JEFFREY T. MILLER, District Judge.
This order addresses Defendant's motion to suppress the evidence obtained by searching his cell phones pursuant to a warrant. (Doc. No. 34.) For the reasons set forth below, the motion is denied.
Defendant was arrested shortly after midnight on February 12, 2014, at the San Ysidro Port of Entry after agents found a large quantity of methamphetamine hidden in his car. At the time of the arrest, agents seized three cell phones that he had with him. During a post-arrest interview, he said that two of the phones were his, but that he had found the third phone at a casino.
On May 9, 2014, the government applied for and obtained a warrant to extract and analyze the data from the cell phones. It was to be executed by May 23, 2014.
The supporting affidavit set forth the circumstances of Defendant's arrest, explained that narcotics smugglers commonly use cell phones to communicate instructions on how to cross the border and where and when to deliver the controlled substances, and asserted that information in the phones was likely to identify Defendant's criminal associates and communications relevant to his crime.
As to the methods that would be used, the affidavit stated:
(Doc. No. 34, Exh. A at 10-11.)
The warrant also described the objects of the search:
(
An agent named Hakala extracted and analyzed the data on August 4, 2014. According to Defendant, none of the messages or pictures contained any reference to drug trafficking, and, to date, the government has not disclosed evidence that any phone number discovered during the search was involved in drug trafficking.
Defendant contends that the evidence from the search must be suppressed and the phones must be returned because the search violated Federal Rule of Criminal Procedure 41 and the warrant was defective. The court takes each issue in turn.
Federal Rule of Criminal Procedure 41 requires warrants to be executed "within a specified time no longer than 14 days." Fed. R. Crim. P. 41(e)(2)(A)(i). Consistent with Rule 41, the warrant required agents to execute it on or before May 23, 2014. Defendant contends that agents violated Rule 41 because they did not conduct the forensic imaging and data copying until months later, on August 4, 2014. (Doc. No. 34-1 at 2-3.)
The government counters that although Rule 41 provides that an electronic storage device must be seized within the 14 days allowed by the warrant, it expressly provides that the government may copy and review the data at a later date consistent with the warrant. (Doc. No. 40 at 6.) Hence, according to the government, the later copying and inspection of the data was consistent with the warrant, which stated: "The personnel conducting the identification and extraction of data will complete the analysis within ninety (90) days, absent further application to this Court." (Doc. No. 34, Exh. A at 11.)
The relevant portion of Rule 41 provides:
Fed. R. Crim. P. 41(B) (emphasis added). Rule 41 thus provides that electronic storage devices must be seized or copied at the site of seizure ("on-site") within the 14 days allowed for execution of the warrant, and may be copied and reviewed later at another location ("off-site"), so long as the later copying and review are consistent with the warrant.
In this case, the data was extracted and reviewed 88 days after the warrant issued, within the 90 days the warrant allowed. The search of the phones was, therefore, consistent with Rule 41 and the warrant, and Defendant is not entitled to the return of his phones or suppression of the evidence under Rule 41.
Second, Defendant contends that the warrant to search his phones was invalid in light of
Here, of course, there was a warrant, but Defendant contends that it was invalid because it was insufficiently particular and overbroad, so that it resulted in an impermissible exploratory rummaging through his personal information. (Doc. No. 34-1 at 3-17.)
The Warrant Clause of the Fourth Amendment requires that "no Warrants shall issue, but upon probable cause, . . . and particularly describing the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV. To satisfy these requirements, a warrant must comply with two distinct rules. First, it must describe the place to be searched or things to be seized with sufficient particularity, taking account of the circumstances of the case and the types of items to be seized; second, it must be limited by the probable cause upon which the warrant is based. See
Defendant identifies two main defects with the warrant that he contends require suppression under these principles. The court takes each of them in turn.
First, Defendant contends that the words "including but not limited to" and "tending to" that the warrant used to describe the information to be searched for gave searchers too much discretion and did not put meaningful restrictions on the search. (Doc. No. 34-1 at 5-9.) He contends that by the time the government applied for the warrant, it had already searched at least one phone, interviewed most of his family, and searched his home and cars. (
The government counters that the use of such phrases does not render a warrant per se unreasonable, and that the Ninth Circuit has rejected similar arguments when context limited the scope of the search. (Doc. No. 40 at 9.) For example, in
Similarly, in this case, context provided by the warrant limited the search to a limited area—the contents of Defendant's cell phones—and plainly directed searchers to look for information relevant to drug trafficking and to identifying Defendant's communications, movements, and co-conspirators.
Moreover, the court is not persuaded that the warrant should have limited the search to recent data, as Defendant asserts it should have, based on interviews with his family and searches of his home and car. Defendant does not contend that the evidence the government had at that point suggested that his smuggling activities were only recent. Absent some information to that effect, it was not necessary to limit the search to recent data.
Consequently, the court concludes that the language Defendant objects to did not render the warrant insufficiently particular or overbroad.
Second, Defendant contends that the warrant was insufficiently particular and overbroad because it lacked a sufficient methodology. (Doc. No. 34-1 at 9-15.) Specifically, he objects that the warrant did not identify why a full-blown forensic search was justified, did not limit the search to newer data, did not provide a method for segregating unreviewable data, did not provide specific guidance on how to determine which data had a nexus to the crime, did not indicate whether the government would image the device, and did not account for the segregation, return, or destruction of data that fell outside the scope of the warrant. (
Here there are several cases in point. First, in
The Ninth Circuit has revisited the issue at least twice since then and still declined to require a specific search protocol, while at the same time recognizing that electronic data poses unique challenges in the Fourth Amendment context. In
And, in
In sum, "Defendant's contention that a search protocol was required is contrary to the law in the Ninth Circuit."
Defendant's contentions, therefore, provide no basis for suppressing the evidence and fruits obtained from the searches of his cell phones.
Defendant's motion to suppress evidence obtained from his cell phones and for the return of the phones, (Doc. No. 34), is DENIED. If the government plans to use any materials obtained from the phones at trial, it must notify Defendant and the court by