AI Case Brief
Generate an AI-powered case brief with:
đKey Facts
âď¸Legal Issues
đCourt Holding
đĄReasoning
đŻSignificance
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
FILED
United States Court of Appeals
Tenth Circuit
April 28, 2009
PUBLISH Elisabeth A. Shumaker
Clerk of Court
UNITED STATES COURT OF APPEALS
TENTH CIRCUIT
UNITED STATES OF AMERICA,
PlaintiffâAppellant,
v. No. 08-2154
LORETTA OTERO,
DefendantâAppellee.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
(D.C. NO. CR-07-386-MCA)
Fred J. Federici, Assistant United States Attorney, Las Cruces, New Mexico
(Gregory J. Fouratt, United States Attorney, and Terri J. Abernathy, Assistant
United States Attorney, Las Cruces, New Mexico, with him on the briefs), for
Plaintiff-Appellant.
Michael A. Keefe, Assistant Federal Public Defender, Albuquerque, New Mexico,
for Defendant-Appellee.
Before McCONNELL, HOLLOWAY and BALDOCK, Circuit Judges.
McCONNELL, Circuit Judge.
While neither rain nor sleet nor snow could keep the residents along Postal
Highway Contract Route 64 in Los Lunas, New Mexico from receiving their mail,
the temptations of mail fraud and credit card theft were a different story. Loretta
Otero, the assigned postal carrier for that route, was identified as the culprit and
charged with a number of crimes arising out of her alleged theft. At trial, she
moved to suppress two incriminating documents uncovered during a search of her
computer on the grounds that the warrant authorizing the search lacked sufficient
particularity. The district court agreed and suppressed the evidence. The
government filed this interlocutory appeal under 18 U.S.C. § 3731. While we
agree with the district court that the warrant was invalid for lack of particularity,
we hold that the good faith exception to the exclusionary rule should apply and,
accordingly, we reverse.
I. Background
In February 2001, a number of residents along Postal Highway Contract
Route 64 began to lodge complaints that their mail was not being delivered.
Specifically, they complained that they were missing credit cards, personal
identification numbers, and billing statements. These residents had also noticed a
number of unauthorized cash withdrawals from their accounts. Ms. Otero had
been the assigned postal carrier on Postal Highway Contract Route 64 for more
than thirteen years.
Understandably suspicious, Postal Inspector Stephanie Herman devised an
investigation. On March 13, 2002, she prepared two test letters that appeared to
be from credit card companies and were addressed to residents on Ms. Oteroâs
-2-
route. Inspector Herman then conducted surveillance of Ms. Otero as she made
her deliveries, confirming that the two test letters were never delivered. When
Ms. Otero completed her route, returned to the Los Lunas Carrier Annex, gathered
her personal belongings, and left the building, Inspector Herman stopped her in
the parking lot and inspected her bags. Inside the bags Inspector Herman found
not only the two test letters, but also six other pieces of First Class Mail, all
addressed to residents on Ms. Oteroâs route and all from credit card companies.
Ms. Otero was immediately placed on suspension and another carrier took over
her route. Although Ms. Otero had been relieved of her delivery duties, residents
reported that a week after her suspension she in fact continued making deliveries,
though only of a very particular type of letter: credit card-related mail with
outdated postmarks.
On March 27, 2002, Inspector Herman prepared a search warrant for Ms.
Oteroâs residence. Before bringing it to the magistrate judge, she took the
warrant to an Assistant United States Attorney so that he could review it and
confirm âthat all of the information was there, . . . [that] there was probable cause
and that it was legally correct.â App. 127. Only after obtaining the AUSAâs
approval did she submit the warrant to the magistrate judge. The key portion of
the warrant outlining the scope of the search was Attachment B, which read in
full:
-3-
ITEMS TO BE SEIZED:
1. Any and all mail matter addressed to residents of Highway
Contract Route 064 in Los Lunas, New Mexico.
2. Any and all credit cards, credit card receipts and/or other records
bearing names, addresses and/or credit card numbers of known
victims and other residents from Highway Contract Route 064 in Los
Lunas, New Mexico.
3. Any and all credit cards, credit card invoices, receipts, statements,
affidavits of forgery, pre-approved offers, applications,
correspondence, automatic teller machine (ATM) receipts and/or other
records related to credit card or other accounts at financial institutions
and/or businesses for individuals other than residents of 123 La
Ladera Rd., Los Lunas, NM 87031 [Ms. Oteroâs address].
4. Any and all mail matter or correspondence addressed to
individuals other than residents of 123 La Ladera Rd., Los Lunas, NM
87031.
5. Any and all materials including but not limited to letters,
correspondence, journals, records, notes, data and computer logs
bearing victim information and/or other information related to or
pertaining to the theft of mail, the fraudulent credit cards, bank fraud
and conspiracy including but not limited to credit card offers,
receipts, credit card statements, financial statements, and financial
transaction records.
COMPUTER ITEMS TO BE SEIZED
6. Any and all information and/or data stored in the form of magnetic
or electronic coding on computer media or on media capable of being
read by a computer or with the aid of computer-related equipment.
This media included floppy diskettes, fixed hard disks, removable
hard disk cartridges, tapes, laser disks, video cassettes and other
media which is capable of storing magnetic coding, as well as punch
cards, and/or paper tapes and all printouts of stored data.
7. Any and all electronic devices which are capable of analyzing,
creating, displaying, converting, or transmitting electronic or
-4-
magnetic computer impulses or data. These devices include
computers, computer components, computer peripherals, word
processing equipment, modems, monitors, cables, printers, plotters,
encryption circuit boards, optical scanners, external hard drives,
external tape backup drives and other computer-related electronic
devices.
8. Any and all instructions or programs stored in the form of
magnetic or electronic media which are capable of being interpreted
by a computer or related components. The items to be seized include
operating systems, application software, utility programs, compilers,
interpreters and other programs or software used to communicate with
computer hardware or peripherals either directly or indirectly via
telephone lines, radio or other means of transmission.
9. Any and all written or printed material which provides instructions
or examples concerning the operation of the computer systems,
computer software and/or any related device, and sign-on passwords,
encryption codes or other information needed to access the computer
system and/or software programs.
App. 63â64. Inspector Herman attached an affidavit in which she stated that, in
her experience, âpeople engaged in this type of criminal activity often keep
records on the computers, including the hard drive and disks,â App. 69, and in
which she explained the process for off-site recovery of such records and said that
the search would âmake every effort to review and copy only those programs,
directories, files, and materials that are instrumentalities and/or evidence of the
offenses described herein.â App. 70. That affidavit, however, was not explicitly
incorporated into the warrant.
The magistrate judge signed the warrant and Inspector Herman executed it
on March 28, 2002. She seized a computer hard drive, eighty-eight floppy disks,
-5-
and two compact disks, all of which she sent to Robert Werbick, a forensic
computer analyst with the Postal Inspection Service. Inspector Herman also sent
a copy of the warrant, the application and affidavit in support of the warrant, and
a cover letter explaining that the âsearch warrant was for items relating to the
theft of credit cards and related correspondence from the mail on Highway
Contract Route (HCR) 064.â App. 72. The letter instructed Inspector Werbick to
ascertain â[w]hether information described in Attachment B of the search warrant
exists within the files on the hard drive, the floppy disks or the CDs.â Id. She
also included a list of known victims and a list of the names and addresses of
persons along the delivery route.
Inspector Werbick conducted a keyword search of the hard drive and disks,
using the list of victim names and credit card information that Inspector Herman
had provided him. He did not, however, place a date restriction on his search that
would limit the search only to files created during the time of the suspected credit
card fraud. When the search generated a âhit,â Inspector Werbick would examine
the hit to determine whether or not it fell within the scope of the warrant. Most
of the hits turned out to be âfalse hits.â For example, a search based on a resident
with the last name âArnoldâ would also pull up files associated with âArnold
Schwarzeneggerâ or âArnold Palmer.â Two of the hits, however, uncovered
highly pertinent information that someone had tried to delete from the hard drive.
One was a credit card log that listed fourteen names, some of whom were known
-6-
victims, with accompanying headings such as âPin,â âAccount Number,â âCredit
Limit,â and âAddress.â The second was a list of names and addresses of
individuals along Ms. Oteroâs route. Both of these files were found in the
âunallocated spaceâ of the hard drive, where deleted data is stored before it is
then overwritten with new data. According to Inspector Werbick, a date
restriction could not have been used in a search of unallocated space.
Ms. Otero was charged with a number of crimes, including theft or receipt
of stolen mail in violation of 18 U.S.C. § 1708, theft of mail by an officer or
employee of the postal service in violation of 18 U.S.C. § 1709, obstruction of
correspondence in violation of 18 U.S.C. § 1702, and devising a scheme or
artifice to defraud in violation of 18 U.S.C. §§ 1341 and 1346. At trial she moved
to suppress, as the fruits of an invalid warrant, the two files uncovered from her
hard drive. The court granted her motion, finding that the warrant was facially
defective because it âpurports to authorize the search and seizure of âany and allâ
computer itemsâwithout limitation.â Op. 12. The court rejected the
governmentâs argument that under a natural reading of the warrant the portion
authorizing the computer search was limited to information pertaining to the
alleged mail fraud and credit card theft. The court also rejected the governmentâs
assertion that the good faith exception applied. The government filed this
interlocutory appeal.
-7-
II. Discussion
A. Particularity of the Warrant
The Fourth Amendment requires not only that warrants be supported by
probable cause, but that they âparticularly describ[e] the place to be searched, and
the persons or things to be seized.â U.S. Const. amend. IV. The particularity
requirement âensures that the search will be carefully tailored to its justifications,
and will not take on the character of the wide-ranging exploratory searches the
Framers intended to prohibit.â Maryland v. Garrison, 480 U.S. 79, 84 (1987).
See also Marron v. United States, 275 U.S. 192, 196 (1927) (âThe requirement
that warrants shall particularly describe the things to be seized makes general
searches under them impossible and prevents the seizure of one thing under a
warrant describing another. As to what is to be taken, nothing is left to the
discretion of the officer executing the warrant.â). The modern development of the
personal computer and its ability to store and intermingle a huge array of oneâs
personal papers in a single place increases law enforcementâs ability to conduct a
wide-ranging search into a personâs private affairs, and accordingly makes the
particularity requirement that much more important. See, e.g. United States v.
Riccardi, 405 F.3d 852, 863 (10th Cir. 2005) (warrant authorizing general search
of computer invalid as it permitted officers to search anything âfrom child
pornography to tax returns to private correspondenceâ); United States v. Carey,
172 F.3d 1268, 1272 (10th Cir. 1999) (computer search for files pertaining to
-8-
distribution of controlled substances uncovered child pornography). Because of
this, our case law requires that âwarrants for computer searches must
affirmatively limit the search to evidence of specific federal crimes or specific
types of material.â Riccardi, 405 F.3d at 862 (emphasis added).
Wisely, the government does not contest that a warrant authorizing a search
of âany and all information and/or dataâ stored on a computer would be anything
but the sort of wide-ranging search that fails to satisfy the particularity
requirement. Its claim, rather, is that under a natural reading of the warrant the
computer search is limited to uncovering only evidence of the mail and credit
card theft along Ms. Oteroâs delivery route. In other words, paragraphs six,
seven, eight, and nine, which fall under the heading âCOMPUTER ITEMS TO BE
SEIZED,â are limited by paragraphs two, three, and five, which fall under the
separate heading of âITEMS TO BE SEIZEDâ and restrict the search to
âinformation related to or pertaining to the theft of mail, the fraudulent credit
cards, bank fraud and conspiracy.â App. 63.
It is true that âpractical accuracy rather than technical precision controls
the determination of whether a search warrant adequately describes the place to
be searched.â United States v. Simpson, 152 F.3d 1241, 1248 (10th Cir. 1998)
(quoting United States v. Hutchings, 127 F.3d 1255, 1259 (10th Cir. 1997)). A
warrant need not necessarily survive a hyper-technical sentence diagraming and
comply with the best practices of Strunk & White to satisfy the particularity
-9-
requirement. Nor is it beyond comprehension that the inspectors in this case
would subjectively read the provisions pertaining to the computer search as being
subject to the same limitations as the rest of the warrant, as the district court
found they did. We agree with the district court, however, that the warrant
describes the items to be seized with neither technical precision nor practical
accuracy, and it therefore lacks sufficient particularity.
Attachment B is quite neatly divided into two subsections: âITEMS TO BE
SEIZEDâ and âCOMPUTER ITEMS TO BE SEIZED.â Each paragraph under the
first section takes pains to limit the search to evidence of specific crimes or
evidence pertaining to specific persons along Ms. Oteroâs delivery route. Each
paragraph under the second section, in contrast, has no limiting instruction
whatsoever. Read alone, they each authorize a search and seizure of â[a]ny and
allâ information, data, devices, programs, and other materials. There is no
explicit or even implicit incorporation of the limitations of the first five
paragraphs. The computer-related paragraphs do not even refer to the rest of the
warrant. In fact, the presence of limitations in each of the first five paragraphs
but absence in the second four suggests that the computer searches are not subject
to those limitations. Even when read in the context of the overall warrant,
therefore, the paragraphs authorizing the computer search were subject to no
affirmative limitations.
-10-
The government contends that the warrant in this case is comparable to the
warrant in United States v. Brooks, which we upheld. 427 F.3d 1246 (10th Cir.
2005). That warrant authorized officers to search for âevidence of child
pornography,â including âphotographs, pictures, computer generated pictures or
images, depicting partially nude or nude images of prepubescent males and or
females engaged in sex acts,â as well as âcorrespondence, including printed or
handwritten letters, electronic text files, emails and instant messages.â Id. at
1252. A technical reading of that warrant might suggest that the search of
correspondence was wide-ranging and not limited to correspondence that related
to child pornography. In context, however, we found that while âthe language of
the warrant may, on first glance, authorize a broad, unchanneled search through
[the] document files, as a whole, its language more naturally instructs officers to
search those files only for evidence related to child pornography.â Id. (emphasis
omitted). The warrant authorizing the search of Ms. Oteroâs computer, however,
has significant structural differences from the warrant in Brooks. In Brooks, the
portion authorizing the text search was not separated by paragraphs and headings
from the portion authorizing the image search; the two portions were contained in
a single paragraph, with no separation, and appeared under the same heading,
namely, âevidence of child pornography.â The structure of the warrant in Brooks
thus suggested that the image and text searches were subject to the same
-11-
limitations, whereas the structure of the warrant in this case, with its clearer
divisions and stark contrasts between the two sections, suggests the opposite.
Differences such as subject headings and paragraph formation might seem
insignificant, but if we are to follow our command of reading each part of the
warrant in context, these structural indicators are useful tools. Affording the
government a practical rather than a technical reading does not require us to
indulge every possible interpretation. Though a reasonable person might be
forgiven for reading the entire warrant as subject to limitations, we believe that
the most practical reading authorizes a wide-ranging search of Ms. Oteroâs
computer. The warrant as it pertained to the computer search was therefore
invalid.
B. The Good Faith Exception
Finding that a warrant is invalid does not automatically require application
of the exclusionary rule, and the motion to suppress should still be denied if the
government can avail itself of United States v. Leonâs good faith exception. 468
U.S. 897 (1984). As the Supreme Court recently reemphasized, the exclusionary
rule is a judicially-fashioned super-compensatory remedy whose focus is not on
restoring the victim to his rightful position but rather on general deterrence. See
Herring v. United States, --- U.S. ----, 129 S. Ct. 695, 699â700 (2009). Because
of this underlying purpose, âevidence should be suppressed âonly if it can be said
that the law enforcement officer had knowledge, or may properly be charged with
-12-
knowledge, that the search was unconstitutional under the Fourth Amendment.ââ
Id. (quoting Illinois v. Krull, 480 U.S. 340, 348â49 (1987)). In this case, the
officers testified that they read the second half of the warrant as limited by the
first, and the district court explicitly credited their testimony. They therefore did
not have subjective âknowledge . . . that the search was unconstitutional.â Id.
Even if an officer lacks subjective knowledge that a warrant is legally
deficient, however, pre-Herring precedent holds that âa warrant may be so
facially deficientâi.e., in failing to particularize the place to be searched or the
things to be seizedâthat the executing officers cannot reasonably presume it to
be valid.â Leon, 468 U.S. at 923; see also Massachusetts v. Sheppard, 468 U.S.
981, 988 (1984) (â[T]he only question is whether there was an objectively
reasonable basis for the officersâ mistaken belief.â). The test is an objective one
that asks âwhether a reasonably well trained officer would have known that the
search was illegal despite the magistrateâs authorization.â Leon, 468 U.S. at 922
n. 23. Not every deficient warrant, however, will be so deficient that an officer
would lack an objectively reasonable basis for relying upon it. âEven if the court
finds the warrant to be facially invalid . . . it âmust also review the text of the
warrant and the circumstances of the search to ascertain whether the agents might
have reasonably presumed it to be valid.ââ Riccardi, 405 F.3d at 863 (quoting
United States v. Leary, 846 F.2d 592, 607 (10th Cir. 1988)). We must âconsider
all of the circumstances,â not only the text of the warrant, and we âassume that
-13-
the executing officers have a reasonable knowledge of what the law prohibits.â
Id. (internal quotations omitted).
In this case, Inspector Herman attempted to craft a warrant that would
authorize a search for evidence of mail and credit card theft that had been hidden
on Ms. Oteroâs computer. While the actual drafting did not accomplish her goals,
one can see how a reasonable officer might have thought that the limitations in
the first portion of Attachment B would be read to also apply to the second
portion. Inspector Herman did not stop at her own understanding of the warrant,
but sought the assistance of the Assistant United States Attorney, who ensured her
that it satisfied the legal requirements. The magistrate judge then added his own
approval. The affidavit that accompanied the warrant limited the computer search
to those federal crimes for which there was probable cause. In enlisting Inspector
Werbickâs help in searching the disks and hard drive, Inspector Herman sent him
not only the warrant but her affidavit, as well as instructions to search for items
related to the theft of mail and credit card-related materials from Ms. Oteroâs mail
route. She also provided him with information pertaining to known victims that
would assist him in this search. Inspector Werbick understood his search as being
limited to evidence of mail and credit card theft along Ms. Oteroâs route, and
accordingly conducted a keyword search geared toward information about the
known victims. Both Inspectors Herman and Werbick therefore had reason to
believe that the warrant was subject to limitations, and they conducted their
-14-
search accordingly. This is not the kind of âflagrant or deliberate violation of
rights,â Herring, 129 S. Ct. at 702 (quoting Henry J. Friendly, The Bill of Rights
as a Code of Criminal Procedure, 53 Cal. L.R. 929, 953 (1965)), that the
exclusionary rule was meant to deter.
This case is quite close to that of United States v. Riccardi, where we
applied the good faith exception to a computer search that uncovered child
pornography, despite the fact that the warrant lacked particularity. 405 F.3d at
863â64. The warrant in that case was even more obviously deficient than in the
present case, with no argument that context prevented the warrant from
authorizing seizure of âall electronic and magnetic media stored [in the
computer].â Id. at 862. We nonetheless found a number of factors that indicated
the good faith of the officers: the attached affidavit limited the search to the crime
for which there was probable cause; the officers executing the warrant were
involved in the investigation throughout, and one of them wrote the affidavit to
support the application; the officer received assurances that the warrant was
legally sufficient; the search methodology was limited to uncovering evidence of
the crimes identified in the affidavit; and the officers seized only evidence
relevant to those crimes. These factors showed that the officers âdid not conduct
a âfishing expeditionâ beyond the scope of the authorized investigation,â making
it an âexample of the more âusualâ case in which the executing officers acted in
good faith.â Id.
-15-
The present case does not precisely mirror the facts of Riccardiâhere, the
officer who wrote the affidavit was not directly involved in the forensic analysis
of the computer, but instead instructed another officer on what to search forâbut
we nonetheless find them substantially similar. The fact that the officer
conducting the computer search had not been involved from the beginning of the
investigation does not alone militate against good faith when that officer
receivedâand, more importantly, followedâsearch instructions that limited the
scope of his search to crimes for which there was probable cause. Moreover, one
of the more important facts that the two share in common is the officersâ attempts
to satisfy all legal requirements by consulting a lawyer. See id. at 864. (âBy
consulting the prosecutor, they showed their good faith in compliance with
constitutional requirements.â). Indeed, a frequent criticism of the good faith
exception is that it encourages officers not to make these consultations and ârisk
that some conscientious prosecutor . . . will say the application is insufficient
when, if some magistrate can be induced to issue a warrant on the basis of it, the
affidavit is thereafter virtually immune from challenge[.]â W AYNE R. L E F AVE , 1
S EARCH AND S EIZURE 68 (4th ed.). The fact that Inspector Herman, like the
officer in Riccardi, made this step is an important indicator of her good faith. If
more officers took such precautions we would have greater rather than less
protection of Fourth Amendment rights.
-16-
The district court questioned whether Inspector Werbickâs search
methodology was in fact limited in scope to items for which there was probable
cause. Dist. Op. 21. Specifically, it noted that the search did not include a date
restriction and also generated false hits, which required him to view non-relevant
information. The search methodology, however, does not seem to have been
motivated by any belief that the warrant gave Inspector Werbick free rein over
Ms. Oteroâs computer, but by the fact that â[g]iven the numerous ways
information is stored on a computer, openly and surreptitiously, a search can be as
much an art as a science.â Brooks, 427 F.3d at 1252. A date restriction, for
instance, would have been impossible to apply in the search of the unallocated
space where the two pertinent documents were found, and even in other portions
of the hard drive and disks we do not know how effective the restrictor would
have been. This search was reasonably constructed to limit the amount of
irrelevant data while still effectively uncovering relevant evidence. The fact that
some irrelevant information was viewed resulted more from the ease of
electronically storing (and hiding) vast amounts of invisible information than any
overreaching on the part of the officers.
The inspectors in this case had reason to believe the warrant was valid,
considered themselves authorized to search only for evidence of crimes for which
they had probable cause, and conducted their search accordingly. We therefore
-17-
hold that the good faith exception should apply and the evidence should not be
excluded.
III. Conclusion
Though we agree with the district court that the warrant authorizing the
search of Ms. Oteroâs computer lacked particularity, because we find that the
good faith exception applies, we REVERSE the district courtâs order to suppress
and REMAND for further proceedings consistent with this opinion.
-18-
No. 08-2154, United States v. Loretta Otero
BALDOCK, J., concurring in part and concurring in the judgment.
In my view, the slender criticisms lodged against the warrantâs particularity
pale in comparison to the good faith of the officers involved in this case.
Accordingly, I would not reach the validity of the search warrant and do not join
Part II.A of the Courtâs opinion. See United States v. Leon, 468 U.S. 897, 925
(1984) (recognizing that reviewing courts possess the discretion to immediately
turn to âa consideration of the officersâ good faithâ). I gladly concur in Part II.B
of the Courtâs opinion, excepting the language which references the invalidity of
the warrant, and in the Courtâs judgment reversing the district courtâs suppression
order.
-19-