Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply US-PHARMACIES UGL OZ
Raptor Labs UGFREAK OxygenPharm
napsgeargenezapharmateuticals domestic-supplyUS-PHARMACIES UGL OZUGFREAKRaptor LabsOxygenPharm

Email Evidence in Court

Dr.Evil

New member
People on the boards need to be aware that nothing they have on their computers is 100% safe including encrypted emails. Anytime you save a document onto your hard drive it leaves a trace. Even if you save over 1000 times or delete it, a computer expert will be able to extract all 1000 saved copies and deleted documents. What’s even more scary is that even deleted emails can be recovered from the servers. Even if you get programs that supposedly wipes out the hard drive or servers completely, old info can still be retrieved.

Now that I’ve succeeded in getting you paranoid, here’s something to consider as well: recovering deleted emails is extremely time consuming and expensive. This is something that is not likely going to be done unless you’re a terrorist or murderer. Most importantly, electronic evidence, especially email evidence have an extremely difficult time making its way into trial because of issues of authenticity and non applicable exceptions to the hearsay rule.

If you got popped, the feds will most likely seize your computer (they’d be stupid if they didn’t). They will also try to get into your emails and dig them up for evidence as well. If you think you have anything on there that is incriminating, relax. It’s not the end of the world. Whatever you do don’t open your mouth to talk to the feds when they ask you anything about what’s on your computer or any other business records.

A lot of attorneys are not very computer savvy and don’t know to challenge the admissibility of computer and email records. The fact is there have been many cases where these records are only discoverable, but not admissible in court. See Aviles v. Mckenzie; Strauss v. Microsoft Corp.; Allen v. State; U.S. v. Kim; Plymouth Police Brotherhood v. Labor Relations Commission; Monotype Corporation PLC v. International Typeface Corporation.

The Supreme Court ruled that all computer-generated evidences are hearsay unless they fall into “hearsay exception” rules. The only applicable exception is if the electronic evidence is a “business record.” This term is very arguable. If you simply had a list of AS on your computer or even prices for them, it may not qualify as business records. This will depend on the ability of your attorney to convince the judge. Email records are certainly not business records. As of 1996 no federal court had applied the business records exception to email messages.

Striking out email based on the hearsay rule is very good strategy, but the best may be to challenge its authenticity. Even if you had dealt with an undercover agent over email and fell victim to a controlled buy, it still may not be enough to even get into evidence, let alone convict you. First the feds need to prove that what they received from your house did in fact come from YOU. Next they’d need to prove that the person they talked to over email to secure the deal was in fact YOU and no one else. If you did not take the proper precautions it will probably be too late to disprove that you actually were the one who shipped the package, but if they don’t have your fingerprints or handwriting on the package or the contents inside the package then they can’t prove you’re the one who sent the package. Next comes the part of email authenticity. Let’s say your email addy is [email protected] and everyone knows it’s [email protected] doesn’t mean it’s actually you. If an agent communicates w/ [email protected] for a controlled buy, it could very well have been a hacker trying to mess with you. I just learned the other day that you don’t even have to hack into someone’s email addy to compose messages from it. There are software programs that lets you compose an email from ANY addy you want and it looks 100% like the real thing. Even I-P addresses can be faked. On top of that, if evidence comes from deleted emails that were retrieved, these are often in broken fragments and very difficutl to read and decipher. All this becomes a huge problem for prosecutors when they try to admit emails as evidence and they often fail when challenged, but too many times, the defense doesn’t even know to fight it. If you have a good computer expert to testify, the judge will NOT allow this evidence into trial.

All this is for naught if you open your mouth when questioned by the feds. Don’t say a word. They will threaten you like there’s no tomorrow, but shut your trap! Let them do their investigation and try to dig up dirt on you, but don’t do their job for them. If you get into this business then you better know ALL of your rights if you get popped. A little bit of investigative work now can save you a lot of trouble later.
 
Last edited:
Thanks Dr. Evil, good information on an important subject. I can't decide if you know more about law or aas. What ever the subject, you always have a knowlegable comment.
 
to my knowledge, if someone simply mimics your email addy, they won't be able to encrypt or sign it, but i could be wrong. this is important if you're using pgp or other encrypted emails. the only way to prove email authenticity in the past court cases have been through digital signatures and public/private keys. if you "sign" your encrypted emails then you may condemn yourself. signing has nothing to do with encryption, so i suggest if you use encrypted email to relay messages, don't sign the message.
 
One question and it maybe a litte far fetched...what would be the best way to delete incrimating eidence short of thrashing your computer? Let's say the feds are at your door and you need to delete everything fast.

Maybe we should focus on creating a device that would basically destroy your hardrive at a click of a button...or something similar,
 
Great post.......im sure a nice electromagnet close to your hard drive would work good =)
 
BigAndy69 said:
One question and it maybe a litte far fetched...what would be the best way to delete incrimating eidence short of thrashing your computer? Let's say the feds are at your door and you need to delete everything fast.

Maybe we should focus on creating a device that would basically destroy your hardrive at a click of a button...or something similar,

i'm not a computer expert, but i can tell you there are software programs out there that will erase your hard drive, and make it appear to not have anything on there, but they will still take your computer regardless. after they do they will be able to still find ALL erased information if they wanted to.

it's best to not have any incriminating evidence on your hard drive to begin with. keep all incriminating info on an email server that you never use to communicate with, just as an information storage space.
 
The FBI has also created a virus to get around PGP. An email goes through the backdoor of your computer (I don't know what the F--k the backdoor is but it's compurter lingo), then it is able to record all of your keystrokes and secretyly email them to the feds. This allows them to record your keystrokes when you type your password into PGP. If you are using keys it can also go into PGP and send the keys to them.

This is expensive and time consuming and they use it to go after much bigger fish than someone buying a few bottles of test and deca. It just shows that even with the most up to date encryption technology the feds can pretty much any info they need.
 
even for $10k of gear i don't think they'd go through all that trouble for a steroid dealer because the sentencing would be so small. even $10k from a very cheap supplier would probably constitute less than 500 units of steroids, which means a level 6 offense in the federal sentencing guidelines. for a conviction of a level 6 offense, the judge is bound by a sentence of 0-6 months unless aggrevating factors or previous convictions apply. digging through deleted data is more for terrorists and child molesters...

also, for anyone who's thinking of shipping out gear, it would be very wise to wear gloves while handling the gear and the package. print out labels, don't let your handwriting get on there. buy the $3.50 priority mail stamps and just drop it off in a drop box. don't take it into the post office. don't leave any physical evidence that will link you to the package.
 
I know a key logger isn't new news - it's much more complex than the way I made it sound but the new system they have to crack PGP was developed shortly after PGP came out. I read an entire article about this on the MSN a couple months ago so I'm not just making shit up to sound smart, just letting people know that nothing is completely invincible when it comes to computers. And yes, the program I'm talking about was developed by the FBI for the sole purpose of going after a couple big Mafia people that were using PGP encryption.
 
Last edited:
http://www.theregister.co.uk/content/4/15268.html

Article from June 2000 discussing the mafia and how the FBI used their technology to get him. Is it admissable in court?

http://www.pcworld.com/news/article/0,aid,78284,00.asp

Article in January 2002, the judge declares it was o.k. for them to install the keystroke logging device

http://www.idg.net/ic_665456_1794_9-10000.html
Fbi ordered to reveal the technology

Here's a quote from this article for SK* -EliteFitness's resident software engineering expert who could have written this with a couple of API calls.

"It's not rocket science. ... I sure hope our tax dollars didn't go to their top scientists to spend all their time developing a keystroke logger," said Richard Eaton, president of WinWhatWhere Corp., a Kennewick, Wash.-based software company that makes keystroke logging tools. "They said the methodology is the security issue. ... It could be the way the data is transmitted out of the system. I don't know if it was e-mailed out of there or what."

Court records describe the key-logger system as "software, firmware and/or hardware." Lawyers on both sides are under a court order not to speak publicly about the case.

Interesting reading if you're sick of reading about fina, ala, and other gear related shit.
 
boy, wouldn't you think that they would LOVE to put their hands on EF's servers?

Good post, bro... we all have to be reminded about this once in a while... Seems like you are home, just one-on-one with your PC. But it's not true... You are being WATCHED...
I SEE DEAD PEOPLE!!!
 
solid spine lol!!!! you said it brother!!!me too!! and i was not aware that for something such as 10,000 worth of gear the judge would be bound to a 6 mo sentence??? that ain't shit . well.....yes.... it is , but as compared to.....! fuckin people act like you get 2-5 years for gettin caught with an 1800 $ cycle. that just took a load of my mind about playin this game!! not that i'm worried, if they want to get me for the 3-600 bucks i might spend on gear for a cycle they can lick me.!! you got my vote for a sticky.....GOOD POST BRO!!
 
If you are really worried about sensitive material use click-n-type its a keyboard that you only use your mouse to type with so I don't think they could log your keystrokes all they would log would be mouse clicks!

Click-N-Type 2.0
 
Amp said:
The FBI has also created a virus to get around PGP. An email goes through the backdoor of your computer (I don't know what the F--k the backdoor is but it's compurter lingo), then it is able to record all of your keystrokes and secretyly email them to the feds. This allows them to record your keystrokes when you type your password into PGP. If you are using keys it can also go into PGP and send the keys to them.

This is expensive and time consuming and they use it to go after much bigger fish than someone buying a few bottles of test and deca. It just shows that even with the most up to date encryption technology the feds can pretty much any info they need.

ya amp
Are you taking about the carniovore software that the fbi uses to grt around pgp ,if you are ,your right , loggs every keystrock on your computer and sends back to gestopo headquarters :mad:
good idea there aboput using a mouse on a keyboard on your computer screen , that might even get around carnivore :)
also im got a data shredder that cames with pgp , is the doc saying that even after a good shredding the info is still recouverable ???
peace
hempster
 
Amp said:
The FBI has also created a virus to get around PGP. An email goes through the backdoor of your computer (I don't know what the F--k the backdoor is but it's compurter lingo), then it is able to record all of your keystrokes and secretyly email them to the feds. This allows them to record your keystrokes when you type your password into PGP. If you are using keys it can also go into PGP and send the keys to them.

This is expensive and time consuming and they use it to go after much bigger fish than someone buying a few bottles of test and deca. It just shows that even with the most up to date encryption technology the feds can pretty much any info they need.

hey amp
Are you taking about the carniovore software that the fbi uses to grt around pgp ,if you are ,your right , loggs every keystrock on your computer and sends back to gestopo headquarters :mad:
good idea there about using a mouse on a keyboard on your computer screen , that might even get around carnivore :)
also iv got a data shredder that cames with pgp , is the doc saying that even after a good shredding the info is still recouverable ???
peace
hempster
 
Last edited:
I have a programmer friend who uses the software, "History Killer" to delete sensitive material on his hard drive.Im not sure how good it is but he does all kinds of clandestine stuff on his computer and has been at it awhile.Anybody have any experience with this software?
Also ,thanks for the original post.Very informative.
 
I hear Evidence Eliminator is good for file shredding. It costs alot though. $150. Last night I did a hard drive cleaning and it took 16 hours. It lifted up the files and wrote jiberish there and then wrote the files back again. Also wrote 0000s and 1111s over the free space. I don't think it has a hot key for deleting files though. (Like if the cops kick in the door and you want to delete sensitive files.) The only hot key it has for fast shredding is for files that have already been deleted and are in the recycling bend.
 
Amp said:
http://www.theregister.co.uk/content/4/15268.html

Article from June 2000 discussing the mafia and how the FBI used their technology to get him. Is it admissable in court?

http://www.pcworld.com/news/article/0,aid,78284,00.asp


these are interesting points. the keystroke bug delves into issues of privacy which i'm not too familiar with. for the case with the mafia and the fbi, it's gonna come down to how the search warrant was worded. if the search warrant was for electronic, magnetic, and any other form of computer data relating to the gambling and loansharking business of this mafia lord then i don't see how a judge could turn this down. there should be no issue of authenticity either in this case because he's using digital signatures and encrypted key pairs with pgp (he's the only person that should have access to this info, so the burden of proof that someone else used his passwords and key pairs would be on him, not the government). all other evidence the fbi got as a result of using the keystroke logging bug such as medical records, airline receipts, etc. should not be allowed as evidence assuming the search warrant did not encompass it.
 
Stealther

What is the "Stealther" ?

Features: Absolute anonymous Internet surfing, No trace-back possible, Automatically updated proxy-database, Possibility to check proxies for availability, LAN-Gateway with Content Control, New identity on every website you open, Protects you from data-spying ->> Absolutely protected privacy <<-

Stealther is a program which you use together with your web browser to ensure your anonymity when you surf the Internet and download files. It allows you to hide your real identity from the websites you visit, block cookies and modify any information about your computer that is sent out by your web browser.

Window Washer v4.5

Window Washer is the award winning privacy and clean-up utility that eliminates all these tracks from your computer! Cleaning up the history of your activities can be a tedious chore of manually removing each history file or entry. If privacy and disk space are to be maintained, this process must be performed every time you use your computer. Window Washer makes cleaning up a breeze!

Window Washer can automatically clean up your browser's cache, cookies, history, recent document list, and much more! It can run in the background and clean up your tracks when you are done surfing the Internet or any other time you choose. Everyone from computer beginners to expert users agree: Window Washer is an essential tool for protecting your privacy and improving your computer's performance.

• "Bleaching": For added security, Window Washer can completely overwrite files with random characters up to 10 times, rendering the file unrecoverable by Undelete or Unerase utilities. Improvements to the bleach function overwrites files in FAT, FAT32 and NTFS, and will even overwrite the "slack space".


Excellent place to search and locate information allowing full use of downloaded try-out software
 
sir wanks, that was either a cut and paste from the company's product discription, or you're selling window washer lol. j/k.

i'm not familiar with what sk* was talking about with the 1 and 0, but i know window washer doesn't do the trick. the fbi can find all washed material after window washer is done with it, but it is extremely time consuming and expensive and not likely done on your computer unless you're a terrorist. the estimated time to retrieve all washed material is 240 hours per hard drive per wash.
 
besides carnivore, there's a simple virus attachment that can be sent via email to log your keystrokes, track your internet activity, and download copies of your hard drive.
 
Dr.Evil said:
The Supreme Court ruled that all computer-generated evidences are hearsay unless they fall into “hearsay exception” rules. The only applicable exception is if the electronic evidence is a “business record.” This term is very arguable. If you simply had a list of AS on your computer or even prices for them, it may not qualify as business records. This will depend on the ability of your attorney to convince the judge. Email records are certainly not business records. As of 1996 no federal court had applied the business records exception to email messages.


Also, in order to qualify for a business document, it has to have some sort of arrangement or organization to it. Simply having a price list on a computer could have been generated anywhere, and it's authenticity is highly doubtable. Now, a price list, with purchase agreements, contracts, records of sales, income tax returns all kept in the same general place would show a trend of business... and would get in past the hearsay exception.

Hearsay is ANY out of court statement that is used to prove the truth of the matter asserted. E-mail evidence that has you saying "Yes, I have 2000 Dbol and sell them frequently" cannot be used to prove you have them or sell them... but it could be used to attack your character or creditability if you said you never have sold Steroids before in your life.

Does that make sense? you can admit hearsay evidence as long as you aren't admitting what it is... it's confusing, and that's why you go to law school and hire lawyers. Simple English Version: If I have a paper that says "A", it cant' be admitted to prove "A" but it can be admitted to show "B and C".

E-mail me if you's gotz questions... SUCKA!!!

C-ditty
 
Last edited:
Re: Re: Email Evidence in Court

Citruscide said:

Hearsay is ANY out of court statement that is used to prove the truth of the matter asserted. E-mail evidence that has you saying "Yes, I have 2000 Dbol and sell them frequently" cannot be used to prove you have them or sell them... but it could be used to attack your character or creditability if you said you never have sold Steroids before in your life.

Does that make sense? you can admit hearsay evidence as long as you aren't admitting what it is... it's confusing, and that's why you go to law school and hire lawyers. Simple English Version: If I have a paper that says "A", it cant' be admitted to prove "A" but it can be admitted to show "B and C".


ok, that's confusing as hell lol. so, if "A" is unauthentic and hearsay, it can still be admitted to show the validity of "b" and "c"?
 
Re: Re: Re: Email Evidence in Court

HELLSPAWN said:


ok, that's confusing as hell lol. so, if "A" is unauthentic and hearsay, it can still be admitted to show the validity of "b" and "c"?

Authenticity is a completely differnet story. If the evidence isn't authentic, it can't get in. Basically, if "A" is a piece of paper (or e-mail) that can not be proven to be written by the writer... then it really doesn't matter if it is hearsay or not...

That's my take on it. Now, if I used Joe Citruscide (my real name) and had an e-mail [email protected] -- it would be pretty easy to trace who my e-mail belongs to. Now, who else had access to my account, that's another story... but when you start saying "Anyone could have e-mailed that from my account", now you sound like a guilty person just throwing out bones. It would be better to actually disprove that the account was yours in the first place... if at all possible.

C-Ditty "A to the mutha fuckin' K"
 
legal matters

There are specific case studies compiled over at bullnboar from William Wallace. I will see if I can copy and paste. They are great reads from a legal background...pulled from westlaw hopefully this worksHere is a great case, regarding e-mail
This case is very very interesting, not only because it involves the seizure of e-mail, but also because it involves information gathered from bulletin boards, so it is a good read for you Ranch Man, and all others who subscribe to message boards.

Users of an electronic bulletin board system seized in obscenity investigation brought a class action against sheriff, his department and deputies alleging, inter alia, violations of the Fourth and First Amendments and of the Electronic Communications Privacy Act (ECPA) and the Privacy Protection Act (PPA), and users of another system, the system operator, and computer owner brought a similar action against the same defendants. The United States District Court for the Southern District of Ohio, Herman J. Weber, J., granted summary judgment to defendants in both cases, and plaintiffs appealed. The Court of Appeals, Alan E. Norris, Circuit Judge, held that: (1) users did not have standing to challenge seizure of the computers as physical objects; (2) operator's posting of a disclaimer stating that personal communications on one of the boards were not private precluded Fourth Amendment standing for the users of the bulletin board; (3) users lacked a legitimate expectation of privacy in materials intended for publication or public posting, and lost such expectation in e-mail that had already reached its recipient; (4) technical violation of Ohio law in seizure outside officers' jurisdiction did not render the search and seizure unreasonable within meaning of the Fourth Amendment; (5) seizure of the computers, including their content, was reasonable to allow police to locate the offending files; (6) users did not have a legitimate expectation of privacy in their subscriber information; (7) warrants did not lack sufficient particularity; (8) seizing the computers did not effect a prior restraint on speech in violation of the First Amendment; (9) there was no violation of the ECPA in seizure pursuant to a valid warrant; and (10) there was no violation of the PPA.
Affirmed.


West Headnotes

[1] KeyCite Notes

170B Federal Courts
170BVIII Courts of Appeals
170BVIII(K) Scope, Standards, and Extent
170BVIII(K)1 In General
170Bk776 k. Trial De Novo. Most Cited Cases

Court of Appeals reviews de novo a grant of summary judgment, including summary judgment on the grounds of qualified immunity.

[2] KeyCite Notes

78 Civil Rights
78II Federal Remedies
78II(B) Civil Actions
78II(B)1 In General
78k211 Privilege or Immunity; Good Faith and Probable Cause
78k214 Governmental Agencies
78k214(2) k. Good Faith and Reasonableness; Knowledge and Clarity of Law; Motive and Intent, in General. Most Cited Cases

"Qualified immunity" shields government officials from liability, as well as from suit, if their official conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would have known.

[3] KeyCite Notes

78 Civil Rights
78II Federal Remedies
78II(B) Civil Actions
78II(B)1 In General
78k211 Privilege or Immunity; Good Faith and Probable Cause
78k214 Governmental Agencies
78k214(1) k. In General. Most Cited Cases

78 Civil Rights
78II Federal Remedies
78II(B) Civil Actions
78II(B)1 In General
78k211 Privilege or Immunity; Good Faith and Probable Cause
78k214 Governmental Agencies
78k214(2) k. Good Faith and Reasonableness; Knowledge and Clarity of Law; Motive and Intent, in General. Most Cited Cases

Court of Appeals reviews issues of qualified immunity using a two-step inquiry: first, Court determines whether the plaintiff has demonstrated the violation of a constitutionally protected right and, second, if there is such a violation, then Court examines whether the right is so clearly established that a reasonable official would understand that what he is doing violates that right.

[4] KeyCite Notes

349 Searches and Seizures
349IV Standing to Object
349k162 k. Privacy Interest or Expectation, in General. Most Cited Cases

In order to challenge a search or seizure as a violation of the Fourth Amendment, a person must have had a subjective expectation of privacy in the place or property searched, which was objectively reasonable. U.S.C.A. Const.Amend. 4.

[5] KeyCite Notes

349 Searches and Seizures
349I In General
349k25 Persons, Places and Things Protected
349k26 k. Expectation of Privacy. Most Cited Cases

349 Searches and Seizures
349IV Standing to Object
349k162 k. Privacy Interest or Expectation, in General. Most Cited Cases

Home owners have a reasonable expectation of privacy, protected by the Fourth Amendment, in their homes and in their belongings, including computers, inside the home, but bulletin board users would not share the same interest in someone else's home or computer, so they would not have standing to challenge the search of the home and the seizure of the computer as a physical object, and their interest in the computer content would depend on their expectations of privacy in the materials. U.S.C.A. Const.Amend. 4.

[6] KeyCite Notes

349 Searches and Seizures
349I In General
349k25 Persons, Places and Things Protected
349k26 k. Expectation of Privacy. Most Cited Cases

System operator's posting of a disclaimer stating that personal communications on computer bulletin board were not private defeated claims to an objectively reasonable expectation of privacy for the users of the bulletin board, so that they did not have standing to assert Fourth Amendment claims following seizure of computer equipment and disks. U.S.C.A. Const.Amend. 4.

[7] KeyCite Notes

349 Searches and Seizures
349I In General
349k25 Persons, Places and Things Protected
349k26 k. Expectation of Privacy. Most Cited Cases

Users of computer bulletin board lacked a legitimate expectation of privacy, protected by the Fourth Amendment, in materials intended for publication or public posting, and lost a legitimate expectation of privacy in e-mail that had already reached its recipient. U.S.C.A. Const.Amend. 4.

[8] KeyCite Notes

349 Searches and Seizures
349I In General
349k25 Persons, Places and Things Protected
349k26 k. Expectation of Privacy. Most Cited Cases

A letter-writer's expectation of privacy, protected by the Fourth Amendment, ordinarily terminates upon delivery of the letter. U.S.C.A. Const.Amend. 4.

[9] KeyCite Notes

349 Searches and Seizures
349III Execution and Return of Warrants
349k142 k. Persons Participating; Place of Search. Most Cited Cases

Ohio law does not permit a police officer to execute a search warrant outside his jurisdiction unless an officer of the jurisdiction where the warrant is executed accompanies the other officers and remains present at all times.

[10] KeyCite Notes

349 Searches and Seizures
349III Execution and Return of Warrants
349k142 k. Persons Participating; Place of Search. Most Cited Cases

Ohio law on searches was violated where search warrant was addressed to officials of township in which home to be searched was located and township police accompanied the officers from sheriff's department in another county but left before the out-of-county officers' actual seizure of computer equipment from the home occurred, but there was no violation in another case, where township police accompanied the out-of-court sheriff's deputies during the search and seizure.
KeyCite Notes
[11]

349 Searches and Seizures
349III Execution and Return of Warrants
349k141 k. In General. Most Cited Cases

The technical violation of Ohio law that occurred when local police officers decided to leave the home being searched pursuant to warrant before seizure by out-of-county officers did not render the search and seizure unreasonable within meaning of the Fourth Amendment. U.S.C.A. Const.Amend. 4.

[12] KeyCite Notes

349 Searches and Seizures
349III Execution and Return of Warrants
349k147 Scope of Search
349k148 k. Places, Persons, and Things Within Scope of Warrant. Most Cited Cases

Because of the technical difficulties of conducting a computer search in a suspect's home, to locate files relating to offenses of pandering obscenity and possessing criminal tools, listed in search warrant, the seizure of the computers, including their content, was reasonable to allow police to locate the offending files, where there was probable cause to conclude that evidence of a crime would be found on the computer. U.S.C.A. Const.Amend. 4.

[13] KeyCite Notes

349 Searches and Seizures
349III Execution and Return of Warrants
349k147 Scope of Search
349k147.1 k. In General. Most Cited Cases

A search does not become invalid merely because some items not covered by a warrant are seized.

[14] KeyCite Notes

349 Searches and Seizures
349III Execution and Return of Warrants
349k147 Scope of Search
349k148 k. Places, Persons, and Things Within Scope of Warrant. Most Cited Cases

Printout of computer directories which showed defendant officers' check mark next to a directory labeled "e-mail," and absence of certain log records from the computers when they were returned to their owners, were insufficient to establish a genuine issue of fact regarding claim that officers conducted an e- mail search, exceeding scope of a search warrant directed to files relating to pandering obscenity. U.S.C.A. Const.Amend. 4.

[15] KeyCite Notes

170A Federal Civil Procedure
170AXVII Judgment
170AXVII(C) Summary Judgment
170AXVII(C)3 Proceedings
170Ak2542 Evidence
170Ak2546 k. Weight and Sufficiency. Most Cited Cases

The mere existence of a scintilla of evidence in support of the plaintiff's position will be insufficient to preclude summary judgment for defendant; there must be evidence on which the jury could reasonably find for the plaintiff.

[16] KeyCite Notes

349 Searches and Seizures
349I In General
349k25 Persons, Places and Things Protected
349k26 k. Expectation of Privacy. Most Cited Cases

Individuals generally lose a reasonable expectation of privacy in their information, supporting standing to challenge search, once they reveal it to third parties. U.S.C.A. Const.Amend. 4.

[17] KeyCite Notes

349 Searches and Seizures
349I In General
349k25 Persons, Places and Things Protected
349k26 k. Expectation of Privacy. Most Cited Cases

Computer bulletin board system users do not have a legitimate expectation of privacy, protected by the Fourth Amendment, in their subscriber information because they had conveyed it to another person, the system operator. U.S.C.A. Const.Amend. 4.

[18] KeyCite Notes

349 Searches and Seizures
349IV Standing to Object
349k164 k. Particular Concrete Applications. Most Cited Cases

The only individual with a privacy interest in unlicensed software would be the person possessing the software, i.e., the computer's owner or the system operator, and not the users of electronic bulletin board system, so that the latter did not have standing to assert that officers exceeded the scope of search warrant directed at obscenity when they searched for unlicensed software. U.S.C.A. Const.Amend. 4.

[19] KeyCite Notes

349 Searches and Seizures
349II Warrants
349k123 Form and Contents of Warrant; Signature
349k125 k. Objects or Information Sought. Most Cited Cases

Search warrants which required that the communications and computer records seized pertain to the listed offenses did not fail to describe with sufficient particularity the things to be seized, in failure to particularly identify communications or subscriber information, as more specific identification of e- mails and subscriber data was not accessible to the officers. U.S.C.A. Const.Amend. 4.



Report this post to a moderator | IP: Logged

05-23-2002 04:12 AM



_Wiliam_WaLLace
newbie

Registered: May 2002
Location:
Posts: 23
20] KeyCite Notes

349 Searches and Seizures
349II Warrants
349k123 Form and Contents of Warrant; Signature
349k124 k. Particularity or Generality and Overbreadth in General. Most Cited Cases

A search warrant must particularly describe the things to be seized, but the description will be valid if it is as specific as the circumstances and the nature of the activity under investigation permit. U.S.C.A. Const.Amend. 4.

[21] KeyCite Notes

349 Searches and Seizures
349II Warrants
349k123 Form and Contents of Warrant; Signature
349k125 k. Objects or Information Sought. Most Cited Cases

Where electronic bulletin board system users did not establish that their communications were searched, in search of system for communications relating to pandering obscenity, there would be no harm from an alleged defect in the warrant, based on lack of particularity, regarding any of those communications. U.S.C.A. Const.Amend. 4.

[22] KeyCite Notes

353 Sheriffs and Constables
353III Powers, Duties, and Liabilities
353k97 k. Liabilities for Official Acts in General. Most Cited Cases

Sheriff sued in his individual capacity as well as in his official capacity could properly assert the defense of qualified immunity in his individual capacity.

[23] KeyCite Notes

78 Civil Rights
78II Federal Remedies
78II(B) Civil Actions
78II(B)1 In General
78k211 Privilege or Immunity; Good Faith and Probable Cause
78k214 Governmental Agencies
78k214(6) k. Sheriffs, Police, and Other Peace Officers. Most Cited Cases

Where there were no Fourth Amendment violations, the sheriff and deputies were entitled to qualified immunity on the Fourth Amendment claims asserted against them in their individual capacities, despite contention that they did not follow the advice of the prosecutors who reviewed the search warrant. U.S.C.A. Const.Amend. 4.

[24] KeyCite Notes

92 Constitutional Law
92V Personal, Civil and Political Rights
92k90 Freedom of Speech and of the Press
92k90.1 Particular Expressions and Limitations
92k90.1(9) k. Telecommunications. Most Cited Cases

281 Obscenity
281k7.5 Pretrial Seizure, Suppression, or Censorship
281k7.6 k. In General; Necessity for Adversary Hearing. Most Cited Cases
(Formerly 372k494.1)

Seizing computers used in electronic bulletin board systems, thereby shutting down the systems, did not effect a prior restraint on speech in violation of the First Amendment, where officers took the computers to establish evidence of criminal violations and operated with a warrant and a prior determination of obscenity by a magistrate. U.S.C.A. Const.Amend. 1.

[25] KeyCite Notes

92 Constitutional Law
92V Personal, Civil and Political Rights
92k90 Freedom of Speech and of the Press
92k90.4 Obscenity and Pornography
92k90.4(1) k. In General. Most Cited Cases

There is not an absolute right to a prior adversarial hearing in cases where allegedly obscene material is seized to preserve evidence in a criminal prosecution; police are permitted to seize evidence of a crime, even expressive materials, if the seizure is pursuant to a valid warrant. U.S.C.A. Const.Amend. 1.

[26] KeyCite Notes

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k494 Acts Constituting Interception or Disclosure
372k495 k. Persons Concerned; Consent. Most Cited Cases
(Formerly 372k494.1)

There was no violation of the Electronic Communications Privacy Act (ECPA) when sheriff's deputies searched electronic communications and subscriber information on electronic bulletin board system, where the officers had a valid warrant. 18 U.S.C.A. §§ 2701, 2703(a-c).

[27] KeyCite Notes

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k494 Acts Constituting Interception or Disclosure
372k495 k. Persons Concerned; Consent. Most Cited Cases
(Formerly 372k494.1)

Section of the Electronic Communications Privacy Act (ECPA) restricting disclosure by a provider of an electronic communication service does not apply to the government, and thus a governmental entity may not violate that subsection by simply accessing information improperly. 18 U.S.C.A. § 2703(c).

[28] KeyCite Notes

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k498 k. Civil Liability. Most Cited Cases

Users of electronic bulletin board systems had standing to bring a claim under the Privacy Protection Act (PPA) when systems were seized in obscenity investigation, because they were "aggrieved" by the seizure of their communications; standing was not limited to the operator of the bulletin board systems. 18 U.S.C.A. § 2510(11); Privacy Protection Act of 1980, § 106(a), 42 U.S.C.A. § 2000aa-6(a).

[29] KeyCite Notes

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k494 Acts Constituting Interception or Disclosure
372k495 k. Persons Concerned; Consent. Most Cited Cases

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k498 k. Civil Liability. Most Cited Cases

When protected materials are commingled on a criminal suspect's computer with criminal evidence that is unprotected by the Privacy Protection Act (PPA), Court of Appeals will not find liability under the PPA for seizure of the PPA- protected materials, but police may not then search the PPA-protected materials that were seized incidentally to the criminal evidence. Privacy Protection Act of 1980, §§ 101(a), 107(a, b), 42 U.S.C.A. §§ 2000aa(a), 2000aa-7(a, b).

[30] KeyCite Notes

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k494 Acts Constituting Interception or Disclosure
372k494.1 k. In General. Most Cited Cases

372 Telecommunications
372V Interception or Disclosure of Communications; Electronic Surveillance
372V(A) In General
372k498 k. Civil Liability. Most Cited Cases

Obscene images or pirated software would not qualify as protected work product or documentary material under the Privacy Protection Act (PPA), which excludes "property designed or intended for use, or which is or has been used as, the means of committing a criminal offense" and officers were not liable under the PPA for seizure of arguably PPA-protected materials which were commingled with this criminal evidence on computers whose owner or operator was a criminal suspect, where the seizure of the PPA materials occurred incidentally to the seizure of this evidence pursuant to a valid warrant, and it was not shown that the protected materials were searched. Privacy Protection Act of 1980, § 107(a, b), 42 U.S.C.A. § 2000aa-7(a, b).
*329 Scott T. Greenwood (argued and briefed), Greenwood & Associates, Cincinnati, OH, Peter D. Kennedy (argued and briefed), George & Donaldson, LLP, Austin, TX, for Plaintiffs-Appellants.
John W. Hust (argued and briefed), Michael E. Maundrell (briefed), Lawrence Edward Barbiere (briefed), Schroeder, Maundrell, Barbiere & Powers, Cincinnati, OH, Hugh Owen Frost, II (briefed), Cincinnati, OH, Donald E. Hardin (briefed), Hardin, Lefton, Lazarus & Marks, LLC, for Defendants- Appellees.


OPINION

ALAN E. NORRIS, Circuit Judge.
In 1995, the Hamilton County, Ohio, Regional Electronic Computer Intelligence *330 Task Force (RECI) was investigating on-line obscenity and seized two computer bulletin board systems. The first system seized was the Cincinnati Computer Connection Bulletin Board System (CCC BBS). Several users of the system filed a class action on behalf of subscribers against RECI, the sheriff, and his department alleging violations of the First and Fourth Amendments, the Electronic Communications Privacy Act (ECPA), and the Privacy Protection Act (PPA), and setting out state law and common law claims. The second system seized in the same general investigation was the Spanish Inquisition Bulletin Board System (SI BBS). The system's users, operator, and computer owner brought suit against the same defendants alleging the same violations as in the CCC BBS suit.
The district court granted summary judgment for defendants in each case, and plaintiffs appeal. [FN1] We affirm.


FN1. Because plaintiffs have not mentioned their state law claims on appeal, we consider the issues forfeited. They have explicitly waived their statutory claim under 18 U.S.C. §§ 2510-2521.



I. Background
A. Cincinnati Computer Connection Bulletin Board System
In early 1995, there was a complaint lodged with the Hamilton County Sheriff's Department about on-line obscenity, and RECI, a division of the sheriff's department, began investigating several electronic bulletin board systems, including the CCC BBS. The CCC BBS computers were operated by Robert Emerson in Union Township (Clermont County), Ohio. [FN2] The system, according to plaintiffs, included "thousands of subscribers from the Greater Cincinnati area, the United States and even overseas." Guest Brief at 5. Users could, with a password, send e-mail to subscribers or to others on the internet. They could also participate in chat room conversations, on-line games, and conferences, where they could post or read messages on many topics, and they could download files such as computer programs and pictures.


FN2. Emerson is not a member of the plaintiff class. He was indicted in Clermont County, Ohio, in 1996 and pleaded guilty to six counts of attempted pandering of obscenity.


RECI officers assumed an undercover identity and obtained access to the adult part of the bulletin board system, where they downloaded sample images. A detective presented more than one hundred of these images to a Hamilton County municipal court judge, who determined that forty-five of them were obscene. RECI officers then prepared a search warrant, which identified the forty-five obscene images. The affidavit attached to the warrant listed the offenses in question as pandering obscenity (Ohio Rev.Code § 2907.32) and possessing criminal tools (Ohio Rev.Code § 2923.24). RECI showed the warrant to attorneys in the Hamilton County prosecutor's office and edited it after this meeting. The revised warrant authorized the search and seizure of computer hardware, software, financial and computer records, and personal communications, limiting the items searched or seized to those that had been used in the offense. RECI officers then presented the warrant to a Clermont County municipal court judge, who signed the warrant, directing it to the police chief of Union Township, located in Clermont County.
On June 16, 1995, members of RECI and the Union Township Police Department went to the home of Robert Emerson to execute the warrant. The officers asked Emerson to locate the obscene images on *331 his system so that they could seize only those files; Emerson denied knowledge of obscene images on the computer and placed a call to his lawyer. While everyone waited for the attorney to return the call, the Union Township officers left the house. Emerson eventually stated that he did not know where the images were on the computer. Several hours after the police's arrival, with still no word from the lawyer, the RECI officers began dismantling the computer system to take it away; Emerson then said that the images were on the large file server. The officers, skeptical of his statement, seized the large and small file servers and took them to the police station.
Deputy Sheriff Ausdenmoore explained the way the computer search proceeded at the station. He said that he used a computer program to locate the forty-five obscene files according to the file names listed in the warrant, and he also searched for unlicenced software. He testified that once he had located the image files, he did not review the rest of the seized property. Plaintiffs, on the other hand, allege that defendants read e-mail on the seized system.
On August 7, 1995, plaintiffs filed this suit against the Hamilton County Sheriff's Department, RECI, Hamilton County Sheriff Simon Leis, and Deputy Sheriffs Dale Menkhaus, James Nerlinger, and David Ausdenmoore. The class of CCC BBS users was certified on July 5, 1996. Sometime during the pendency of the suit, defendants returned the computer equipment to Emerson. On March 31, 1998, the magistrate judge issued a report and recommendation to grant the defendants' motions for summary judgment on the ECPA, Fourth Amendment, and corollary Ohio constitutional claims, and to grant qualified immunity to the individual defendants on the Fourth Amendment claim. The district court adopted the recommendation on September 30, 1996, and later granted defendants' renewed motion for qualified immunity and summary judgment on the remaining claims, dismissing the case on August 5, 1999.
B. Spanish Inquisition Bulletin Board System
The SI BBS was a smaller bulletin board system than the CCC BBS, and it was run by a teenager on his father's home computer. Only one user could log on at a time, and the connection to the internet was more rudimentary than the CCC BBS's connection. The SI BBS included a posted disclaimer on privacy:
Pursuant to the Electronic and Communications Privacy Act of 1986, Title 18 U.S.Code 2510 and following, all users are hereby notified that there are NO provisions for private messages on this board. This is TRUE notwithstanding the fact that the system software indicates to the user that he or she may and can make a message "private." All messages may be read by the SysOp [systems operator] and his assigns[.]
O'Brien Joint Appendix (J.A.) at 655 (Nerlinger Dep. at 237).
The SI BBS investigation began after a parent reported to police that his son and a friend were viewing child pornography. RECI officials interviewed several of the juveniles implicated and analyzed their computers, which disclosed child and adult pornography and files indicating unauthorized access to computer systems. RECI traced the latter files, called HPACV (hacker/phreaker/anarchy/cracking/virus) files, to the SI BBS, but the detectives were unable to gain access to the bulletin board system. They obtained a warrant on the basis of their interviews with the juveniles and examination of their computers, which indicated that the SI BBS was *332 used to tap phone lines, recover debit card numbers, acquire pirated software, and download child pornography. The warrant borrowed the CCC BBS warrant language authorizing the seizure of all equipment, documentation, and personal communications that were used in the offenses listed. The supporting affidavit listed three offenses: illegal use of a minor in nudity-oriented material (Ohio Rev.Code § 2907.323), unauthorized use of property (Ohio Rev.Code § 2913.04), and possessing criminal tools (Ohio Rev.Code § 2923.24). The warrant for a search of the owner's home in Butler County was issued by the Butler County Court of Common Pleas and directed to the Police Chief of Union Township. [FN3]


FN3. This appears to have been the former name of the West Chester Police Department, located in Butler County, notwithstanding a Union Township police force in Clermont County.


On August 31, 1995, RECI executed the search warrant for the SI BBS. After unsuccessful attempts to contact the computer's owner, defendants removed computer equipment and disks. Union Township police accompanied RECI officials and remained present until RECI officials left the premises.
This lawsuit was filed on March 6, 1996, by four individual members of the SI BBS, the operator of the SI BBS, and the owner of the computer that housed the system. Plaintiffs alleged the same violations of law in this suit as in the CCC BBS suit, but the court denied class certification. On November 5, 1998, the district court granted summary judgment on the ECPA, Fourth Amendment, and corresponding Ohio constitutional claims and found the individual defendants entitled to qualified immunity on the constitutional claims. On August 5, 1999, the court granted defendants' motion for qualified immunity and summary judgment on the remaining claims.

II. Fourth Amendment
[1] Plaintiffs argue that the district court erred in granting qualified immunity and summary judgment to the defendants on the Fourth Amendment claims. We review a grant of summary judgment, including summary judgment on the grounds of qualified immunity, de novo. McCloud v. Testa, 97 F.3d 1536, 1541 (6th Cir.1996). Summary judgment is appropriate where, viewing the evidence in the light most favorable to the non-moving party, there is "no genuine issue as to any material fact and ... the moving party is entitled to a judgment as a matter of law." Fed.R.Civ.P. 56(c); Birgel v. Bd. of Comm'rs, 125 F.3d 948, 950 (6th Cir.1997).
[2] [3] Qualified immunity shields government officials from liability, as well as from suit, if their official conduct "does not violate clearly established statutory or constitutional rights of which a reasonable person would have known." Harlow v. Fitzgerald, 457 U.S. 800, 818, 102 S.Ct. 2727, 73 L.Ed.2d 396 (1982). We review issues of qualified immunity using a two-step inquiry. First, we determine whether the plaintiff has demonstrated the violation of a constitutionally protected right. Brennan v. Township of Northville, 78 F.3d 1152, 1154 (6th Cir.1996). If there is such a violation, then we examine "whether the right is so 'clearly established' that a 'reasonable official would understand that what he is doing violates that right.' " Id. (quoting Anderson v. Creighton, 483 U.S. 635, 640, 107 S.Ct. 3034, 97 L.Ed.2d 523 (1987)).
Plaintiffs argue that defendants did not have the legal authority to conduct a search and seizure outside of their (Hamilton County) jurisdiction; that defendants exceeded the scope of the warrants; that *333 the search warrants were not sufficiently particularized; that the warrants did not state probable cause for the seizure of e-mail and subscriber information; and that defendants were not entitled to qualified immunity because they were governmental units. Defendants challenge plaintiffs' standing to assert the Fourth Amendment claims.
A. Standing
[4] [5] [6] Defendants argue that plaintiffs do not have standing to assert Fourth Amendment claims in these cases. In order to challenge a search or seizure as a violation of the Fourth Amendment, a person must have had a subjective expectation of privacy in the place or property to be searched which was objectively reasonable. Minnesota v. Olson, 495 U.S. 91, 95-96, 110 S.Ct. 1684, 109 L.Ed.2d 85 (1990). Home owners would of course have a reasonable expectation of privacy in their homes and in their belongings-- including computers--inside the home. Bulletin board users would not share the same interest in someone else's house or computer, so they would not be able to challenge the search of the homes and the seizure of the computers as physical objects. Their interest in the computer content presents a different question and would depend on their expectations of privacy in the materials. In the O'Brien case, the SI BBS posted a disclaimer stating that personal communications were not private. This disclaimer defeats claims to an objectively reasonable expectation of privacy for the SI BBS users. See United States v. Simons, 206 F.3d 392, 398 (4th Cir.2000) (finding no privacy interest in an employee's internet search records when an employer posted a privacy disclaimer regarding computer files). Accordingly, the O'Brien user-plaintiffs do not have standing to assert Fourth Amendment claims.
[7] [8] The Guest user-plaintiffs' standing would turn on the materials they had on the CCC BBS. Users would logically lack a legitimate expectation of privacy in the materials intended for publication or public posting. See United States v. Maxwell, 45 M.J. 406, 417-19 (C.A.A.F.1996). They would lose a legitimate expectation of privacy in an e-mail that had already reached its recipient; at this moment, the e-mailer would be analogous to a letter- writer, whose "expectation of privacy ordinarily terminates upon delivery" of the letter. United States v. King, 55 F.3d 1193, 1196 (6th Cir.1995) (citations omitted); see also Maxwell, 45 M.J. at 418. Whether the users had more private material on the system that entitled them to standing is not a question we must reach since we conclude below that there was no Fourth Amendment violation in this case.
B. Legal Authority
Plaintiffs allege that defendants were outside of their jurisdiction and therefore did not have the legal authority to conduct the search or seizure in question. Such an extra-legal seizure, say plaintiffs, was a Fourth Amendment violation, and defendants were not entitled to qualified immunity because their lack of jurisdiction rendered them private citizens.
[9] [10] Ohio law does not permit a police officer to execute a search warrant outside his jurisdiction unless an officer of the jurisdiction where the warrant is executed "accompanies the other officers and remains present at all times." State v. Miller, No. 12198, 1986 WL 1127, at *1 (Ohio Ct.App. Jan. 22, 1986) (unpublished opinion); see also State v. Harrison, 20 Ohio Misc. 282, 287, 251 N.E.2d 521, 525 (Ct. Comm. Pleas 1969). In the O'Brien case, the warrant was directed to Union Township police, who accompanied the defendants *334 during the entire search and seizure at the O'Brien home. There was therefore no violation of the search rule in the O'Brien case.
[11] In the Guest case, the home to be searched was in Union Township, the search warrant was addressed to Union Township officials, and Union Township police accompanied the defendants but left before the actual seizure of the computer equipment occurred. Although their departure violated the rule stated in Miller and Harrison, this conclusion does not end our inquiry. We must still ask whether the failure to comply with a state rule rises to the level of a constitutional violation.
The Fourth Amendment protects against unreasonable searches and seizures. See, e.g., United States v. Ramirez, 523 U.S. 65, 71, 118 S.Ct. 992, 140 L.Ed.2d 191 (1998) (stating that a reasonableness standard governs the execution of warrants). The Ohio Court of Appeals declined to find a constitutional violation under similar circumstances in State v. Klemm, 41 Ohio App.3d 382, 383, 536 N.E.2d 14, 16 (Ct.App.1987). In Klemm, the court considered the application of the exclusionary rule when Cincinnati police conducted a search outside of their jurisdiction. Even though the police violated state law, the violation did not make the search unreasonable in a constitutional sense because the search warrant was supported by probable cause. Id.; see also United States v. Green, 178 F.3d 1099, 1106 (10th Cir.1999) ("The Fourth Amendment is satisfied where, as here, officers obtain a warrant, grounded in probable cause and phrased with sufficient particularity, from a magistrate of the relevant jurisdiction authorizing them to search a particular location, even if those officers are acting outside their jurisdiction as defined by state law."). The technical violation that occurred in the Guest case when the Union Township officers decided to leave the home did not render the search and seizure unreasonable in constitutional terms.
C. Exceeding the Scope of the Warrant
Plaintiffs claim that defendants exceeded the scope of the warrant by seizing and reading e-mail and members' subscriber information. The warrants authorized the search and seizure of:
[a]ny documentation and/or notations referring to the computer, the contents of the computer, the use of the computer or any computer software and/or communications. All information within the above listed items including but not limited to machine readable data, all previously erased data, and any personal communications including but not limited to e-mail, chat capture, capture files, correspondence stored in electronic form, and/or correspondence exchange in electronic form.... All items to be searched and/or seized having been used in the obtaining, maintenance, and/or as evidence of said offense.
Guest J.A. at 69-70; O'Brien J.A. at 242-43.
1. Seizure of Computer Contents
[12] [13] The warrant authorized the seizure of personal communications related to the offense. Although there were presumably communications on the computers that did not relate to the offenses, "[a] search does not become invalid merely because some items not covered by a warrant are seized." United States v. Henson, 848 F.2d 1374, 1383 (6th Cir.1988). In Henson, a case affirming convictions involving false odometer statements, we rejected a Fourth Amendment challenge to the seizure of documents and computer files that were unrelated to the offenses because we concluded that it would have been unreasonable *335 to require police to sort through extensive files in a suspect's office in order to separate out those items that were outside the warrant. Id. at 1383-84; see also Davis v. Gracey, 111 F.3d 1472, 1481 (10th Cir.1997) (finding no Fourth Amendment violation when defendants seized a bulletin board system computer that contained personal communications unrelated to the crime under investigation); United States v. Hay, 231 F.3d 630, 637- 38 (9th Cir.2000) (finding no Fourth Amendment violation in the search and seizure of a computer system in a child pornography investigation); United States v. Upham, 168 F.3d 532, 536 (1st Cir.1999) (same). In the instant cases, when the seizures occurred, defendants were unable to separate relevant files from unrelated files, so they took the computers to be able to sort out the documents off-site. Because of the technical difficulties of conducting a computer search in a suspect's home, the seizure of the computers, including their content, was reasonable in these cases to allow police to locate the offending files.
2. E-mail Search
[14] Plaintiffs also allege that defendants read their e-mail, an allegation defendants deny. Plaintiffs rely for evidence on the following. A plaintiff testified as an expert witness that certain log records were missing from the Guest CCC BBS computers when the computers were returned; these logs normally keep a record of the use of the computer, and the expert testified that defendants must have deleted the log files or prevented them from generating. The Guest plaintiffs also refer to a paper printout of the computer directories, which showed defendants' check marks next to several directory names, including a directory labeled "e-mail."
[15] The printout and absence of log files are not evidence that the defendants read private communications. Plaintiffs are essentially relying on an assumption that because defendants could have read e-mail, there is evidence that they did read e-mail. Defendants may legitimately have checked to see that the contents of the directories corresponded to the labels placed on the directories. Suspects would otherwise be able to shield evidence from a search simply by "misfiling" it in a directory labeled "e-mail." In the Guest case, defendants had a list of file names and thus could conduct their search by reviewing the file names in a directory, without actually opening the files and viewing the contents. While we construe the facts on summary judgment in the light most favorable to the nonmoving party, "[t]he mere existence of a scintilla of evidence in support of the plaintiff's position will be insufficient; there must be evidence on which the jury could reasonably find for the plaintiff." Mitchell v. Toledo Hosp., 964 F.2d 577, 581 (6th Cir.1992) (quoting Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 252, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986)). Plaintiffs' assumptions are insufficient to establish a genuine issue of fact regarding an e-mail search.
3. Search of Subscriber Information
[16] [17] Plaintiffs argue that defendants violated the Fourth Amendment by accessing bulletin board subscriber information. These records include information such as subscribers' names, addresses, birthdates, and passwords. As we have noted above, a person must have a reasonable expectation of privacy in the matter searched in order to challenge a search under the Fourth Amendment. Individuals generally lose a reasonable expectation of privacy in their information once they reveal it to third parties. See United States v. Miller, 425 U.S. 435, 443, 96 S.Ct. 1619, 48 L.Ed.2d 71 (1976), limited by *336 statute. A bank customer, for instance, does not have a legitimate expectation of privacy in the information that he or she has conveyed to the bank; by placing the information under control of a third party, the customer assumes the risk that the bank will convey the information to the government. Id. Courts have applied this principle to computer searches and seizures to conclude that computer users do not have a legitimate expectation of privacy in their subscriber information because they have conveyed it to another person-- the system operator. See Maxwell, 45 M.J. at 418; United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000) (rejecting a privacy interest in subscriber information communicated to an internet service provider); United States v. Hambrick, No. 99-4793, 2000 WL 1062039, at *4 (4th Cir. Aug.3, 2000) (unpublished) (holding that defendant destroyed any privacy interest in his subscriber information when he conveyed it to an internet service provider) (citing Miller, 425 U.S. at 442, 96 S.Ct. 1619). We conclude that plaintiffs in these cases lack a Fourth Amendment privacy interest in their subscriber information because they communicated it to the systems operators. In addition, in the O'Brien case, subscriber information would be that of the users, who do not have Fourth Amendment standing.
4. Software Search
[18] Plaintiffs also assert that defendants exceeded the scope of the warrant when they searched for unlicensed software. The only individual with a privacy interest in the software would be the person possessing the software, i.e., the computer's owner or the system operator. In the Guest case, the owner and bulletin board operator, Robert Emerson, is not a party to the case. In the O'Brien case, although the owner and operator are parties, the warrant listed the offense of "possession of unlicensed property," so the search for unlicensed software in that case was clearly authorized by the warrant.
D. Particularity
[19] [20] Plaintiffs argue that the warrant failed to describe with sufficient particularity the things to be seized. They seem to base this argument on the warrant's failure to particularly identify communications or subscriber information. A search warrant must particularly describe the things to be seized, but the description, whose specificity will vary with the circumstances of the case, will be "valid if it is as specific as the circumstances and the nature of the activity under investigation permit." Henson, 848 F.2d at 1383 (quoting United States v. Blum, 753 F.2d 999, 1001 (11th Cir.1985)).
[21] In the instant cases, the warrants required that the communications and computer records pertain to the listed offenses. Defendants could not have obtained more specific identification of e-mails and subscriber data, which were not accessible to them. The description was thus particular enough as the circumstances permitted for these items. Moreover, since plaintiffs have not established that their communications were searched, there would be no harm from an alleged defect in the warrant regarding any of the communications.
E. Probable Cause
Plaintiffs assert that the warrants did not state "probable cause to believe that the Plaintiffs' public and private communications, and their subscriber information, was evidence of a crime." Guest Brief at 43. Plaintiffs do not dispute in their briefs that defendants had probable cause to search for evidence of crimes on the computers. As we have already determined, *337 the difficulty of locating and extracting these images meant that a seizure of the whole computer system was not unreasonable, so long as there was probable cause to conclude that evidence of a crime would be found on the computer. An analysis of probable cause to search the materials is unnecessary since plaintiffs have failed to establish that their communications were searched, and they lack a privacy interest in their subscriber information.
F. Qualified Immunity
[22] [23] According to plaintiffs, "Defendants Leis, Hamilton County Sheriff's Department and RECI cannot assert qualified immunity" as "political subdivisions." Guest Br. at 46. Qualified immunity may be asserted by government officials sued in their individual capacity. Harlow, 457 U.S. at 807, 102 S.Ct. 2727. As the district court granted qualified immunity only to the individual defendants, plaintiffs' objections about immunity for the sheriff's department and RECI are unfounded. Sheriff Leis was sued in his individual capacity (as well as in his official capacity), so he may properly assert the defense in his individual capacity. Because we have concluded that there were no Fourth Amendment violations, the individual defendants are all entitled to qualified immunity on the Fourth Amendment claims asserted against them in their individual capacities. [FN4]


FN4. Plaintiffs argue that defendants are not entitled to qualified immunity because the officers did not follow the advice of the prosecutors who reviewed the warrant. Since we have found no constitutional violation, the advice of the prosecutors is irrelevant to our decision.



III. First Amendment
[24] Plaintiffs allege that the defendants violated their First Amendment rights by seizing and shutting down the bulletin board systems, thus effecting a prior restraint on speech. They rely on two Supreme Court cases which established a general rule that police cannot make mass seizures of allegedly obscene material without a prior adversarial judicial determination of obscenity. See A Quantity of Copies of Books v. Kansas, 378 U.S. 205, 84 S.Ct. 1723, 12 L.Ed.2d 809 (1964); Marcus v. Search Warrants, 367 U.S. 717, 81 S.Ct. 1708, 6 L.Ed.2d 1127 (1961). In A Quantity of Copies, police seized 1,715 copies of 31 novels after ex parte judicial examination of seven of the allegedly obscene books. A Quantity of Copies, 378 U.S. at 208-09, 84 S.Ct. 1723. In Marcus, police seized approximately 11,000 copies of 280 publications, without a prior judicial determination of obscenity. Marcus, 367 U.S. at 723, 81 S.Ct. 1708. Such seizures violated the First Amendment because the lack of a pre-seizure hearing risked the "abridgment of the right of the public in a free society to unobstructed circulation of nonobscene books." A Quantity of Copies, 378 U.S. at 213, 84 S.Ct. 1723.
[25] There is not, however, an absolute right to a prior adversarial hearing in cases where allegedly obscene material is seized to preserve evidence in a criminal prosecution. Heller v. New York, 413 U.S. 483, 488, 93 S.Ct. 2789, 37 L.Ed.2d 745 (1973). Police are permitted to seize evidence of a crime--even expressive materials--if the seizure is pursuant to a valid warrant. In Heller, police with a warrant seized one copy of an allegedly obscene film. The Supreme Court did not find a First Amendment violation, holding that
f such a seizure is pursuant to a warrant, issued after a determination of probable cause by a neutral magistrate, and, following the seizure, a prompt judicial *338 determination of the obscenity issue in an adversary proceeding is available at the request of any interested party, the seizure is constitutionally permissible.
Id. at 492, 93 S.Ct. 2789. The Court emphasized that Marcus and A Quantity of Copies "concerned the seizure of large quantities of books for the sole purpose of their destruction." Id. at 491, 84 S.Ct. 1723. "[W]here allegedly obscene material is seized, pursuant to a warrant, to preserve the material as evidence in a criminal prosecution," there is no absolute First or Fourteenth Amendment right to a prior adversary hearing. Id. at 488, 93 S.Ct. 2789. In dicta, the Court warned that if the exhibitor made a showing to the trial court that he did not have other copies of the film available, "the court should permit the seized film to be copied so that showing can be continued pending a judicial determination of the obscenity issue in an adversary proceeding. Otherwise, the film must be returned." Id. at 492- 93, 93 S.Ct. 2789 (footnotes omitted).
In the instant cases, RECI took the computers to establish evidence of criminal violations, as in Heller. They operated with a warrant and a prior determination of obscenity by a magistrate, unlike the Marcus case. There was no mass seizure of books, and no showing that the seizure was designed to halt the distribution of materials. Courts have not required adversarial determinations of obscenity to precede similar computer searches. See, e.g., United States v. Hall, 142 F.3d 988, 996 (7th Cir.1998) (rejecting a First Amendment challenge to a search of defendant's computer because the warrant limited the search to items related to child pornography).
Although dicta in the Heller case suggest that police must return material if the seizure would otherwise impede publication, the Supreme Court noted that it was up to the materials' owner to request the return of the materials and to make a showing to the trial court that the seizure prevented a First Amendment activity. Plaintiffs in this case have failed to establish that they requested return of their materials. In fact, the district court concluded in the Guest case that the materials had been returned, and in the O'Brien case that "Plaintiffs [did] not allege that defendants continue[d] to hold materials that belong to them." (O'Brien Dist. Ct. Order, Nov. 5, 1998, at 31.) While the O'Brien plaintiffs chose to contest that conclusion at oral argument on appeal, they have not alleged that they presented the claim to the district court or requested their materials from the defendants. We leave the question suggested by Heller's dicta for another case where plaintiffs have made a showing that they requested and were refused return of expressive materials. We find no First Amendment violation in these cases because defendants seized materials as evidence in criminal prosecutions pursuant to valid warrants.

IV. Electronic Communications Privacy Act
Plaintiffs assert that RECI searched their electronic communications and subscriber information and thus violated the Electronic Communications Privacy Act (ECPA). Title II of the ECPA regulates the disclosure of electronic communications and subscriber information. 18 U.S.C. §§ 2701-2711. Section 2707 provides a civil cause of action against a person who is "aggrieved by any violation of this chapter." 18 U.S.C. § 2707(a). The same section provides a statutory good faith defense; a defendant's "good faith reliance on ... a court warrant or order" provides "a complete defense to any civil or criminal action brought under this chapter *339 or any other law." 18 U.S.C. § 2707(e).
In their complaint, plaintiffs alleged violations of the ECPA requirements for access to stored communications and subscriber information, as set forth in 18 U.S.C. § 2703(a), (b), and (c). Subsection (a) provides that the government may have access to the contents of electronic communications that have been stored 180 days or less only by using a warrant. Subsection (b) allows the government to access contents that have been stored more than 180 days if the government uses a warrant, subpoena, or a court order. [FN5] Subsection (c) is directed to the provider of an electronic communication service (not to the government) and states that such a provider may only give subscriber information to the government if the government has a warrant, court order, or subscriber consent (with an exception for telemarketing fraud). [FN6]


FN5. Subsections (a) and (b) provide:


(a) Contents of electronic communications in electronic storage.--A governmental entity may require the disclosure by a provider of electronic communication service of the contents of an electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less, only pursuant to a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant.....


(b) Contents of electronic communications in a remote computing service.-- (1) A governmental entity may require a provider of remote computing service to disclose the contents of any electronic communication to which this paragraph is made applicable by paragraph (2) of this subsection--


(A) without required notice to the subscriber or customer, if the governmental entity obtains a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant;


(B) with prior notice from the governmental entity to the subscriber or customer if the governmental entity--


(i) uses an administrative subpoena authorized by a Federal or State
statute or a Federal or State grand jury or trial subpoena; or


(ii) obtains a court order for such disclosure under subsection (d) of this section;


except that delayed notice may be given pursuant to section 2705 of this title.


18 U.S.C. § 2703(a)-(b). Paragraph (b)(2) requires the communication to have been electronically transmitted by a subscriber or customer for the purpose of storage or processing, and the provider must not be authorized to access the communications for other purposes. 18 U.S.C. § 2703(b)(2).



FN6. Subsection (c) provides in relevant part:


A provider of electronic communication service or remote computing service shall disclose a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications covered by subsection (a) or (b) of this section) to a governmental entity only when the governmental entity--


(i) obtains a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant;


(ii) obtains a court order for such disclosure under subsection (d) of this section; [or]
(iii) has the consent of the subscriber or customer to such disclosure....


18 U.S.C. § 2703(c)(1)(B).


[26] [27] We conclude that plaintiffs have not stated a claim under the ECPA. There is no violation of § 2703(a), (b), or (c) if access is pursuant to a warrant, and the officials in this case had a valid warrant. Moreover, § 2703(c) applies to the service provider and not to the government. See Tucker v. Waddell, 83 F.3d 688, 693 (4th Cir.1996) ("[T]he language of § 2703(c) does not prohibit any governmental conduct, and thus a governmental entity may not violate that subsection by simply accessing information improperly"). [FN7]


FN7. We do not find persuasive a federal district court decision in Texas cited by plaintiffs. See Steve Jackson Games, Inc. v. United States Secret Service, 816 F.Supp. 432 (W.D.Tex.1993), aff'd on different issue by 36 F.3d 457 (5th Cir.1994). In Steve Jackson Games, the district court awarded damages under the ECPA after Secret Service agents searched the computers of a publishing company that also operated a bulletin board system. Id. at 443. The court appeared to assume that the provisions of the ECPA require notice to subscribers even when police are operating with a valid warrant, an understanding we do not find
supported by the statute. Id.


*340 In their brief, plaintiffs mention in passing 18 U.S.C. § 2701, which prohibits intentional unlawful access to an electronic communication service if the offender "obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage." 18 U.S.C. § 2701(a). Such access is again excused if it occurs pursuant to the approved procedures, which include the use of a warrant. [FN8] There was no violation of the ECPA in these cases.


FN8. Section 2701 provides that the ban on obtaining, altering, or preventing access does not apply if the access is authorized "in section 2703 [warrant, administrative subpoena, grand jury or trial subpoena, court order], 2704 or 2518 of this title." 18 U.S.C. § 2701(c)(3).



V. Privacy Protection Act
A. The Statute
Plaintiffs claim that the defendants seized materials intended for publication and thus violated the Privacy Protection Act (PPA), an act prohibiting police searches for certain types of documents intended for publication. The statute was passed in response to Zurcher v. Stanford Daily, 436 U.S. 547, 98 S.Ct. 1970, 56 L.Ed.2d 525 (1978), in which the Supreme Court held that the Fourth Amendment did not prohibit police from undertaking searches and seizures of documentary evidence held by innocent third parties, such as the newspaper whose records were searched in the case. Id. at 567-68, 98 S.Ct. 1970. According to the Senate Report, the PPA was enacted to afford "the press and certain other persons not suspected of committing a crime with protections not provided currently by the Fourth Amendment." S.Rep. No. 96-874, at 4 (1980), reprinted in 1980 U.S.C.C.A.N. 3950.
The PPA prohibits the government from seizing certain materials, called "work product materials," that are intended for publication:
Notwithstanding any other law, it shall be unlawful for a government officer or employee, in connection with the investigation or prosecution of a criminal offense, to search for or seize any work product materials possessed by a person reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication, in or affecting interstate or foreign commerce.
42 U.S.C. § 2000aa(a).
Work product material means materials (other than property used to commit a criminal offense) that are to be communicated to the public and contain the authors' impressions, opinions, conclusions, or theories. [FN9] The act also bars seizure of "documentary *341 materials," which include materials like notes, photographs, or tapes, other than things possessed for use in a criminal offense. [FN10] The police may still access documentary materials with a subpoena, an option not available for work product materials. See 42 U.S.C. § 2000aa(b)(3).


FN9. Work product materials are defined by the statute as:


materials, other than contraband or the fruits of a crime or things otherwise criminally possessed, or property designed or intended for use, or which is or has been used, as the means of committing a criminal offense, and--


(1) in anticipation of communicating such materials to the public, are prepared, produced, authored, or created, whether by the person in possession of the materials or by any other person;


(2) are possessed for the purposes of communicating such materials to the public; and


(3) include mental impressions, conclusions, opinions, or theories of the person who prepared, produced, authored, or created such material.


42 U.S.C. § 2000aa-7(b).



FN10. Documentary material encompasses:


materials upon which information is recorded, and includes, but is not
limited to, written or printed materials, photographs, motion picture films, negatives, video tapes, audio tapes, and other mechanically, [magnetically] or electronically recorded cards, tapes, or discs, but does not include contraband or the fruits of a crime or things otherwise criminally possessed, or property designed or intended for use, or which is or has been used as, the means of committing a criminal offense.


42 U.S.C. § 2000aa-7(a).


The police can avoid the constraints of the act in some circumstances when the person possessing the materials is a criminal suspect, rather than an innocent third party. The materials exempted by this "suspect exception" must relate to the offense and the offense must not involve the communication of the materials. [FN11]


FN11. The "suspect exception" provides:


[T]his provision [barring search and seizure of work product materials] shall not impair or affect the ability of any government officer or employee, pursuant to otherwise applicable law, to search for or seize such materials, if--


(1) there is probable cause to believe that the person possessing such materials has committed or is committing the criminal offense to which the
materials relate: Provided, however, [t]hat a government officer or employee may not search for or seize such materials under the provisions of this paragraph if the offense to which the materials relate consists of the receipt, possession, communication, or withholding of such materials or the information contained therein (but such a search or seizure may be conducted under the provisions of this paragraph if the offense consists of the receipt, possession, or communication of information relating to the national defense, classified information, or restricted data under the provisions of [certain federal laws], or if the offense involves the production, possession, receipt, mailing, sale, distribution, shipment, or transportation of child pornography, the sexual exploitation of children, or the sale or purchase of children under section 2251, 2251A, 2252, or 2252A of Title 18)....


42 U.S.C. § 2000aa(a).


B. Discussion
[28] Defendants argue that most of the plaintiffs lack standing in these cases because only the operator of the bulletin board systems "possessed" the materials at issue in these cases. However, the statute creates a cause of action for any "aggrieved person": "A person aggrieved by a search for or seizure of materials in violation of this chapter shall have a civil cause of action for damages for such search or seizure...." 42 U.S.C. § 2000aa 6(a); cf. 18 U.S.C. § 2510(11) (defining "aggrieved person" under ECPA Title I as "a person who was a party to any intercepted wire, oral, or electronic communication or a person against whom the interception was directed"). Accordingly, plaintiffs had standing to bring a PPA claim because they were "aggrieved" by the seizure of their communications.
[29] The statute's protection of documents held by publishers such as mainstream newspapers may be straightforward, but interpretation of the act presents particular challenges in a situation unforeseen by the drafters, that of a computer search. As we have explained, when police execute a search warrant for documents on a computer, it will often be difficult or impossible (particularly without the cooperation of *342 the owner) to separate the offending materials from other "innocent" material on the computer. The PPA does not explicitly address the question of liability for a seizure of communicative material that is technically difficult to separate from the evidence of a crime whose seizure is authorized by a valid warrant.
If we were to understand the statute to mean that the presence of some protected materials on the computer extends the PPA protections to all materials, even evidence of a crime, located on the computer, the statute would prevent police in many cases from seizing evidence located on a computer. Criminals would be able to insulate any of their electronically-held criminal records or evidence by including on their computer communicative materials that qualify as work product or documentary materials under the PPA. We hold that when protected materials are commingled on a criminal suspect's computer with criminal evidence that is unprotected by the act, we will not find liability under the PPA for seizure of the PPA-protected materials. [FN12] We emphasize, though, that police may not then search the PPA-protected materials that were seized incidentally to the criminal evidence.


FN12. Plaintiffs rely again on Steve Jackson Games, 816 F.Supp. 432. That case, in which the court awarded PPA damages to a company but not to bulletin board subscribers after the Secret Service seized and searched three of the company's computers, is distinguishable from the instant cases. The owner of the computers was not a criminal suspect, and the court found that the agents had read the electronic communications and deleted some documents. Id. at 438.


[30] In the instant cases, we will assume without deciding that there were PPA-protected materials on the systems. The targeted files--obscene images or pirated software--would not qualify as protected work product or documentary material because both definitions exclude "property designed or intended for use, or which is or has been used as, the means of committing a criminal offense." 42 U.S.C. § 2000aa-7(a) & (b). The arguably PPA-protected materials were commingled with this criminal evidence on computers whose owner or operator was a criminal suspect. The seizure of the PPA materials occurred incidentally to the seizure of this evidence pursuant to a valid warrant, and plaintiffs have not shown that the protected materials were searched. We will not find liability under the PPA under these circumstances. [FN13]


FN13. Because we have determined that the district court did not err in granting summary judgment in favor of defendants, we need not reach defendants' claim that they are immune from liability under the Eleventh Amendment.



VI. Conclusion
For the foregoing reasons, the judgments of the district court are affirmed.
C.A.6 (Ohio),2001.
END OF DOCUMENT
 
Top Bottom