home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 2
/
HACKER2.BIN
/
799.93JUN007.TXT
< prev
next >
Wrap
Text File
|
1993-06-03
|
35KB
|
746 lines
COMPUTER SEARCHES AND SEIZURES
CHALLENGES FOR INVESTIGATORS
By
John Gales Sauls
Special Agent
Legal Instructor
FBI Academy
An informant tells a detective preparing an affidavit for a
warrant to search a drug trafficker's home that the trafficker
is a "computer wiz" who keeps all financial records on a "50
megahertz 486." To trace the drug trafficking proceeds for
forfeiture purposes, the detective wishes to seize the financial
records.
A second officer is investigating a crime in which a
computer virus was introduced into a university's mainframe
computer, shutting down the school's computer operations for 48
hours. As a result of the officer's investigation, a computer
science student becomes a prime suspect. In order to search the
student's computer "account" on the school's mainframe for the
virus' computer code, the officer seeks a search warrant. He
also suspects the "account" to contain an article that the
student wrote on computer viruses.
These officers, in seeking to search for computerized
information, must contend with both statutory and constitutional
restraints that limit police authority. This article examines
the effect of these legal restraints on searches for computers
and computerized information and suggests strategies to ensure
the admissibility of evidence detected.
THE PRIVACY PROTECTION ACT OF 1980
In 1980, Congress enacted a statute to give special
protection to documentary materials prepared or gathered for
dissemination to the public. (1) The statute requires the
government to use a subpoena, rather than a search warrant, to
acquire documentary materials, unless one of the statute's
exceptions that permits the use of a search warrant applies. (2)
Although the statute specifically provides that its
violation is not grounds to suppress evidence, (3) it does provide
a civil remedy in Federal court against either the government
entity or individual officers involved in the search where a
search warrant is used contrary to its provisions. (4)
Because personal computers are used for word processing and
desktop publishing with increasing frequency, officers
contemplating use of a warrant to search for computerized
information should consider the potential application of this
statute. (5) When officers have reason to believe that the computer
stores information created or gathered for public dissemination,
they should make sure that one of the exceptions to the act's
prohibitions applies before a search warrant is used.
The exception most likely applicable permits the use of a
search warrant when there is probable cause to believe the
person possessing the materials sought "has committed or is
committing a criminal offense to which the materials relate...."
(6) If none of the act's exceptions apply, a subpoena should be
used to acquire the evidence.
DRAFTING THE APPLICATION AND SEARCH WARRANT
The fourth amendment protects the right of the people to be
"secure in their persons, houses, papers, and effects" against
unreasonable government intrusion. (7) This protection extends
to computers, which are effects, and to information processed
and stored by computers, which can be categorized as papers.
The constitutional demand on the officer seeking to search for
and seize a person's computer or computerized information is
that the search and seizure be reasonable. (8)
"Reasonableness" is generally best achieved with a valid
search warrant. (9) This is especially true when business or
residential premises, the most likely locations for computers,
must be entered to perform the search. (10)
The fourth amendment sets forth certain procedural
requirements that must be met for a valid warrant to be issued.
There must be a showing of probable cause, supported by oath or
affirmation, and the warrant must particularly describe the
place to be searched and the persons or things to be seized.
(11) The requirement of oath or affirmation raises no special
problems where computer searches are concerned; however, the
probable cause and particularity requirements pose unique
problems where computers are the search target.
ESTABLISHING PROBABLE CAUSE
The fourth amendment probable cause requirement has been
interpreted to command that before a search warrant is issued,
the government must set forth facts that would cause a
reasonable person to conclude that three factors are probably
true. Specifically, it must be probably true that a crime has
been committed, that evidence of the crime exists, and that the
evidence presently exists at the place to be searched. (12)
Crime Committed
Magistrates are familiar with the mechanics of how a murder
might be committed with a gun, but they may have difficulty
understanding how an embezzlement might be accomplished by means
of a computer. When computers are used to commit a crime,
officers need to detail how the suspect committed the crime,
primarily because the process involves unfamiliar technology.
(13) The problem becomes an educational one. (14)
Obviously, when seeking to convince a magistrate that a
crime has been committed in a novel manner, an officer should
explain the mechanics of the crime carefully and clearly. If
the officer wishes the magistrate to consider the officer's
interpretations of the facts, the officer must inform the
magistrate in the affidavit of the experience and training that
accredit these interpretations. (15)
An officer seeking to establish probable cause that an
unusual crime has been committed may also elect to use the
services of an expert. (16) The challenge for the officer is
providing sufficient details in layman's terms to familiarize
the magistrate with the mechanics of an unusual criminal
technique.
Evidence of the Crime Exists
A computer may be used as a tool to commit a crime and to
create and/or store records of crime. In order to acquire a
search warrant to seize both the computer and records, officers
need to establish factually the probability that each of these
things exists and the link between them and the criminal
activity. When facts establish the probability that a computer
was used to commit a crime, those same facts establish the
existence of the computer, as well as its link to the crime.
(17)
When an officer seeks to establish that computerized
records of criminal activity probably exist, the focus should be
on establishing the creation and retention of records rather
than the mechanism by which this was accomplished. (18) In the
past decade, computer use to create and store records has become
so pervasive that the concept of a document existing as binary
code imprinted magnetically or optically on a computer disk is
no longer novel. Consequently, when documents are the target of
the search, the process by which the suspect created the
documents need not be set forth for a magistrate in an
affidavit. The critical facts are those that demonstrate the
probability that records are being kept and that these records
are evidence of the criminal activity.
United States v. Falon (19) is illustrative of this point.
In Falon, investigators established probable cause that Falon
was operating a fraudulent loan advance fee scheme out of two
adjacent luxury apartments. They obtained a search warrant that
authorized the seizure of "borrowers' files; lists of borrowers;
banking and financial records; financial statements; advertising
records; correspondence, memoranda and documents relating to
loans, loan guarantees, potential loans and potential loan
guarantees; and sales literature and brochures." (20) Also
listed were "checkbooks; canceled checks; telephone records;
address indexes; message slips; mail, telex, and facsimile
records; calendars and diaries; memory typewriters; word
processors; computer disks, both hard and floppy; and other
electronic media devices, electronic storage media and related
software." (21)
Items on the first list, because of the clear link to the
fraudulent advance fee scheme set forth in the probable cause
statement, were held to have been properly seized under the
search warrant. (22) "Borrowers' files," for example, have a
clear relationship to a loan advance fee scheme.
Items on the second list were held to be insufficiently
linked to the alleged criminal activity, and their seizure was
held improper, causing them to be inadmissible as evidence. (23)
"Calendars and diaries" located in the search might as likely be
innocent and personal as criminal.
Factually linking, in the affidavit, the relationship of
the items to be seized to the alleged criminal activity is the
key. Had the warrant specified, for example, "calendars listing
events related to loan-making activity," the linking requirement
would have been satisfied for such items. Likewise, listing
"floppy disks containing documents related to making or
guaranteeing loans" would make such items validly subject to
seizure.
Evidence Present at the Search Site
An officer seeking to establish probable cause to search
must also factually establish the probability that the evidence
sought is presently located at the place to be searched. (24) At
times, having a computer or its records as the target of the
search may simplify meeting this requirement.
If a suspect used a computer to commit a crime
telephonically, it is also possible that the suspect set up the
computer to "answer" incoming calls. This allows other computer
operators to call it using their computer terminals and a
telephone.
When such an operation exists, an incoming call will be
answered with a tone called a "carrier." (25) When a particular
phone is answered with a "carrier," it seems reasonable for a
magistrate, informed of the carrier's significance in the
affidavit, to find that a computer and related equipment are
probably present at the telephone's location. (26)
When computerized records are sought, the magistrate should
consider that records, by their very nature, are created to be
kept for at least a minimum period of time. This fact, along
with the other facts presented, should be weighed in determining
whether the records are presently at the place to be searched.
(27) Although each case must be evaluated on its own facts, the
U.S. Supreme Court and lower courts have held that under
certain circumstances, it is reasonable to expect that records
seen 3 months previously will still be present at the location
where they were observed. (28)
SUFFICIENTLY PARTICULAR DESCRIPTIONS
The fourth amendment limits valid warrants to those
"particularly describing the place to be searched and the
persons or things to be seized." (29) This provision mandates
that a warrant authorizes only a search of a specific place for
specifically named items.
Coupled with the probable cause requirement, this provision
prevents general searches by ensuring that warrants describe a
discrete, defined place to be searched, describe only items
connected with criminal activity for which probable cause has
been established, and describe the items so definitely that it
removes from an officer executing the warrant the unguided
discretion of determining which items to seize. (30) It also
provides a signal of when to end a search, that is, when all
items named in the warrant have been located and seized or when
all possible hiding places for items not located have been
explored.
The "place to be searched" portion of the particularity
requirement has no special impact on computer searches.
However, the "things to be seized" portion has a significant
impact in seeking warrants to authorize the seizure of computers
and information processed by computers.
Describe the Computer System
The primary rule of particularity is to describe the items
to be seized as precisely as the facts allow. For example, when
a computer has been reported stolen, it is reasonable to expect
that the owner can provide a detailed description of the stolen
item. Therefore, if the object of the search is a stolen
computer, a detailed description, including make, model, and
serial number, if known, will probably be required.
When computer equipment is sought because it was an
instrumentality of crime, only a more general description may be
possible. For example, when a victim complains that the
computer system has been accessed telephonically by an unknown
person, the investigating officer may only be able to determine
what types of devices were used to accomplish the crime. The
officer may determine that a computer terminal (a keyboard and
display monitor) and a modem (a device that permits digitally
encoded computer information to be transmitted over telephone
lines) were necessary to perform the acts accomplished, but the
officer may not have any information regarding the manufacturers
of the equipment, model numbers, or serial numbers. If a
telephone trace reveals the location from which the intruding
call originated, the officer may have probable cause to search.
Under such circumstances, a rather general description of "a
computer terminal and modem of unknown make or model" would
likely suffice. (31)
Because numerous component parts comprise computer systems,
an investigator applying for a warrant to seize a computer
should ensure that the warrant describes all computer system
parts that are probably present, including mechanisms for data
storage. (32) Consulting with an expert increases the likelihood
of listing thoroughly the items of evidence probably present.
The expert's education and experience should be set forth in the
affidavit to give the magistrate a sound basis for concluding
that the items sought are probably located at the place to be
searched.
Information Processed By Computer
Because the fourth amendment particularity requirement is
strictly applied where documents are concerned, the descriptive
task where computerized information is the subject of a search
warrant is often a demanding one. (33) Nonetheless, courts
reviewing applications for search warrants evaluate the
particularity of the document's description in light of the
degree of precision that the facts of a case allow.
For example, in United States v. Timpani, (34) a search
warrant authorizing the seizure of "any and all records relating
to extortionate credit transactions (loansharking)" (35) was
challenged as being insufficiently particular. In reviewing the
warrant, the court noted that the warrant included a lengthy
list of types of records (including "lists of loan customers,
loan accounts, telephone numbers, address books" (36)) and that
the warrant "provide[d] a standard for segregating the
`innocent' from the `culpable' in the form of requiring a
connection with [the] specific, indentifiable crime [of
loansharking]." (37) The court upheld the particularity of the
warrant, stating, "It is difficult to see how the search warrant
could have been made more precise." (38)
When aware of specific documents sought, an officer should
designate them by type (letter, memo, etc.), date, subject,
author, and addressee, providing as much detail as possible.
For example, when "a letter from John Jones to Bill Smith dated
November 9, 1985, and concerning the ownership of 200 shares of
IBM stock" is sought, officers should describe the letter in
such specific terms.
When only the general nature of the information sought is
known, a highly detailed description is impossible. In such
cases, officers must use great care to give a description that
includes the information sought but limits the search as
narrowly as possible. This is accomplished by using a general
description, qualified by some standard that will enable the
executing officers to separate the information to be seized from
innocent information that may also be present.
Such limiting phrases must be crafted based on the facts
establishing probable cause to search. If the facts establish
that the information sought comes from a particular time period,
the phrase should limit the warrant to information of that time
period. If the information sought is known to have been
produced by a particular individual, the phrase should limit the
description to material authored by that person. If the phrase
combines several such factors, it is even more effective. As
in United States v. Timpani, the phrase may restrict the
description to particular criminal conduct. In that case, the
limiting phrase was "records relating to extortionate credit
transactions (loansharking)." (39)
It is most important that the limiting phrase restrict the
scope of the search so that it remains within the bounds of the
probable cause set out in the affidavit. A warrant may not
validly authorize the seizure of items for which probable cause
to search has not been established. In upholding the
description of items in the warrant in the Timpani case, the
court noted that "[e]ach item is plausibly related to the
crime--loansharking or gambling--that is specifically set out [in
the affidavit]." (40) The description, even though the items to
be seized were described in generic terms, did not exceed the
probable cause because of the use of an appropriately narrow
limiting phrase. (41)
When information sought is described with sufficient
particularity, the form in which the information may be found is
not of great concern. Concluding the list of described items
with the phrase "the documents listed above may be found in
written or electronic form" should be sufficient to permit
lawful seizures of the documents regardless of the form in which
they are found. (42)
EXECUTING THE SEARCH WARRANT
The protection of the fourth amendment does not end when an
officer obtains a valid search warrant. The right of citizens
to be free of "unreasonable searches and seizures" extends to
the manner in which officers execute a search warrant.
The "reasonableness" requirement demands that officers
executing search warrants:
1) Give notice of their authority and purpose, under most
circumstances, prior to forcibly entering premises to
execute the warrant
2) Take only reasonable action, once inside, to control
the premises and prevent the destruction of evidence
3) Conduct the search within the limits set forth in the
warrant, and
4) Refrain from seizing items not listed in the warrant
(unless there are independent, legal grounds for the
seizure).
Each of these requirements has potential impact on computer
searches.
The "Knock and Announce" Requirement
To protect safety, and because of a judicial preference for
peacable entries based on submission to lawful authority,
officers are generally required to knock and announce their
identity and purpose before forcibly entering premises to
perform a search. (43) This requirement is subject to certain
exceptions that allow entry without notice under certain
circumstances, including when officers have information that an
announcement would likely result in the destruction of evidence.
(44) The ease and rapidity of destruction of the evidence sought
is a factor courts will consider in determining whether a
"no-knock" entry was reasonable. (45)
Due to the manner in which it is processed and stored,
computerized information is easily and quickly destroyed.
Information in the computer's active memory can be instantly
destroyed by switching off the machine's power. Information
stored on magnetic media (with capacities of thousands of pages)
can be quickly erased by exposing the storage device to a
magnet. Consequently, when officers know prior to executing a
warrant that information has been stored by computer and that
persons with a motive to destroy the information are likely
present at the place to be searched, an unannounced entry is
likely reasonable. (46)
Controlling the Premises
The U.S. Supreme Court has noted that officers executing a
search warrant exercise "unquestioned command of the situation."
(47) Consequently, officers executing a search warrant have the
power to control access to the premises being searched and to
control the movement of persons present to facilitate the search
and to prevent the removal or destruction of evidence. Because
of the ease of destruction of computerized information and the
size and complexity of some computer facilities, it will often
be reasonable to take full control quickly of the facility to be
searched. (48)
Searching Within the Scope of the Warrant
Requiring a particular description of the items to be
seized limits the allowable scope of a search in two ways.
First, it restricts where an officer may look to only those
places where the items sought might reasonably be concealed.
(49) Second, it restricts the duration of the search to the
point where either all listed items have been located and seized
or until all possible places of concealment have been explored.
(50) Failure to comply with either of these restrictions can
result in a search that violates the fourth amendment.
A sensible first step is to ensure that all searching
officers know the items listed on the warrant. (51) Once on the
scene, the officers should carefully restrict the search to the
items listed in the warrant.
A problem that frequently arises is that of sorting the
items subject to seizure from those that are innocently
possessed. This problem is especially common in cases where
business records are the target of the search. In all cases,
the officers must limit the examination of innocent items to
that necessary to determine whether the items are among those
listed in the warrant. (52)
A search for documents stored in electronic form by a
computer will require use of the computer's display screen to
view documents or the computer's printer to print them. A
sorting process should be used where each document is briefly
examined to determine if it is one of those to be seized,
similar to that used to search through "ink on paper" documents.
Obviously, this type of search requires certain operational
knowledge regarding computer equipment. For this reason, expert
assistance during the search may be essential, especially where
efforts have been made to encrypt or conceal the documents. (53)
In general, the sorting process should be performed at the
scene of the search to prevent unnecessarily denying the owner
access to and use of innocent records. The mere fact that the
sorting process is time consuming does not justify a wholesale
seizure of all records present.
Nonetheless, certain characteristics of computerized
recordkeeping support off-site sorting. First, the storage
capacity of some computerized systems is so great that review of
all documents stored in the system could take a very long time.
Second, unlike with paper files, the number of investigators who
may assist in the search is limited by the number of computer
terminals available for document display. Finally, records
stored by computer can usually be quickly duplicated in their
computerized form, allowing copies to be left for the owner's
use.
Officers who anticipate the need to seize a large quantity
of computerized documents for sorting at a later time should
seek approval from the magistrate when applying for the search
warrant. A likely legal concern in this situation is that the
innocent documents included in the seized records will be
available for unrestrained viewing by investigators, resulting
in a postponed "general search." A potential control on such
unrestricted viewing is continued judicial supervision of the
sorting process. (54)
Disconnecting the Computer from Telephone Lines
The Electronic Communications Privacy Act of 1986 provides
that in order to intercept an electronic communication (which
includes transmission of words or characters from computer to
computer) during its transmission, without the consent of one of
the parties to that communication, an officer must obtain an
extraordinary court order, similar to that required to lawfully
wiretap. (55) Because the computer that is the subject of a
search warrant may be connected electronically to others,
forbidden interception of electronic communications might result
during execution of the warrant. To avoid this, and to ensure
that commands to destroy evidence are not transmitted to the
computer from a remote location, it is sound practice to
disconnect the computer from telephone lines at the outset of
the search.
CONCLUSION
Addressing the situations faced by the two officers
described at the beginning of this article, the first officer
needs to establish factually in his affidavit the probable
existence of financial records that are evidence of crime, and
to describe particularly those records in the search warrant.
The fact that the records may be computerized somewhat
complicates the execution of the warrant, and the officer may
need to seek expert guidance in order to locate and seize the
records in question successfully.
The second officer needs to consider whether the Privacy
Protection Act of 1980 permits the use of a search warrant in
his case when he is seeking authority to search for items he
reasonably believes are, in part, materials prepared for public
dissemination that are in the possession of an innocent third
party. If the officer determines that a search warrant is
appropriate under the circumstances, the officer must then
contend with the challenge of communicating to the magistrate
how a novel criminal offense has been committed by means of a
computer.
As officers approach such challenges, they should carefully
adhere to established fourth amendment principles. These
principles, coupled with the use of expert assistance where
needed, enhance the likelihood of obtaining computerized
evidence that is judicially admissible.
ENDNOTES
(1) Privacy Protection Act of 1980, 42 U.S.C. 2000aa,
et seq.
(2) 42 U.S.C. 2000aa.
(3) 42 U.S.C. 2000aa-6(e).
(4) 42 U.S.C. 2000aa-6. The statute also provides for
award of costs and attorneys fees to a prevailing plaintiff.
For a detailed discussion of the act, see Rissler, "The Privacy
Protection Act of 1980," FBI Law Enforcement Bulletin, February
1981.
(5) Federal law enforcement officers should be aware that
the Attorney General, as directed by 42 U.S.C. 2000aa-11, has
issued guidelines to assure compliance with the Privacy
Protection Act of 1980, which Federal officers must follow to
avoid being the subject of disciplinary proceedings. These
guidelines are found at 28 CFR Part 59.
(6) 42 U.S.C. 2000aa(a)(1), 2000aa(b)(1).
(7) U.S. Const. amend. IV.
(8) See Katz v. United States, 389 U.S. 347 (1967).
(9) Id. at 357.
(10) See Michigan v. Tyler, 436 U.S. 499 (1978).
(11) U.S. Const. amend. IV.
(12) Zurcher v. Stanford Daily, 436 U.S. 547, 556-557 n. 6
(1978), quoting Comment, 28 U. Chi. L. Rev. 664, 687 (1961).
(13) See, e.g., United States v. Morris, 928 F.2d 504, (2d
Cir. 1991), cert. denied, 112 S.Ct. 72 (1991) (defendant
introduced computer "worm" into national research computer
network, shutting down university and government computer
systems across the country); United States v. Taylor, 945 F.2d
1050 (8th Cir. 1991) (defendant accessed American Express
computer system by phone and acquired "working" but unissued
credit card numbers, which he then used to purchase thousands of
dollars worth of merchandise).
(14) An example of an officer successfully obtaining a
search warrant in a case where novel technology was being
employed to commit the crime of fraud is found in Ottensmeyer v.
Chesapeake & Potomac Telephone Co., 756 F.2d 986 (4th Cir.
1985).
(15) See, e.g., United States v. Ortiz, 422 U.S. 891
(1975).
(16) An example of using information provided by experts
in affidavits for search warrants is found in United States v.
Steerwell Leisure Corp., Inc, 598 F. Supp. 171 (W.D.N.Y. 1984).
(17) See United States v. Steerwell Leisure Corp., Inc.,
598 F. Supp. 171 (W.D.N.Y. 1984).
(18) See, e.g., United States v. Truglio, 731 F.2d 1123
(4th Cir. 1984), cert. denied, 469 U.S. 862 (1984).
(19) 959 F.2d 1143 (1st Cir. 1992).
(20) Id. at 1149.
(21) Id. at 1145.
(22) Id. at 1149.
(23) Id.
(24) Illinois v. Gates, 462 U.S. 213, 238 (1983).
(25) See Fitzgerald and Eason, Fundamentals of Data
Communication (John Wiley & Sons, 1978), pp. 42-43.
(26) Cf. United States v. Harvey, 540 F.2d 1345 (8th Cir.
1976).
(27) United States v. McManus, 719 F.2d 1395 (6th Cir.
1983).
(28) Andresen v. Maryland, 427 U.S. 463, 478 n. 9 (1976).
(29) U.S. Const. amend. IV.
(30) See Marron v. United States, 275 U.S. 192 (1927).
For a thorough discussion, see 2 W. LaFave, Search and Seizure,
95-101 (1978).
(31) An analogous case is State v. Van Wert, 199 N.W.2d
514 (Minn. 1972).
(32) Equipment components will probably include a central
processing unit, printers, terminals (keyboards and display
screens), magnetic disk drives, optical disk drives, and
magnetic tape drives. Software and manuals are also critical
components of an operating computer system and should be
included as items to be seized, especially if the officer
anticipates operating the system for investigative or
evidentiary purposes. Common storage media include magnetic
hard disks, floppy disks, and magnetic tapes, as well as optical
disks.
(33) See Andresen v. Maryland, 427 U.S. 463 (1976).
(34) 665 F.2d 1 (1st Cir. 1981).
(35) Id. at 4.
(36) Id.
(37) Id. at 5.
(38) Id.
(39) Id. at 4.
(40) Id. at 5.
(41) An innovative means of limiting the items described
to those for which probable cause to search has been established
is found in the case In Re Search Warrant Dated July 4, 1977,
Etc., 667 F.2d 117 (D.C. Cir. 1981), cert. denied, 102 S.Ct.
1971 (1982). Here, the scope of the description of items to be
seized was limited to documents related to "the crimes ... which
facts recited in the accompanying affidavit make out." The
court, in upholding the warrant, noted with approval the
limiting phrase. As was done in this case, it is often
desirable to incorporate the affidavit into the warrant by
appropriate language and to attach it to the warrant.
(42) See United States v. Truglio, 731 F.2d 1123 (4th Cir.
1984), cert. denied, 469 U.S. 862 (1984). See also, United
States v. Offices Known as 50 State Distrib., 708 F.2d 1371
(9th cir. 1983), cert. denied, 79 L.Ed.2d 677 (1984).
(43) For a thorough discussion, see 2 W. LaFave, Search
and Seizure, 122-140 (1978).
(44) Id.
(45) Id.
(46) Id. The announcement requirement is also less
stringently applied where warrants are executed against business
premises. See United States v. Francis, 646 F.2d 251, 258 (6th
Cir. 1981), cert. denied, 70 L.Ed.2d 616 (1981).
(47) Michigan v. Summers, 452 U.S. 692, 703 (1981).
(48) An example of such action is found in United States
v. Offices Known as 50 State Distrib., 708 F.2d 1371 (9th Cir.
1983), cert denied, 79 L.Ed.2d 677 (1984).
(49) Harris v. United States, 331 U.S. 145 (1947).
(50) Id. In addition to suppression of evidence, civil
liabilityy may result when a search continues after all items
named in the warrant have been seized. See Creamer v. Porter,
754 F.2d 1311 (5th Cir. 1985).
(51) See In Re Search Warrant dated July 4, 1977, Etc.,
667 F.2d 117, 123 (D.C.Cir. 1981), cert. denied, 102 S.Ct. 1971
(1982) (noting with approval that "[i]n preparation for the
search the agents attended several meetings to discuss and
familiarize themselves with the areas and documents described in
the search warrant and accompanying affidavit. They were
instructed to confine themselves to these areas and documents in
their search. During the search each agent carried with him a
copy of the search warrant and its 'Description of Property' and
could contact one of three persons on the scene who carried the
supporting affidavit.")
(52) An officer executing a search warrant will frequently
need to sort through information to determine what portion of it
may be seized pursuant to the warrant. If, during the course of
the process, the allowed limited perusal of information is
sufficient to cause the officer to conclude that the information
is probable evidence of a crime, the officer may lawfully seize
the document without obtaining a second warrant under the "plain
view" exception provided he can later demonstrate that he was
searching reasonably within the limits of the warrant he was
executing when he encountered the evidence, and there was
probable cause upon proper examination of the item that it was
evidence of criminal activity. Horton v. California, 110 S.Ct.
2301 (1990).
(53) An expert accompanied officers executing the search
warrant in Ottensmeyer v. Chesapeake & Potomac Telephone Co.,
756 F.2d 986 (4th Cir. 1985). Another case considering the role
of an expert accompanying officers executing a search warrant is
Forro Precision, Inc. v. International Business Machines Corp.,
673 F.2d 1045 (9th Cir. 1982).
(54) See United States v. Tamura, 694 F.2d 591 (9th Cir.
1982); DeMassa v. Nunez, 747 F.2d 1283 (9th Cir. 1984) (special
master appointed to supervise sorting of documents during search
of attorney's office).
(55) 18 U.S.C. 2511(1).