-78 (9th Cir.2006) (Kleinfeld, J., dissenting). These possibilities do not mean that computers cannot be searched. But given the multiplicity and magnitude of the unanticipated injuries that might be inflicted by allowing exposure of an entire computer hard drive, it is understandable to seek precautions that might mitigate such injuries. And given that exposure of embarrassing information to a detached third party constitutes a lesser injury, we conclude that the use of third-party screeners is not so wholly without basis as to constitute an abuse of the judge's discretion.
¶ 60. The State raises practical objections to these requirements. First, the State argues that ex ante instructions will have no practical effect because the reasonableness of any search will be determined ex post, in response to a motion to suppress, and as a result the instructions "cannot be enforced." The whole point of instructions (2), (3), and (4) is to deny the State access to information outside the justification for the warrant and thus avoid disputes over whether such information can be used in a criminal case or otherwise. As we noted at the outset of this opinion, "It is settled law that the search and seizure of evidence, conducted under a warrant, must conform to the requirements of that warrant." Brunette, 76 F.Supp.2d at 42. The decision in Richards v. Wisconsin, upon which the State relies, stands only for the proposition that suppression might not be required where the noncompliance is based on an unanticipated circumstance, too urgent in nature for the warrant to be amended. 520 U.S. at 395-96, 117 S.Ct. 1416 (accepting police decision not to knock and announce after already having had door slammed in their
¶ 61. We agree with the State that ex post review will always remain open, but this does not mean that the ex ante instructions are without legal significance. Indeed, our holding today is that there is no constitutional distinction between instructions on how a search will be conducted and other instructions that, for example, relate to when the search must occur. See V.R.Cr.P. 41(c) (warrant shall "command the officer to search[] within a specified period of time not to exceed 10 days").
¶ 62. Second, the State argues that the requirement to use a noninvestigator to conduct the search "without the presence or input of the investigator may result in relevant evidence being missed." In responding to this argument, we note that the State chooses the person(s) conducting the search and can ensure that the person(s) have the skill to recognize relevant evidence. Further, the concept of a firewall does not preclude the State from educating the person(s) conducting the search in the nature of the alleged crimes, as long as the person(s) conducting the search do not share extraneous information with the State investigator. We do not conclude that there is a practical defect in the condition.
¶ 63. Third, the State argues that the segregation requirement will prevent a dynamic investigation in which the search can be expanded based upon what information is uncovered. Again, we find that the State overstates the objection. Nothing in instruction (5) states that on receipt of information from the search, the criminal investigator cannot ask for additional searching specifying the relevance of additional evidence in light of what evidence was produced.
¶ 64. We therefore deny the request for extraordinary relief with regard to instructions (2), (3), and (4). This result is based largely on the broad authorization sought by the applicant law enforcement officer and the affidavit supporting that application. The judicial officer concluded that resorting to a neutral third-party screener may be the only way to provide meaningful privacy protections in the face of broad law enforcement requests like this one. See CDT I, 579 F.3d at 1007 ("In the end ... we must rely on the good sense and vigilance of our magistrate judges, who are in the front line of preserving the constitutional freedoms of our citizens while assisting the government in its legitimate efforts to prosecute criminal activity. Nothing we could say would substitute for the sound judgment that judicial officers must exercise in striking this delicate balance."). We hold that such an order does protect a legitimate privacy interest and did not constitute a manifest abuse of discretion.
¶ 65. Next, we turn to the instructions limiting the search techniques that police can employ and prohibiting the use of sophisticated searching software without prior court authorization. The judge directed police to use a search protocol "designed to uncover only the information for which the State has probable cause" by focusing on documents limited by: the time period relevant to the alleged criminal activity, key words, and specific file types. The judge also precluded use of sophisticated search techniques without prior authorization.
¶ 67. As we have already discussed, especially in a nonphysical context, particularity may be achieved through specification of how a search will be conducted. The purpose of the particularity requirement is to prevent general searches. Maryland v. Garrison, 480 U.S. 79, 84, 107 S.Ct. 1013, 94 L.Ed.2d 72 (1987). By limiting the authorization to specific areas and specific things, the particularity requirement ensures that the search will be carefully tailored to its justifications and will not become a wide-ranging, exploratory search that the Fourth Amendment prohibits. See United States v. Carey, 172 F.3d 1268, 1272 (10th Cir.1999) ("The Fourth Amendment requires that a search warrant describe the things to be seized with sufficient particularity to prevent a general exploratory rummaging in a person's belongings."). Particularity is measured in practical terms. United States v. Johnson, 541 F.2d 1311, 1313 (8th Cir. 1976) (per curiam) (explaining that standard to determine whether warrant describes place to be searched with sufficient accuracy "is one of practical accuracy rather than technical nicety").
¶ 68. The warrant application here asserted the need for a broad, unconstrained search based on the investigating officer's general contention that criminals often hide incriminating evidence by using nonidentifying titles, changing file extensions, and encryption or password protection. There was no information presented, however, that there was reason to believe the suspect in this case had used such techniques or even that those engaged in identity theft typically do so. Cf. Wolf v. State, 152 Idaho 64, 266 P.3d 1169, 1173-74 (Ct.App.2011) (concluding there was sufficient probable cause to search computer hardware, software and electronic devices where affidavit explained officer's experience in area of child exploitation and storage of child pornography on computers).
¶ 69. The application suggests, if not admits, that the broadest scope of search may not be necessary. The affidavit explains that in some cases the sought-after information can be found through targeted searches not requiring such exhaustive measures. Further, there was no attempt to limit the search based on the known details of the suspected crime such as the time-period, the victim, or the institutions involved in the suspected identity theft. See Otero, 563 F.3d at 1132-33 (concluding that warrant application to search computer failed to satisfy particularity required where search was not limited by date and crimes suspected); United States v. Clough, 246 F.Supp.2d 84, 87 (D.Me.2003) (holding warrant failed to meet particularity requirement where it contained "no restrictions on the search, no references to
¶ 70. Given that narrowing the search could still accomplish recovery of the incriminating evidence which there was probable cause to believe would be found within the digital equipment seized, the court was within its discretion to reduce preliminarily the scope of the warrant. The judicial officer did not abuse his power by restricting law enforcement's search to those items that met certain parameters based on dates, types of files, or the author of a document. See United States v. Rude, 88 F.3d 1538, 1551 (9th Cir.1996) (concluding that "the specification of dates, individuals, and the [particular] corporation, along with a reasonably precise delineation of the type of records sought, satisfied the specificity requirement").
¶ 71. This was especially appropriate where the State proposed no limiting instructions of its own. The State fails to demonstrate that such limits were overly particular or otherwise untenable. In fact, such limits are essential to meet the particularity requirement of the Fourth Amendment, especially in cases involving record searches where nonresponsive information is intermingled with relevant evidence. Hunter, 13 F.Supp.2d at 582-83 (concluding that particularity requirement was satisfied where records to be seized were identified "by time period and by the individual, entity, or property involved"); Commonwealth v. McDermott, 448 Mass. 750, 864 N.E.2d 471, 487 (2007) (concluding that warrant was sufficiently particular where category limited by time frame and nature of items to be seized).
¶ 72. We recognize that instructions (5) and (6) are less necessary when the search is conducted by persons segregated behind a firewall from State investigators. Nevertheless, they can be an additional safeguard to guarantee that the search conducted by the segregated persons is not too broad. Indeed, the State in its brief recognized such a need when it observed that "the forensic examiner is as likely or unlikely to conduct an illegal general search of the computer as the investigator." We conclude that their imposition was within the judicial officer's discretion.
¶ 73. Again, the State raises a practical objection that the judicial officer will not have the expertise to review search protocols under instruction (6) and that limitations on search protocols are unworkable because of the dynamic nature of a search. All the instruction calls for is that the persons conducting the search, prior to using hash protocols or similar search tools, educate the judicial officer on the need for these methods and obtain approval. Just as a judicial officer is expected to expeditiously respond to a search warrant request, we can expect timely response to a request to employ special search protocols. We also believe that the judicial officer can be educated on the purpose and method of any search tool, such as to responsibly exercise the oversight responsibility.
¶ 74. Absent grounds to conclude that a judicial officer acted arbitrarily, we will not second-guess the judicial officer's discretionary judgment in the context of a motion for extraordinary relief. See Richardson v. City of Rutland, 164 Vt. 422, 424, 671 A.2d 1245, 1247 (1995) (explaining that extraordinary relief in the nature of mandamus is a limited remedy to correct "`an arbitrary abuse of ... power'" (quoting Couture v. Selectmen of Berkshire, 121 Vt. 359, 361, 159 A.2d 78, 80 (1960))). The State is not persuasive in its claims that the limits will unduly hamper detection of crime. The equipment is seized and secured in the State's possession. After exhausting its search options as permitted by the conditions of particularity, nothing precludes
¶ 75. Finally, we address those instructions pertaining to the copying, return, and destruction of property. The judicial officer set instructions requiring that: (1) only responsive information could be copied; (2) nonresponsive data should be returned and the court informed; (3) copies must be destroyed absent judicial authorization otherwise; and (4) the return should specify the information seized, returned, and destroyed.
¶ 76. These instructions would hardly seem novel if imposed on law enforcement at the initial search phase. It goes without saying that law enforcement officers are empowered to seize and copy only items that are responsive to a warrant and, in turn, to inventory the items seized and return this list to the court. Indeed, under the Rules of Criminal Procedure, law enforcement officers conducting a search are required to give the person from whom property is taken "a receipt." V.R.Cr.P. 41(d). The officer must also make and file with the court a return, including a written inventory of the property taken. Id. The rule allows a grieved individual to move for return of property seized illegally. V.R.Cr.P. 41(e).
¶ 77. In this case, the unique aspect of these instructions arises because the warrant authorized law enforcement to seize electronic medium to be searched off-site. As we noted initially, we are really dealing with two searches here. Apparently, the judicial officer wished to emphasize that although the State was authorized to search off-site, this did not provide authority for the State to retain indefinitely all electronic data and law enforcement was still required to return or destroy nonresponsive data as well as to notify the court of the items retained and returned. Given that the judicial officer's instructions essentially echo the requirements of Rule 41, we conclude that it was within the officer's power to impose them.
¶ 78. In reaching our conclusion, we do not conclude that instruction (7) or (8) prevents the segregated search persons from imaging the computer hard drive and other electronic storage media so that the computer and media can be returned to its owner. That procedure gives the State full search capacity while minimizing the interference with the activities of the computer owner. It was used in this case.
¶ 79. Instruction (7) prohibits giving copies of extraneous information to State investigation agents. It does not prohibit the persons conducting the search from making copies or images for their own use as long as they are destroyed, as provided in instruction (9).
¶ 80. Nor do we read instruction (9) as prohibiting the maintenance of evidence for appeals, post-conviction relief and civil liability, as the State claims. In circumstances where the State can show that digital information should be kept for a specific reason — for example, for an appeal of a dispute over the validity of or compliance with ex ante instructions — the instruction authorizes the State to seek a judicial authorization to delay destruction. Otherwise, the overall procedure leaves a sufficient record for future proceedings.
¶ 81. Finally, we reject the State's argument that instruction (10) imposes an arbitrary time limit on the search, even
¶ 82. In sum, we conclude that the judicial officer did not contravene his power in imposing instructions concerning the manner of the law enforcement's search of the computer to satisfy the probable cause and particularity demands of the warrant requirement. However, we hold there was no authority to preclude law enforcement's seizure of items in plain view.
The petition for extraordinary relief is granted in part, and condition (1) is stricken from the warrant. In all other respects, the petition is denied.
BURGESS, J., concurring and dissenting.
¶ 83. Much of what the majority holds today is correct. Nothing in the Fourth Amendment precludes a magistrate from imposing ex ante warrant conditions to further constitutional objectives such as particularity in a warrant and the least intrusion necessary to accomplish the search. See Andresen v. Maryland, 427 U.S. 463, 482 n. 11, 96 S.Ct. 2737, 49 L.Ed.2d 627 (1976) (recognizing that, in searches for papers, innocuous documents will be examined to determine if they are subject to the warrant, and admonishing that responsible officials, "including judicial officials, must take care to assure that they are conducted in a manner that minimizes unwarranted intrusions upon privacy"); see also United States v. Payton, 573 F.3d 859, 864 (9th Cir.2009) ("We believe that it is important to preserve the option of imposing conditions when they are deemed warranted by judicial officers authorizing the search of computers."). Nor may a judge simply forbid, ipse dixit, the seizure of criminal evidence found in plain view during a legally authorized search.
¶ 84. Thus, I generally concur in denying the State's petition to strike conditions five through ten, which focus the search while not defeating the law,
¶ 85. Casting this dissent as promoting a law enforcement "right" to plain view in derogation of defendants' rights, ante, ¶ 45, the majority correctly suggests a competition between law enforcement and privacy rights. But, the competition is settled. We have a right against unreasonable search and seizure under the Fourth Amendment. It is black-letter law that, under the same Amendment, police are authorized or, to use the majority's term, have a "right" to search pursuant to a valid warrant. Since our privacy is already compromised by such a warrant, it is equally beyond cavil that in executing the valid search for specified evidence, another object lawfully viewed, the incriminating character of which is immediately apparent, may be seized without any resulting privacy invasion. Minnesota v. Dickerson, 508 U.S. 366, 374-75, 113 S.Ct. 2130, 124 L.Ed.2d 334 (1993); see also Horton v. California, 496 U.S. 128, 133, 110 S.Ct. 2301, 110 L.Ed.2d 112 (1990) ("If an article is already in plain view, neither its observation nor its seizure would involve any invasion of privacy."). Whatever limitation the majority invents to prohibit seizure of incriminating evidence in lawful plain view, it is outside of the Fourth Amendment.
¶ 86. The majority's closest facsimile to authority are the shunted, if not politely discredited, conditions from United States v. Comprehensive Drug Testing, Inc. (CDT I), 579 F.3d 989 (9th Cir.2009) (en banc), that the government waive plain view and segregate its searchers as predicates to obtaining warrants to search computers. Responding to egregious overreaching by federal agents executing a warrant for computer records of steroid use in major league baseball, CDT I directed magistrates to deny or curtail computer search warrants unless the government agreed to "forswear" the plain view doctrine and employ segregated screener-searchers held incommunicado from the primary investigators. Id. at 998. It was CDT I that apparently inspired the issuing court here to interdict plain view.
¶ 87. Since the trial court's reliance on CDT I, however, those conditions limiting plain view were effectively reversed by the entire Ninth Circuit specially convened to review the issue. United States v. Comprehensive Drug Testing, Inc. (CDT II), 621 F.3d 1162 (9th Cir.2010) (en banc) (per curiam). The original ex ante directives limiting plain view and imposing segregated searcher-screeners were deleted by the full court, and relegated to a mere recommendation marooned in a concurring opinion. CDT II, 621 F.3d at 1180 (Kozinski, C.J., concurring). Even that concurrence concedes that its recommendations are "guidance" only and not mandated. Id. at 1178; see United States v. Ganias, No. 3:08CR00224(AWT), 2011 WL 2532396, at *6 (D.Conn. June 24, 2011) (denying motion to suppress and pointing out that CDT II may provide guidance, "but it does not provide a rule that must be complied with").
¶ 88. Despite claiming that courts are "drawn to" such tools to mitigate invasiveness of computer searches, ante, ¶ 57, the
¶ 89. It bears noting that the majority holding is not, like the suppression of illegally obtained evidence, fashioned to vindicate a constitutional right. The underlying search warrant is entirely lawful without the majority's gag condition and segregated searchers, and presents no violation of any privacy right guaranteed against unreasonable search and seizure. No one complains that the warrant is insufficiently particular. The majority agrees there is no constitutional limitation on observing evidence of other crimes in plain view during a valid search. The majority can point to no infraction of the Fourth Amendment, actual or threatened, to justify its ex ante limits on plain view. Given that the warrant application is otherwise valid, the majority's holding provides little instruction to the trial bench on when and how to apply such segregated searches in the future since no constitutional right requires application of this extraordinary measure.
¶ 90. Further, whatever computer privacy the majority supposes to protect will be already and completely compromised by the warrant and the search, even when executed by the majority's gagged search team. Whether viewed by the case investigator or segregated police, or some other police agent, the court-ordered privacy invasion is the same.
¶ 91. The majority's segregated screening conditions result in no less of a search, no less intrusion into the computer's files, and no less potential for observing other incriminating evidence in plain view of the
¶ 92. Nor does the constitution require such immunity for computer content. If the issuing court was concerned about lack of probable cause or particularity as the majority asserts, ante, ¶ 43, then the court was free to deny the warrant application or limit the search accordingly. Neither probable cause nor the application's particularity is challenged here. The majority's endorsement of the silenced-and-segregated-search-team condition succeeds in defeating actual plain view, but utterly fails to increase particularity or narrow the scope of the search. As noted above, the search — the actual invasion of privacy applied for by the State and authorized by the warrant — is exactly the same, whether conducted by investigators assigned to the case, or by the judicially gagged investigators preferred by the majority.
¶ 93. Patently incorrect is the majority's assertion that investigators will never view incriminating evidence unrelated to identity theft offenses. The majority imagines that ordering the search be conducted by police investigators not assigned to this investigation somehow "obviate[s]," or prevents, plain view from occurring. Ante, ¶ 37. If this were true, there would be no need for the gag order. But since it is clear that plain view of other incriminating evidence by the other police search team can still occur, the supposed prevention can only result from the gag order that prevents its disclosure. Thus, declares the majority, gagging the search team is "not an abrogation of the plain view doctrine," but a safeguard "against the police plainly viewing." Ante, ¶ 44. All winking aside, the search is still authorized by the warrant, privacy is still invaded by government search agents, and any other evidence in plain view is still seen. The old saying about being "just a little bit pregnant" comes to mind. That adage, of course — like pretending a search is not a search, and that evidence in plain view is not seen or even does not exist — is a fallacy.
¶ 94. There is not cited a single Fourth Amendment case to support the majority's sabotage of the plain view doctrine. This is because the Fourth Amendment expressly proscribes unreasonable searches, and it is undisputed that a search authorized by a warrant supported by probable cause and approved by a magistrate is not unreasonable. It is equally settled that where a magistrate authorizes a valid search under the Fourth Amendment, there is no constitutionally protected privacy against such an intrusion. Certainly most people prefer that police not enter their homes or computers to search, but if a warrant issues then the proprietor is without right to resist. See Gasho v. United States, 39 F.3d 1420, 1432 n. 12 (9th Cir.1994) (recognizing that "a citizen has no right to resist a search or seizure pursuant to a warrant").
¶ 95. The majority's notion, to limit judicial warrants according to what boils down to an aversion to police viewing or disclosing evidence of what could be our criminal misconduct — in other words, to have criminals set the standard — is patently unworkable and is not the law. Once a warrant validly issues, it is irrelevant whether the target likes the police, wants
¶ 96. Finding no support in the law of search and seizure, the majority seeks a rationale from rulings in civil litigation over unauthorized exposures of private information. The majority's distinctions between different disclosures and degrees of embarrassment make for an interesting exploration of the multi-faceted nature of privacy and our varied reactions to having secrets revealed to some people as opposed to others, ante, ¶¶ 50-53, but the Fourth Amendment is all about searches and not about disclosure. Truisms about the need to protect citizens from state intrusion are exactly why the constitution limits the government's authority to search us and our belongings.
¶ 97. The Fourth Amendment's protection against unreasonable search and seizure does not turn on some sliding scale of privacy or potential embarrassment. All of our private spaces, regardless of perceived or relative importance, are protected to the same degree: the government may not obtain a search warrant except upon probable cause and with particularity. See New Jersey v. T.L.O., 469 U.S. 325, 335-39, 105 S.Ct. 733, 83 L.Ed.2d 720 (1985) (explaining that the Fourth Amendment does not compare privacies, but protects against "arbitrary invasions by government officials," be they police or civilian authorities, whether searching children, adults or any of their closed containers). Which police agent conducts the search is generally irrelevant to whether the search is reasonable. Id. at 335, 105 S.Ct. 733 (applying the constitutional strictures not only to police searches, but to inspections by any "sovereign authority").
¶ 98. In this case, the constitutional question was answered when the magistrate issued the warrant on what the parties do not dispute was probable cause. Appropriate restrictions on the search itself were imposed by the issuing court to ensure particularity and to avoid an unfettered search as commanded by the Fourth Amendment. Ex ante conditions (5) and (6) limited police to methods likely to find only the evidence specifically sought, and prohibited escalation of the search with more sophisticated tools without prior judicial approval. In contrast, the conditions imposing a segregated, silenced or blinkered search team and no sharing of evidence in plain view adds no particularity, limits no search, serves no privacy and the majority cannot show us where it is called for by the constitution.
¶ 100. Moreover, given no dispute that the State may seize incriminating evidence noticed in plain view during an otherwise valid search, those restrictions are a bald interference by the judiciary in the legal execution of a warrant by the executive branch. The majority can refer to no case or rule authorizing the court to command blindness or feigned ignorance to a constitutionally authorized plain view of criminal evidence. Eliminating plain view ad hoc in a particular search through the ex ante artifice of a separate and gagged search team achieves exactly what the majority acknowledges is improper, ante, ¶ 38: leaving the magistrate "to disregard the considered limitations of the law" (like the court's lack of authority to proscribe plain view), and conferring "on a judicial officer the authority to pick and choose what legal doctrines would apply to a particular police search" (as in commanding police to ignore evidence in plain view in a computer search, while allowing plain view discovery in a house or office search).
¶ 101. The separation and screening condoned by the majority does not protect actual privilege or privacy, does not further a Fourth Amendment privacy interest, and does not lend further particularity to the search. The sole purpose of the segregation and gag order is to discard the plain view doctrine — something the majority already agrees is beyond the issuing court's authority. I must dissent, and am authorized to state that Chief Justice Reiber joins this concurrence and dissent.
There is currently no statutory law on the power of the issuing magistrate. Early statutes referred the question back to the common law. Thus, the law as compiled in the Revised Statutes of 1840 stated that "Justices [of the Peace] may issue all writs, warrants and precepts, necessary to carry into effect the powers granted to them, and where no form therefor is prescribed by statute, they shall frame one in conformity with the principles of law and the usual course of proceedings of courts in this state." R.S. ch. 26, § 61. Although the Legislature provided many forms for writs and precepts, it never provided one for a search warrant. Henry Harman in his treatise on the Common Law and Equity Procedure suggests a form for a warrant to enter a dwelling house to search for stolen goods. H. Harman, The Principles of Common Law and Equity Procedure: A Manual of Court Procedure § 163 (1912). The warrant specifies that if the sheriff finds the described property, he shall "bring the said [goods and chattels] so found, forthwith before me at [my office]." This appears to be a form of ex ante precept.