As I’ve noted in prior posts, when government agents seize someone’s
property as part of a criminal investigation, the property owner can file a
motion for return of property under Rule 41(g) of the Federal Rules of Criminal
Procedure.
This post examines an opinion
issued by a federal district court judge in a case from Florida in which a
lawyer filed just such a motion. Doe v. U.S., __ F. Supp.2d __, 2012 WL
4759503 (U.S. District Court for the Southern District of Florida 2012).
This is how the case arose:
On January 30, 2011, at approximately
4:00 p.m., John Doe, a Florida licensed attorney specializing in civil and
criminal law, arrived at
Miami International Airport on a flight from Paris. Doe was traveling with two
pieces of luggage, one checked prior to departure and one he carried on the
plane with him. Doe's carry-on bag contained hard copy documents, a laptop
computer, a handheld Blackberry device, and a cellular phone.
Immediately
upon exiting the plane, Doe was met by an agent from the Department of Homeland
Security. The agent asked to see Doe's passport and customs declaration form. Doe
complied. . . .The agent then instructed Doe to follow her down the airport
concourse.
At the end of the concourse Doe and the
agent were met by three other agents from DHS. All four escorted Doe to the
baggage claim area. After he retrieved his checked bag from the carousel, Doe
was taken to a secondary inspection area and handed a leaflet regarding DHS'
border search policies. The agents then proceeded to search both bags.
Doe v. U.S., supra. (Doe, of course, is an alias, used in this
opinion and in “all court filings” in the case to avoid possible “damage to his
reputation.” Doe v. U.S., supra.)
in a room adjacent to the secondary inspection
area. Prior to Doe's arrival . . . Dietrich was asked, by a DHS agent in
Orlando, to conduct a customs investigation and border search of Doe upon his
arrival . . . in relation to an ongoing criminal investigation of Doe and one
of his clients. Pursuant to Dietrich's instructions, the DHS agents conducting
the search seized the hard copy documents, laptop computer, Blackberry, and
cellular telephone Doe was traveling with.
After being told the items would be
copied, Doe informed the agents that he was an attorney and that the items
contained attorney/client privileged information. One agent agreed to make note
of that fact, but the items were nevertheless seized and brought to Dietrich in
the adjoining room.
Dietrich looked through the printed documents and
made copies of the ones he thought might deal with export/import violations and
banking records. In addition, Dietrich turned over the seized electronic
devices to DHS Special Agent David Castro, a computer forensics agent with the
DHS, who attempted to access the laptop's hard drive at the airport. Castro
could not copy the contents of the laptop with the equipment at MIA, however,
and decided the devices needed to be taken offsite to the local DHS
investigations office to be properly copied.
Doe v. U.S., supra.
About an hour and a half after seizing Doe's belongings, the agent
who took them came back and returned Doe’s hard copy documents. Doe v.
U.S., supra. He told Doe “the other
items (the laptop, Blackberry, and cellular phone) could not be returned at
that time because DHS was having difficulty” copying them. Doe v.
U.S., supra. He gave Doe “a DHS detention notice and custody receipt for
detained property” and said the devices “would be available at a later date.” Doe v. U.S., supra. The receipt indicated they were “being
detained for forensic examination and listed Agent Castro as the detaining
agent.” Doe v. U.S., supra. Mr.
Doe then left the airport. Doe v. U.S., supra.
Castro took the devices back to his office and copied their
contents. Doe v. U.S., supra.
After making the copies, he conducted a cursory
examination of the images and pictures on the laptop to ensure there was no
contraband -- i.e., child pornography -- on it. After ensuring there was no
child pornography on the computer, Castro determined that the electronic devices
could be returned to Doe.
On February 1, 2011, Doe contacted
Castro to retrieve the seized items. Castro told Doe to contact DHS Special
Agent Roldan Vasquez to [arrange] to retrieve the items. On February 2, Doe
spoke to Vazquez, who [said] the items were ready to be picked up in Doral,
Florida, approximately 10 miles away from MIA. Doe retrieved [them] later that
day, but the government retained the imaged copies of the devices.
Doe v. U.S., supra.
Over the next two weeks, Doe's lawyer tried, without
success, to “secure the return of the copies and ensure that any privileged
information was not being reviewed.” Doe
v. U.S., supra. After the government “failed to provide any assurance that
the privileged information was not being reviewed,” Doe filed an “emergency
motion for the return of property” -- the seized documents -- pursuant to Rule
41(g). Doe v. U.S., supra.
The federal judge who has the case held a hearing on Doe’s
motion. Doe v. U.S., supra. The
government said it had “a copy of the contents of the seized items (the backup
data) on a computer server in Miami,”, the government could access the copy and
“copies of the printed documents were sent from an agent in Miami to another
agent in Orlando, Florida, via email.” Doe v. U.S., supra. The next day, the judge entered “an agreed
order” that required the government to deliver the following “to the custody of
the court”:
hard copies of the emails and
attachments, as well as a copy of the backup data the government maintained on
its computer server. After delivering these items to the court, the government
was ordered to delete the emails and attachments from its computers, and delete
the backup data from the computer server. . . .
[T]he government was [then] ordered to
submit statements under penalty of perjury that such tasks had been completed.
The government complied . . . and submitted affidavits . . . indicating that
all of the seized documents and data had been turned over to the court and
deleted from the government's computers. . . .
Doe v. U.S., supra.
A couple of months later, the government filed an
application for a search warrant and an affidavit in support of the warrant
application with the judge. Doe v. U.S.,
supra. The application said “the
government seeks to search the contents of the copies and electronic data now
in the custody of the court.” Doe v. U.S., supra. It asked that the documents be sealed “`to
prevent the compromise of the ongoing investigation.’” Doe v.
U.S., supra. Doe then filed the
motion for the return of property i.e., “the copies made of the seized
documents.” Doe v. U.S., supra. He argued that “the targeted search and
seizure of his property at MIA violated his 4th Amendment right to be free from unreasonable searches and seizures.” Doe
v. U.S., supra.
As Wikipedia explains, and as I have noted in prior posts,
the “border search exception” is one of the exceptions to the default
requirement that officers obtain a warrant before searching and/or seizing
property. Doe argued that the
government’s actions
exceeded the scope of the border search
exception to the 4th Amendment. After Castro determined there was no child
pornography (or other contraband) on the electronic devices, the government
returned the seized items to Doe. Yet the government retained imaged copies of
the electronic devices on the belief that the devices contained evidence
relevant to an ongoing criminal investigation.
Doe v. U.S., supra.
As the Supreme Court noted in Carroll v. U.S., 267 U.S. 132 (1925), the rationale for the border
search exception is that the United States – like other sovereign countries –
is entitled to stop travelers at the border and search them and their
belongings to ensure that contraband is not being brought into or taken out of
the country.
Doe seems to be arguing
that these officers exceeded the scope of that rationale, and the border search
exception, because (i) they returned Doe’s hard copy documents and electronic
devices after their determined that none of them contained contraband but (ii)
kept copies of the contents of the devices.
The opinion does not explain, but I am suspect he argued that since the
search of the hard copies and the devices revealed no contraband, the agents
had no legitimate reason for making and retaining copies of the some of the
hard copy documents and of the data on the devices.
That seems a credible argument, but the judge who has the
case decided that he did not need to “reach this constitutional question.” Doe v.
U.S., supra. He found that
[e]ven if the government violated Doe's
4th Amendment rights by seizing and copying his documents, another exception --
the independent source doctrine -- applies. Pursuant to this doctrine, evidence
initially obtained by an illegal search or seizure may later be used by the
government if it can show the evidence would have been ultimately obtained
independently of the initial illegality and in compliance with the 4th Amendment.
. . . .
In other words, `[s]o long as a later,
lawful seizure is genuinely independent of an earlier, tainted one . . . there
is no reason why’ the government should not be able to use the evidence
previously obtained. Murray v. U.S.,
487 U.S. 533 (1988). To prohibit the government from using evidence `that the
police ultimately obtained by independent legal means would not put the police
in the same position they would have been in if they had not committed any
illegal conduct; instead, it would put them in a worse position.’ U.S.
v. Markling, 7 F.3d 1309 (U.S. Court of Appeals for the 7th Cir.1993).
Doe v. U.S., supra.
The judge noted that courts have held that the government
can use “evidence initially discovered during an illegal search or seizure is
where agents subsequently obtain the evidence pursuant to a valid search
warrant based on information independent of the initial tainted search or
seizure.” Doe v. U.S., supra. He also
noted that the government had filed an application for a search warrant in this
case and that
[h]aving reviewed the government's application for the
search warrant and the supporting affidavit, I find the affidavit establishes
probable cause (independent of the initial seizure) to obtain and search Doe's
files. I am therefore granting the government's application for a search
warrant.
Doe v. U.S., supra.
The judge also explained that for the independent source
doctrine to apply, “evidence obtained from the illegal search or seizure may
not `taint’ the legal search or seizure.”
Doe v. U.S., supra. And he noted that the “alleged illegal
seizure” in this case could
have tainted the application and
affidavit for the search warrant in two possible ways. First, the MIA seizure
may have given the government evidence that it then used to obtain a warrant.
Second, the seizure might have produced information that caused the government
to seek a warrant. . . .
I find, however, that prior to seizing
the documents at issue the government had probable cause to believe evidence
relevant to its ongoing investigation would be found in Doe's possession.
Moreover, besides the testimony that Dietrich briefly thumbed through the hard
copy documents for evidence of customs violations and that Castro briefly
looked through the images on the laptop for child pornography, there is no
evidence that the government . . . otherwise searched or reviewed the documents
for evidence relating to its ongoing criminal investigation.
Because the government had probable
cause independent of the airport seizure to obtain a warrant for Doe's
documents, and because there is no evidence indicating that the government's
decision to apply for a search warrant was based on information obtained as a
result of the seizure, I find that the independent source doctrine applies.
Doe v. U.S., supra.
The judge therefore denied Doe’s motion for return of
property. Doe v. U.S., supra.
1 comment:
this is the exact reason why i tell all my clients over and over:
Whole Disk Encryption Whole Disk Encryption Whole Disk Encryption Whole Disk Encryption Whole Disk Encryption Whole Disk Encryption Whole Disk Encryption Whole Disk Encryption
Always, Always use Whole Disk Encryption. You can get it from PGP or TrueCrypt. true Crypt is free and it will save you from Govt intrusion. http://www.truecrypt.org/
I beg you people to please go and get this software. Pick a very good password (symbols, numbers, upper/lower case letters) and you will be safe 100% guaranteed!!!
Post a Comment