KESSLER, J.
¶ 1 At issue in this appeal is whether the circuit court erred in denying Kelly M. Rindfleisch's motion to suppress all evidence resulting from a search warrant ordering Internet Service Providers (ISPs) Google and Yahoo to produce emails from Rindfleisch's email accounts with them from January 1, 2009, until October 10, 2010, together with the account ownership identifying data. Rindfleisch claims the warrants lacked sufficient particularity and thus were "general warrants" in violation of her Fourth Amendment rights. We affirm.
¶ 2 Rindfleisch was charged with four counts of misconduct in public office, in violation of WIS. STAT. § 946.12(3) (2009-10),
¶ 3 The complaint states that Rindfleisch was hired by the County Executive's Chief of Staff, Tim Russell, as a policy advisor for the County Executive in early 2010. Rindfleisch was promoted to Deputy Chief of Staff in March 2010. As a Milwaukee County employee, Rindfleisch was issued a laptop and a County email account. According to the complaint, Rindfleisch used
¶ 4 On August 11, 2010, Milwaukee County District Attorney Chief Investigator David Budde submitted an affidavit requesting multiple search warrants relating to political activity conducted by Darlene Wink, the Constituent Services Coordinator for Walker. The affidavit incorporated by reference both an affidavit dated May 14, 2010, in support of a petition to enlarge the scope of the John Doe proceedings
¶ 5 Shortly thereafter, the John Doe proceedings expanded to include Russell.
¶ 7 The warrants issued to Google and Yahoo on October 20, 2010,
¶ 8 The warrant issued to Google additionally included the following production request:
¶ 9 Both warrants requested the ISPs to search for evidence of the specific crimes of misconduct in public office and political solicitation involving public officials and employees. The warrants state that the search was to be "for the following evidence of crime":
¶ 10 The ISPs complied with the warrants by sending the District Attorney: (1) subscriber identifying information for the provided email address(es); (2) session timestamps and originating IP addresses for logins for the dates requested in the warrant; and (3) CDs containing the emails and contacts lists available to the ISP for the dates requested.
¶ 11 On October 28, 2010, Google responded to the warrant stating: "To the extent any document provided herein contains information exceeding the scope of your request, protected from disclosure or otherwise not subject to production, if at all, we have redacted such information or removed such data fields." At oral argument, counsel for Rindfleisch stated that on November 1, 2010, the State asked to have the John Doe proceedings expanded to include Rindfleisch. Others were also included in the expanded proceedings. The State requested a search warrant for Rindfleisch's Milwaukee dwelling in West Allis and her Columbia County property. Counsel advised at oral argument that these warrants were executed, with Rindfleisch present, and her personal computer(s) seized. Her counsel also stated that the computer warrants were not being challenged and are not part of this appeal.
¶ 12 Yahoo responded on November 19, 2010, swearing in an affidavit: "Pursuant to the Federal Stored Communications Act, 18 USC §§ 2701 et. Seq., we have redacted information, including removing certain data fields, that exceeds he scope of this request, is protected from disclosure or is otherwise not subject to production."
¶ 13 On January 26, 2012, Rindfleisch was charged with four counts of misconduct in public office. The specific dates
¶ 14 Rindfleisch filed a motion to suppress all evidence obtained as a result of the search warrants issued to Yahoo and Google. Rindfleisch argued that the warrants "purportedly permitted by ... section 968.375, Stats., eviscerates her privacy rights under the Fourth and Fourteenth amendments and correlative provisions under
¶ 15 After briefing and a hearing, the circuit court orally denied Rindfleisch's motion, finding:
¶ 16 Rindfleisch subsequently pled guilty to one count of misconduct in public office; the State dismissed the remaining three counts. The circuit court withheld sentence and placed Rindfleisch on probation for a period of three years, imposed a six-month period of confinement with Huber release privileges in the House of Correction, and ordered her to pay costs and surcharges. This appeal is limited by WIS. STAT. § 971.31(10) to the circuit court's denial of Rindfleisch's motion to suppress the evidence obtained from Google and Yahoo.
¶ 17 "On review of a motion to suppress, [an appellate] court employs a two-step analysis." State v. Dubose, 2005 WI 126, ¶ 16, 285 Wis.2d 143, 699 N.W.2d 582. "First, we review the circuit court's findings of fact. We will uphold these findings unless they are against the great weight and clear preponderance of the evidence." Id. We "`will uphold findings of evidentiary or historical fact unless they are clearly erroneous.'" Id. (citation omitted). "Next, we must review independently the application of relevant constitutional principles to those facts. Such a review presents a question of law, which we review de novo, but with the benefit of [the analysis] of the circuit court." Id. (internal citation omitted).
¶ 18 When a party moves to suppress evidence based on an alleged Fourth Amendment violation, the proponent of the motion has the burden of establishing that
See 6 Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment, § 11.2(b) (4th ed.2004) (footnotes omitted).
¶ 19 Rindfleisch argues that her Fourth Amendment rights have been violated because the warrants here are "general warrants," which "lack the level of particularity required to pass constitutional muster." Specifically, Rindfleisch asserts that:
(Emphasis added.)
(Emphasis added.) It is upon this last clause that Rindfleisch bases her entire argument. Specifically, Rindfleisch contends that the warrants at issue lacked sufficient particularity and were unconstitutional general warrants.
¶ 21 The United States Supreme Court, in Steagald v. United States, 451 U.S. 204, 101 S.Ct. 1642, 68 L.Ed.2d 38 (1981), explained the background and definition of a general warrant:
¶ 22 Typically, when officers exceed the scope of a search warrant, the remedy is to suppress only items seized outside the scope of the warrant. State v. Petrone, 161 Wis.2d 530, 548, 468 N.W.2d 676 (1991), overruled on other grounds by State v. Greve, 2004 WI 69, ¶ 31 n. 7, 272 Wis.2d 444, 681 N.W.2d 479. However, if the search is conducted in "flagrant disregard" of the limitations in the warrant, all items seized — even items within the scope of the warrant — are suppressed. Petrone, 161 Wis.2d at 548, 468 N.W.2d 676. When a search is conducted with flagrant disregard for the limitations found in the warrant, the Fourth Amendment's "particularity requirement is undermined and a valid warrant is transformed into a general warrant thereby requiring suppression of all evidence seized under that warrant." United States v. Medlin, 842 F.2d 1194, 1199 (10th Cir.1988).
¶ 23 "The United States Supreme Court has interpreted the Warrant Clause to be precise and clear, and as requiring only three things: (1) prior authorization by a neutral, detached [judicial officer]; (2) a demonstration upon oath or affirmation that there is probable cause to believe that evidence sought will aid in a particular conviction for a particular offense; and (3) a particularized description of the place to be searched and items to be seized." State v. Sveum, 2010 WI 92, ¶ 20, 328 Wis.2d 369, 787 N.W.2d 317 (citations and quotation marks omitted).
¶ 24 Keeping in mind the Supreme Court's definition of a general warrant and its interpretation of the Warrant Clause, we measure the warrants at issue against each requirement provided by the Warrant Clause.
¶ 25 The warrants were signed on October 3, 2010 by an experienced jurist, Reserve Judge Neal Nettesheim.
¶ 26 David E. Budde, the Chief Investigator assisting the John Doe Judge, swore to an affidavit in support of both the Google warrant and the Yahoo warrant. His affidavit contained numerous pages of detailed information, along with multiple exhibits.
¶ 27 The affidavit stated the warrants request related "to violations of Wisconsin Statutes § 964.12, Misconduct in Public Office, by Milwaukee County employee Timothy Russell of the Department of Health and Human Services (and formally of the Milwaukee County Executive's Office)." The affidavit explained that "county desktop computers used by Tim Russell were seized pursuant to search warrants" in this investigation, and forensic examination of those computers revealed fragments of Yahoo messages between Russell's Yahoo account and Rindfleisch's rellyk_us@yahoo.com account. In addition, emails obtained by search warrant from Russell's Google account "indicate[] that on numerous occasions, Rindfleisch
¶ 28 In a fact scenario similar to the case at bar, the United States Court of Appeals for the Ninth Circuit, in United States v. Adjani, 452 F.3d 1140 (9th Cir.2006), concluded that a search warrant to search the electronic files of Jana Reinhold passed constitutional muster. In that case, the government applied for a warrant to search Reinhold's electronic files based on her connection to Christopher Adjani. Id. at 1142. Adjani was suspected of threatening to sell confidential payment information from Paycom Billing Services. Id. at 1143. Based in part on email communications discovered between Adjani and Reinhold, both were charged with conspiring to commit extortion and transmitting a threatening communication with intent to extort. Id. at 1142. Both Adjani and Reinhold moved to suppress specific emails between them, discovered via Reinhold's personal hard drive, arguing that the warrant lacked probable cause because the warrant did not label Reinhold as a suspect. Id. at 1146-47.
¶ 29 In a decision reversing the federal district court, the Ninth Circuit concluded that the warrant stated sufficient probable cause because the warrant was only required to establish probable cause to believe that evidence of the crimes at issue could be found on Reinhold's hard drive, regardless of whether Reinhold was a suspect. Id. at 1147.
¶ 30 Likewise, the warrant at issue in this case established, in no uncertain terms, that the State sought evidence of two particular crimes — misconduct in public office and political solicitation involving public officials and employees. The warrant requested the production of the following items, as material to this case, to establish evidence that the two particular
¶ 31 Like in Adjani, the warrants at issue in this case sought items based on the probable cause to believe that specific crimes were committed. The scope was limited to evidence of misconduct in public office or political solicitation involving public officials and employees, in violation of WIS. STAT. §§ 946.12, 11.36, and 11.61.
¶ 32 The two ISPs, Google and Yahoo, were specifically identified by name and address. The places within their data storage system were particularly described as "For the time period of January 1, 2009, to the present, this warrant applies to information associated with the account identified [in the warrant] stored at premises owned, maintained, controlled, or operated by" the particular ISP. Rindfleisch has offered no evidence suggesting that the search exceeded the locations here described.
¶ 33 As to the items to be seized, the affidavit identified specific email accounts — four with Yahoo and two with Google — with which the warrants were concerned. Two were accounts in Russell's name: tdrussell63@yahoo.com, and trussell@yahoo.com. One account was in Pierick's name, bpierick@yahoo.com. Two of the accounts were in Rindfleisch's name: rellyk_us@yahoo.com and kmrindfleisch@gmail.com. One account, scottforgov@gmail.com, was an account that Budde believed was actually controlled by Pierick, who was also a blogger for the Walker campaign.
¶ 34 Additionally, as we have seen, information held by the ISPs which specifically identified the owner of the accounts and the personal contact information associated with the accounts, was also requested. This was necessary to ensure that the accounts were not actually owned or controlled by someone other than the suspected owner.
¶ 35 Rindfleisch has offered no evidence suggesting that information beyond those requests was produced.
¶ 36 As noted, when Google responded to the warrant, it stated:
When Yahoo produced its records, it swore in an affidavit that:
¶ 37 The Dissent relies on United States v. Ganias, 755 F.3d 125, 134-135 (2d Cir.
¶ 38 Rindfleisch urges this court to adopt the protocol described in In the Matter of the United States Of America's Application For A Search Warrant To Seize And Search Electronic Devices From Edward Cunnius, 770 F.Supp.2d 1138 (W.D.Wash.2011),
¶ 39 Rindfleisch argues, based on Cunnius, that the Fourth Amendment, as applied to electronic communications, should be read to require an extra layer of protection not historically accorded paper documents, namely an electronic "filter" (the details of which she does not specify) to keep her "personal" or "private" material from being disclosed. She has identified no specific "personal" or "private" material that has been improperly produced. Alternatively, still based on Cunnius, she suggests that a third party should have been appointed by the warrant-issuing judge to review what Google and Yahoo produced. That third person would be the arbiter of what, within the data produced, would be available to the government. We are not persuaded.
¶ 40 The Fourth Amendment parameters of search and seizure law, largely developed in the context of obtaining tangible evidence, are not necessarily inapplicable
¶ 41 Further, in this case, both ISPs stated in writing essentially the same thing: that they provided only what was required by the warrant, and they removed electronic data beyond the scope of the warrant. Rindfleisch had the opportunity before the circuit court to identify specifically what evidence she believed was improperly seized. She elected not to do so, and instead argued that the warrant on its face did not satisfy the Fourth Amendment.
¶ 42 Rindfleisch has failed to present any evidence at any time during these proceedings that tends to suggest that her Fourth Amendment rights were violated by the seizure authorized in these warrants. We have concluded that the State established, as the circuit court found, that the warrants in question were based on probable cause established by affidavit, were authorized by a judge, and particularly described the place to be searched and items to be seized. We therefore conclude, as did the circuit court, that the warrants at issue satisfy all of the requirements of the Fourth Amendment. We further find no evidence in this record suggesting in any way that the ISPs provided information beyond the scope of the warrant, much less that the information produced was in flagrant disregard of the scope of the warrant. Consequently, the circuit court's refusal to suppress everything obtained by the State from the ISPs was properly denied.
Judgment affirmed.
FINE, J. dissenting.
¶ 43 The essence of our country is "that a law repugnant to the constitution is void; and that courts, as well as other departments, are bound by that instrument." Marbury v. Madison, 5 U.S. 137, 1 Cranch 137, 180, 2 L.Ed. 60 (1803). (Emphasis in original.) Simply put, we are governed by our Constitution, not expediency.
¶ 44 We are bound by the Fourth Amendment:
Maryland v. Garrison, 480 U.S. 79, 84, 107 S.Ct. 1013, 94 L.Ed.2d 72 (1987) (quoted sources and footnote omitted). Yet, the Majority eschews the Fourth Amendment's command and permits the government to rummage through Kelly Rindfleisch's digital files for evidence of her crime even though the search warrants sought evidence in those files of another's crime by another person (Tim Russell) and lacked probable cause to believe that Rindfleisch's digital files had any evidence of any crime that Rindfleisch might have committed. See Arizona v. Gant, 556 U.S. 332, 345, 129 S.Ct. 1710, 173 L.Ed.2d 485 (2009) (The Framers were "concern[ed] about giving police officers unbridled discretion to rummage at will among a person's private effects.") (footnote omitted).
United States. v. Ganias, 755 F.3d 125, 134-135 (2d Cir.2014) (emphasis added, quoted sources and citations omitted; ellipses in Ganias) (The government is barred from accessing data not within the scope of the search warrant.). Contrary to this enshrined Fourth-Amendment law, the search warrants for Rindfleisch's digital files did not:
The danger in this type of case is palpable:
United States v. Galpin, 720 F.3d 436, 447 (2d Cir.2013) (quoted sources omitted; second set of brackets in Galpin). Rindfleisch's lawyer told us at oral argument that of the approximately 16,000 documents received from the Rindfleisch email accounts pursuant to the search warrants "there were probably" fewer "than 500 pieces of paper that had Kelly Rindfleisch's political involvement in them." The State thus hardly "inadvertently" stumbled on the ream of pages that led to Rindfleisch's charges. See Coolidge v. New Hampshire, 403 U.S. 443, 469-470, 91 S.Ct. 2022, 29 L.Ed.2d 564 (1971) (The "plain view" doctrine does not apply to the government's discovery of implicating material that is not covered by a search warrant if the discovery was not "inadvertent.").
¶ 45 The Fourth Amendment prohibits the government to legitimately go into a person's voluminous files looking for evidence that someone else may have violated the law (here, Russell, the search warrants' object), and then root around those voluminous files to see if the subpoenas' subject (here Rindfleisch) may have also violated the law. Yet, the State admits in its brief that it did precisely that: "As the warrants and supporting affidavit make clear, however, the John Doe investigation had targeted Tim Russell, not Rindfleisch, and the warrants sought Rindfleisch's communications for the purpose of filling gaps in Russell's e-mail communications." Also, the State was asked at oral argument:
(Formatting modified.) The search of Rindfleisch's voluminous digital files was illegal because the search warrants were silent as to whether there was probable cause to believe that she was culpable.
Ganias, 755 F.3d at 136-137 (quoted sources and citations omitted, brackets and ellipses in Ganias). Here, the exclusionary rule thus applies because: (1) the State both widely and knowingly exceeded the scope of the Rindfleisch search warrants that sought only the Russell emails, and (2) the State did not objectively act in good faith based on Fourth-Amendment law that was clear at the time of the search.
¶ 46 The Majority legitimizes a general warrant and nullifies our Constitution. I respectfully dissent and would grant Rindfleisch's motion to suppress the data provided pursuant to the search warrants that concerned Rindfleisch and not Russell. See State v. Petrone, 161 Wis.2d 530, 548, 468 N.W.2d 676, 682-683 (1991) ("The general rule is that items seized within the scope of the warrant [here, relating to Russell] need not be suppressed simply because other items outside the scope of the warrant [here, relating to Rindfleisch] also were seized, unless the entire search was conducted in `flagrant disregard for the limitations' of the warrant.") (footnotes omitted, brackets supplied).
All references to the Wisconsin Statutes are to the 2011-12 version unless otherwise noted.
The John Doe proceedings were initiated by prosecutors in 2010 to investigate potentially illegal campaign activities conducted by Walker aides, appointees, and employees during his time as Milwaukee County Executive. The May 14, 2010 request to enlarge the scope of the John Doe proceedings was related to "blog posting activity by Darlene Wink as `rpmcvp' while serving as an employee in the Office of the County Executive."
The error in the Dissent's analysis is evident upon review not only of the United States Court of Appeals decision discussed above, but more compellingly upon review of the United States Supreme Court's opinion in Zurcher v. Stanford Daily, 436 U.S. 547, 98 S.Ct. 1970, 56 L.Ed.2d 525 (1978), where the Supreme Court explained:
Id. at 554, 98 S.Ct. 1970. The Court also observed that "the State's interest in enforcing the criminal law and recovering evidence is the same whether the third party is culpable or not." Id. at 555, 98 S.Ct. 1970. Here, the affidavits established probable cause to believe that Russell had committed a crime, and probable cause to believe that evidence of Russell's crime probably could be found on emails Rindfleisch had sent to or received from Russell. More is not required by the Fourth Amendment.