Valikko
Etusivu Tilaa päivän jae Raamattu Raamatun haku Huomisen uutiset Opetukset Ensyklopedia Kirjat Veroparatiisit Epstein Files YouTube Visio Suomi Ohje

Tämä on FBI:n tutkinta-asiakirja Epstein Files -aineistosta (FBI VOL00009). Teksti on purettu koneellisesti alkuperäisestä PDF-tiedostosta. Hae lisää asiakirjoja →

FBI VOL00009

EFTA00227381

2265 sivua
Sivut 941–960 / 2265
Sivu 941 / 2265
US. Department of Justice 
WaAington.. D.C. 20530 
Request for Financial Information (Authorization, 
Purchase Order, Receiving Report) 
T
 lora dal only be times alma .-.,.-
ns facet' nen of imetirdieb awl partnalibips of Ave or feta iodividials. 
I Purchase Order NumberiDCNII: 
11011.1961 
2 Date Order Prepared: 
08/02/2006 
3 Case Number (Optronab 
FGJ 05.02(WPB) NO.051-02 (01.31-02) 
Section A - Authorization and Purchase Order 
4 Names and Address of Financial Institution: Attn.: Custodian of Records 
5 Deliver To: Special Agent 
.deral Bureau of Investigation, 505 South Hagler Drive, 
Suite 500, Florida 33401, T 
6 Horurn I /ale 
08/1 8/2006 
7 Ranarks: 
FOR REIMBURSEMENT PLEASE RETURN THIS FORM THE RECORD OF 
SERVICES, AND A COPY OF THE SUBPOENA. 
8 Name of Re uesto
r Print 
10 Date of request: 
08/02/2006 
Section B - Financial Institution Invoice 
No Payment Shall 1k %lade Unless I.spanks Ate Itemized Below Or On Your torn To lic Arachct: 
II Service/Financial Records Provided: 
Quantity 
t n ; Pricc 
Amount 
Cott 
l'er 
Please note that reimbursement cannot be made for the records pertaining to 
corporations or large partnerships of six or more. 
IMPORTANT: The DCIA Mandates the use of EFT/DD. In order to receive 
payment complete the attached EFT enrollment Form. 
0.25 
Copy 
11.00 
Hour Clerical 
Tech 
17.00 
Hour Manager 
or Supervisor 
p9 aa4 pncecd with eitaitolinet If cost will faced 5300 without prior approval of 
Assistant US. Attorney/Badge Officer. 
PLEASE REFERENCE THE ABOVE DCVO ON YOUR INVOICE FOR PAYMENT. 
12a Signature of Financial Institution Official: 
12b Phone of Mnancial Institution Official: 
13 DateSigned: 
Total Amount Claimed 
By Financial Institution 
Section C - Receiving Report 
I6 Disallowance 
(See Attacked) 
14 I certify that the anicics and sconces listad were recc‘Cd 
18 Right 
(12 
to I-manual PM acy Act - Public LTV 95430 
U.S.C. 3401.3422) Request Pursuant To: (Check One Chu') 
OBJECT 
SECTION 
CLASS 
O 14°4 
Customer Authorization 
2540 
O 3405 
Administrative Subpoena or Summons 
2541 
o 
3406 
Seamh Warrant 
2540 
O 3407 
Judicial Subpoena 
2540 
Ei 3408 
Ramat Writtai Request 
2540 
O 3413 
I 
Grand Jury Subpoma 
2545 
O 3414 
Special Procedures 
2540 
19 Signature of Approval OfGaai 
-ie-oceeeenta,fielmorg+,Nee-----
ry 
PROJ 
21 Schedule and Voucher Number 
Dal 
2.2 tomuits 
I5 Dale Recast:2J 
17 Net to 
Financial 
Institution 
O Funds Available 
Date I 
FoniiOBD21 I 
APR Sa 
P-00043Q1c0
Budget Officer 
I 
I
 wit clormicuranY produced by Elie Fetal Form Inc. 
Case No. 08-80736-CV-MARRA 
EFTA00228321
Sivu 942 / 2265
GENERAL 
This is a multi-purpose form designed to save as an Authonzatimi. Purchase Order, Itemized Invoice. receiving Report and Payment voucher in 
conjunction with -requests for financial information,- pursuant to the Right to Financial Privacy Act of 1978. P.L. 95-630. Title XL, 12 Li S C 3415.
NOTE: 
Payments under this purchase or der will be due on the 3O calendar day after the (late of actual receipt of a proper invoice in the office designated to 
receive the ins oice. 
The Prompt Payment Act, Public Law 97-177,96 Stat. 85 (31 U.S.C. 180), Is applicable to payments under this purchase order and requires the payment 
to contractors of interest or overdue payments and improperly taken discounts. Determination of interest due will be made in accordance with the 
provision of the Prompt Pas ment Act and the Office of Management and Budge Circular A-125. 
PREPARATION INSTRUCTIONS 
ITEM I - A Purchase Order Nurrber will be preprinted on each form. This number will be used for reference purposes on any correspondence relating to this 
specific request for financial information. 
ITEM 2 • Self explanatory. 
ITEM 3 - This block may be used to identify the specific case for which the financial information is requited. This block may be left blank. 
SECTION A - AUTHORIZATION AND PURCHASE ORDER (To be completed by the requesting official). 
ITEM 4 - Enter the name and mulling address of the tin:axial insutution being requested to furnish financial information. 
ITEM 5 - Enter the and address to which the financial information is to be sent by the financial institution. This will normally he the name and the address of the 
requesting official. 
ITEM 6 - Enter the date the financial information is required. 
ITEM 7 - Include, if appropriate any pertinent information related to the purchase order not provided for elsewhere on the form 
ITEM 8, 9 and 10 - Self-explanatory. 
SECTION B - FINANCIAL INSTITUTION INVOICE (To be completed by the financial institution). 
REM II - Self-explanatory. Completion of dus block constitutes= itemized bill or lissome for reimbursement for the costs incurred in providing the information 
requested. The DCIA Mandates the use of EFT/DD. in order to receive payment complete the attached EFT enrollment Form. 
ITEM 12 and 13 - Self-explanatory. 
SECTION C - RECEIVING REPORT (To be completed by the requesting official. when the requested financial information has been delisered). 
ITEM 14 and 15 - Self-explanatory. 
ITEM 16 - This block should be used to reflect any differences between the amount claimed by the financial institution and the correct amount to be reimbursed. 
Differences may result formcomputation errors. or failure of the financial institution to deliver information requested. 
ITEM 17 - Enter the mount cernfied to be proper for payment. 
ITEM 18 - Check the box which identifies the appropnate procedure authorized by the Act, which necessitates the request for financial information. 
ITEM 19 and 20 • These blocks must be signed and dated by an official of the organization whose funds will be charged. His or her signature constitutes a 
statement that the records to which the invoice refers were required for official business and were provided by the financial institution in accordance with the 
ordering instrunent. 
ITEM 21 - The Schedule and Voucher Number will be entered by the office which actually schedules the approved amount for payment by the Treasury 
Department. 
ITEM 22 • Enter, if appropriate. any data not provided for elsewhere on the reiriving report. such as. reasons for any claim amounts disallowed. 
FOR24 ODD 211 
APR 44
Pop 2 of 3 
Case No. 08-80736-CV-MARRA 
P-000942 
EFTA00228322
Sivu 943 / 2265
VENDOR ELECTRONIC FUNDS TRANSFER (EFT) 
ENROLLMENT FORM 
I 
Please comply to this information if you have not done so already 
PAYEE/COMPANY INFORMATION: 
Vendor Company Name: 
Address: 1 
Taxpayer ID Number 
Contact Person Name 
Telephone Number 
Ernai Address (If you would 
like b be notified via e-mail) 
FINANCIAL INSTITUTION INFORMATION: 
Bank Name 
i 
Bank Address 
Bank Phone Number 
Nine Digit ABA Routing Transit Number 
Type of Account (Checking or Saving) 
Depositor Account Number 
Signature of Vendor's 
Authorizing Official 
Name & Title of Authorizing 
Official 
Please Return or Fax to: 
U.S. Attorney's Office 
Southern District of Florida 
99 NE 4 street, Suite 200 
Miami, FL. 33132 
Attention: 
Fax Number 
The Debt Collection Improvement Act of 1996 requires that payments made by the Federal government, including vendor 
payments, must be made by electronic funds transfer (EFT). A benefit of receiving payments by EFT is that your funds 
are directly deposited to your account at a financial institution and are available to you on the date of payment. 
If you have questions regarding the delivery of the remittance information, please contact the financial institution where 
your account is held. 
If you have any questions on the completion of this form, please contac 
FORM OBD-211 
MIL U 
Page 3 of 3 
Case No. 08-80736-CV-MARRA 
P-000943 
EFTA00228323
Sivu 944 / 2265
Case No. 08-80736-CV-MARRA 
0003 
P490614411 
EFTA00228324
Sivu 945 / 2265
Case No. 08-80736-CV-MARRA 
P-090*Itil 
EFTA00228325
Sivu 946 / 2265
ON 
ON
0 
9 
C.  
Rem “6/512iti/-00000! Fort WHUCK VAX &'UWCIVER 
PROV1 OT 
100582 8175241700 
WWNORIA, HUCKABY JR 
SKI' Id: 
thist dox: 
Ref 1. 
Ref 
Actual. U 
Target. 
inat 
SSF01220565-00006 IF NRM D NEXT 
446144592 
PROV1 
WAS 
2sH8819250201 
380 S. 
AR NGT 
-AR-01-1-20-0018-L-08-13 
SA
200RAHK
03LZELLEN
-I13:19/46/h
08/30/2006 6.20 AM CDT 
TEMP FILE 
DUP 
DAY 
08/31/2006 
5$00pM CDT DQ 
66758887-000007 
For. WHUCK 
N MUTUAL 
0100394177 
LLINS 
TX 76014 
100 
2 
446144592 
AR 
SSF01220565-00006 Return To IRON MOUNTAIN 
Personal Invitation 
I want my Visa Gold card quickly! 
I have read and agree to the Terms and 
Conditions on the reverse side of the letter. 
Social Security Number 
VISA GOLD 
Up to $3,000 credit 
No Savings Deposit 
YerlykaameioldIncom 
Do you haves ette
afr.-
1
nYei Bane S 
UN° 
Would you like your card sent by Express Mail after processing? El Yes I N° 
A 
I be billed to your first sta 
nt 
C981-5922-5428-9CS-P3981SN-DOIF 
VISA 
1 1 Place sticker here NOV: 
alUli 
Fill out and moil this invitation 
or call 1-800-665-7232 
Offer expires: November 23, 2001) 
Please cared i common below tt necessary. 
Customer 
Os 981-5922-5428-9-F100 
Product S. 3981514
-CE 
von 
Case No. 08-80736-CV-MARRA 
Sig 
old) 
EFTA00228326
Sivu 947 / 2265
Case No. 08-80736-CV-MARRA 
PANNE 
I 
EFTA00228327
Sivu 948 / 2265
Case No. 08-80736-CV-MARRA 
P-000948 
EFTA00228328
Sivu 949 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
Issue 1: The quantum of seizure of electronic evidence 
We have been asked to address a basic question in computer forensic examination 
regarding the quantum of seizure of electronic evidence: if information within a computer 
file falls within the scope of the warrant, are agents justified in seizing the entire disk, or 
only the file, or may they seize some intermediate quantum of data, such as the smallest 
folder containing the file? The resolution of this question is relatively straightforward 
when the computer is contraband or an instrumentality: seizure of the entire computer is 
then permissible. However, when the computer serves as a storage container for 
evidence, most courts have treated the file as the basic quantum of seizure. Despite this 
distinction, most courts will allow the blanket seizure of entire computer storage media 
(hard drive, removable disk, server) for subsequent forensic examination to determine 
which data on the media that is subject to the warrant. 
While there are limits to analogizing computer searches to physical searches, and 
applying the law of physical searches to computer searches, we believe that if the warrant 
describes with particularity what information is being sought, the government has wide 
discretion in the use of computer forensics tools to search for evidence of a crime on 
electronic media, so long as the process is reasonable. So long as the process is. 
reasonable and the warrant language does not preclude it, such a search may commonly 
include conducting a full physical and logical review of all seized media for evidence of a 
crime described in the warrant. Such a review will involve not only "files" which are 
located on the computer, but logs, directories, file fragments, and other data that will 
allow the examiner to find hidden data, reconstruct deleted files, and identify other files 
which are "linked" to files found in the examination. Furthermore, pursuant to a properly 
worded warrant, forensic examiners should be allowed to review log records and meta 
data in order to determine ownership and control of the data on the computer, including 
who was sitting at the keyboard at the time the files were created, accessed, modified, 
transmitted or printed. We believe that this process, which is accomplished by a 
combination of automated review by forensic software and manual review by the forensic 
examiner, is consistent with the "brief perusal" of files in a file cabinet in a physical 
search. 
A. General considerations 
As an initial matter, it is worth noting that the propriety of removing an entire 
computer for off-site search is not in question. Courts have long accepted that large 
quantities of paper documents may be carried off-site for subsequent search. See United 
States'. Santarelli 778 F.2d 609 (11th Cir. 1985) (holding that agents acted reasonably 
when they removed documents for examination at another location where search of all 
documents for evidence falling within scope of warrant would have taken days)• United 
States,. Hargus, 128 F.3d 1358, 1363 (10th Cir.1997) (upholding seizure of an entire file 
cabinet when such seizure was motivated by the impracticability of on-site sorting). 
Courts have applied this same rule to computers. See. e.a., United States'. Hill No. 05-
50219, 2006 WL 2328721 (9th Cir. Aug. 11, 2006) (blanket seizure of all computer 
Case No. 08-80736-CV-MARRA 
P-000949 
EFTA00228329
Sivu 950 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
media for offsite forensic analysis is appropriate when grounds for off-site analysis are 
set forth in the warrant). 
The fact that computers may be carried off-site for search does not obviate the 
need for the subsequent search, nor does it imply that the entire disk (or other storage 
medium) is the appropriate quantum for the subsequent seizure. In fact, the opposite is 
true — cases approving off-site search have implicitly or explicitly required that the off-
site search be directed towards finding particular files which fall within the scope of the 
warrant. For example, the Sixth Circuit in Guest'. Leis, 255 F.3d 325 (6th Cir. 2001), 
held: 
In the instant cases, when the seizures occurred, [investigators] were 
unable to separate relevant files from unrelated files, so they took the 
computers to be able to sort out the documents off-site. Because of the 
technical difficulties of conducting a computer search in a suspect's home, 
the seizure of the computers, including their content, was reasonable in 
these cases to allow police to locate the offending files. 
a at 335 (emphasis added). Thus, the court in Guest understood that the ultimate focus 
of the search is "the offending files," not disks containing some offending files. It should 
be noted that in computer forensics the term "file" has a broad scope and includes but is 
not limited to data files, log files, program files, text files, and directory files. 
A similar focus on files as the uantum of seizure can be found in a wide range of 
cases. For example in United States I. Gray 78 F. Supp. 2d 524, 529 (ED. Va. 1999), 
the court held that investigators were "entitled to examine all of the defendant's files to 
determine whether they contained items that fell within the scope of the warrant." The 
court's analysis presupposes that the file is the appropriate quantum of search. This 
conclusion is bolstered by the court's use of the plain view doctrine (rather than the 
notion that an entire disk was the appropriate quantum of seizure) in approving the 
seizure of files containing evidence of crime that fell outside the scope of the warrant. 
In two cases in which child porn was found pursuant to a warrant to search for 
drug records, the Tenth Circuit has al
 held that individual files are the appropriate 
quantum of seizure. In United States I. Carey, 172 F.3d 1268, 1273-75 (10th Cir. 1999), 
the court ruled that an agent exceeded the scope of a warrant to search for evidence of 
drug sales when he "abandoned that search" and instead searched for evidence of child 
pornography. The court mandated a file-based approach to computer searches: 
Where officers come across relevant documents so intermingled with 
irrelevant documents that they cannot feasibly be sorted at the site, the 
officers may seal or hold the documents pending approval by a magistrate 
of the conditions and limitations on a further search through the 
documents. The magistrate should then require officers to specify in a 
warrant which tvve of files are sought. 
2 
Case No. 08-80736-CV-MARRA 
P-000950 
EFTA00228330
Sivu 951 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
a at 1275 (internal citations omitted and emphasis added). The file-based approach was 
confirmed in United States I. Walser 275 F.3d 981, 986 (10th Cir. 2001), in which the 
court explained: 
The underlying premise in Carey is that officers conducting searches (and 
the magistrates issuing warrants for those searches) cannot simply conduct 
a sweeping, comprehensive search of a computer's hard drive. Because 
computers can hold so much information touching on many different areas 
of a person's life, there is a greater potential for the "intermingling" of 
documents and a consequent invasion of privacy when police execute a 
search for evidence on a computer. 
The court concluded that officers must "conduct the search in a way that avoids searching 
files of types not identified in the warrant." IL Based on Carey and Walser, it is quite 
clear that the Tenth Circuit considers a file to be the appropriate quantum of seizure in 
search warrants for records.' 
This file-based approach is also being emphasized by some magistrates. See In re 
Search of 3817 W. West End, 321 F. Supp.2d 953, 958 (N.D. Iii. 2004) (noting "the 
substantial likelihood that the computer contains an 'intermingling' of documents 
evidencing the alleged tax fraud, with documents that the government has no probable 
cause to seize"). For example, one magistrate recently began to require returns to list 
specific computer files seized pursuant to the warrant. In our opinion, this is both unwise 
and impractical when a potential seizure could involve hundreds of thousands of files. 
It might be objected that a file-based approach to computer seizure conflicts with 
the rules for seizure of ledgers. When a ledger contains some information that falls 
within a scope of the warrant, law enforcement may seize the entire ledger, rather than 
individual responsive pages. Sm United States 
Beusch 596 F.2d 871, 876-77 (9th 
Cir.1979). The best authority for this argument comes from outside of the search warrant 
context, where there are cases suggesting that a folder or entire disk should be treated as a 
single container for Fourth Amendment purposes. In United States'. Runyan, 275 F.3d 
449, 464-65 (5th Cir. 2001), in which private parties had searched certain files and found 
child pornography, the Fifth Circuit held that the police did not exceed the scope of the 
private search when they examined additional files on any disk that had been, in part, 
privately searched. Analogizing a disk to a closed container, the court explained that 
"police do not exceed the private search when they examine more items within a closed 
container than did the private searchers." Id. at 464. In a subsequent case, the Fifth 
Circuit held that when a warrantless search of a portion of a computer and zip disk had 
It should be noted that neither Carey nor Walser involved a true forensic examination of the computer. In 
both cases, the investigator looked at files on the computer, using the software on the computer that was 
normally used to examine the files. Neither case involved a true forensic examination which involves a 
complete physical and logical examination of the entire hard drive. This examination is accomplished by 
both automated (computer software) and manual means. 
3 
Case No. 08-80736-CV-MARRA 
P-000951 
EFTA00228331
Sivu 952 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
been justified under O'Connor'. Ortega, the defendant no longer retained any reasonable 
expectation of privacy in the remaining contents of the computer and disk, and thus a 
comprehensive search by law enLorcement personnel did not violate the Fourth 
Amendment. See United States I. Slanina, 283 F.3d 670, 680 (5th Cir.), vacated on other 
grounik, 537 U.S. 802 (2002), affd, 359 F.3d 356, 358 (5th Cir. 2004); see also New 
York I. Emerson 766 N.Y.S.2d 482, 488 (N.Y. Sup. Ct. 2003) (adopting intermediate 
position of treating folders rather than individual files as closed containers). 
Thus far, no other federal courts have adopted the Fifth Circuit's approach. In 
addition, it is not clear that the "container size" for purposes of determining the scope of 
a reasonable expectation of privacy is equivalent to the quantum of seizure in search 
warrant cases. Given the central importance of the particularity clause in evaluating the 
constitutionality of warrant based searches, it seems unlikely that courts would tend to 
adopt the approach of Runyan and Slanina in search warrant cases and there is a 
significant litigation risk in relying on these cases alone. 
J3. Applying the file-based rule to unallocated space. directories, and linked data 
The unallocated space of a computer, which can contain deleted and hidden files 
relevant to the warrant, can be reviewed, assuming it is reasonable under the 
circumstances and assuming that the warrant does not restrict the search. If the forensic 
process identifies fragments of non-logical-file material on the media and renders them 
into intelligible data which can now be examined, then this forensic process should be 
treated as a "brief perusal." This would include identifying the data on the computer and 
using automated and manual processes to reconstruct the data so that it can be read and 
understood. 
Under a file-based approach, the basic question that must be answered for each 
file during forensic analysis is whether the file falls within the scope of the warrant, as a 
file is subject to seizure if and only if it falls within the scope of some provision in the 
warrant. Pursuant to this principle, it should generally be permissible (pursuant to a well-
drafted warrant) to seize, examine, or reconstruct the directory tree and File Allocation 
Table of a computer in order to identify and reconstruct other seizable files that are stored 
on the computer. For example, assuming a typical search warrant authorizes seizure of 
records related to a particular crime, law enforcement can characterize a directory tree as 
a file containing information about whether such files exist and where they are stored on 
the computer, thereby making it subject to search and seizure under the warrant. 
This principle applies to any other file that is linked in some manner to other 
information falling within the scope of the warrant: in such cases, the agent or forensic 
analyst must be allowed to examine the linked file in order to determine whether the 
linked file falls within some provision of the warrant. For example, if an e-mail with an 
attachment is within the scope of the warrant, the attachment can also be reviewed. 
Following a brief perusal of the linked file, it can be seized if it is subject to the warrant. 
4 
Case No. 08-80736-CV-MARRA 
P-000952 
EFTA00228332
Sivu 953 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
C. Files demonstrating ownership and control of the computer or files on the computer 
In general, a properly worded warrant should authorize a complete search of the 
computer to identify not only relevant files on the computer that are evidence of a crime, 
but any other evidence, such as meta data and print spool information, that might 
establish the identity of the person at the keyboard at the time the files subject to seizure 
were created, opened or modified. Since computers can be located in common areas or 
be otherwise subject to joint or remote access, it is often important to determine who 
created or used the files that are subject to the warrant. Forensically, this may involve a 
thorough examination of numerous programs and logs on the computer to determine who 
was at the keyboard. For example in a child pornography case, where possession of a file 
is an essential element of the crime, a forensic examination of Internet access logs on the 
computer may assist in determining which of multiple users was logged on to the Internet 
at the time the child pornography image was downloaded or viewed on the computer. 
Establishing who hit the "Enter" key is therefore within the quantum of information to be 
searched and seized, and should be set forth in the warrant. 
Evidence of ownership and control of a computer or data may not be easily 
recognizable or quickly found. Courts are increasingly recognizing that computer data 
relevant to a warrant calbe easily hidden, and may require an in depth forensic review. 
See, e.g., United States. Adjani, 452 F. 3d 1140 (9th Cir. 2006) (computer files are easy 
to disguise or misname). Furthermore, courts are increasingly recognizing that computer 
forensics is as much art as science. See United States'. Brooks, 427 F.3d 1246 (10th 
Cir. 2005) Thus, warrant applications for computer data seeking ownership and control 
evidence should be drafted in a manner that includes such information within the scope of 
the warrant. 
We have also been asked whether "ownership and control" provisions in 
computer search warrants should be phrased in "if/then" form. For example, a warrant 
could provide that if child pornography is found on the computer, then agents will also 
seize ownership and control information found on the computer. Such "if/then" language 
is unnecessary, as it is not used in non-computer search warrant "ownership and control" 
provisions. In addition, it would be unwise to suggest to magistrates that computer 
search warrants can be based on if/then or other conditions. Such provisions could 
suggest to the magistrates additional mechanisms for micromanaging the execution of 
search warrants. 
In the non-computer context, search warrants often seek items demonstrating 
ownership and control of relevant physical items or locations. For example, one of the 
categories of information sought in Walser was "records that show or tend to show 
ownership or control of the premises and other property used to facilitate the distribution 
and delivery [of) controlled substances." Walser, 275 F.3d at 984. Courts generally have 
approved seizure of such items, particularly in cases whe questions of ownership and 
control are likely to be disputed. See. e.g., United States I. Horn 187 F.3d 781, 787-88 
(8th Cir. 1999) (approving in child porn case a warrant provision authorizing seizure of 
"[r)ecords, documents, receipts, keys, or other objects showing access to, and control of, 
5 
Case No. 08-80736-CV-MARRA 
P-000953 
EFTA00228333
Sivu 954 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
the residence"). United States'. Whitten, 706 F.2d 1000, 1008-09 (9th Cir. 1983) 
(approving in drug case warrant for "telephone books, diaries, photographs, utility bills, 
telephone bills, and any otker papers indicating the ownership or occupancy of said 
residence"); United States I. Reed, 726 F.2d 339, 342 (7th Cir. 1984) (approving warrant 
provision in drug case for "proof of residency"). 
D. Examination of all files in disk in search under warrant 
Even though there is consensus that the file is the basic quantum of seizure, the 
basic rules of search warrant suggest that it should be reasonable to examine each file in a 
computer to see if it falls within the scope of the warrant. Most, but not all, courts have 
adopted this approach. 
In general, "[a] container that may conceal the object of a search authorized by a 
warrant may be opened immediately; the individual's interest in privacy must give way to 
the magistrate's official determination of probable cause." United States,. Ross. 456 
U.S. 798, 823 (1982). In most circumstances, evidence that falls within the scope of a 
warrant to search a computer may be stored in any file on the computer, including hidden 
and deleted files. Moreover, to determine whether a computer file contains evidence that 
falls within the scoge of a warrant, there is no substitute for taking a look at the file. See, 
e.g. United States I. Upham, 168 F.3d 532, 536 (1st Cir. 1999). Thus, it should be 
generally permissible to look at all files on a computer to determine whether each falls 
within the scope of a warrant. 
Examination of all files stored on a computer was approved by the court in 
United States'. Gray 78 F. Supp.2d 524 (E.D. Va. 1999). The court noted that 
"documents, unlike illegal drugs or other contraband, may not appear incriminating on 
their face. As a result, in any search for records or documents, innocuous records must 
be examined to determine whether they fall into the category of those papers covered by 
the search warrant." Id. at 528 (citation and internal quotations omitted). The court in 
Gray further explained that "agents authorized by warrant to search a home or office for 
documents containing certain specific information are entitled to examine all files located 
at the site to look for the specified information." a This principle applied to computers 
as well, such that law enforcement "was entitled to examine all of defendant's [computer] 
files to determine whether they contained items that fell within the scope of the warrant." 
a at 529. In doing so, law enforcement was entitled to seize evidence of additional 
criminal activity under the plain view doctrine. Id. at 528. 
Prior to the commencement of a search of a computer, agents cannot know with 
certainty that computer files are accurately labeled, and the Fourth Amendment does not 
prohibit agents from looking anywhere that may reasonably contain information that falls 
within the scope of the warrant. As long as the warrant describes with particularity what 
evidence is being sought, a complete forensic examination of the computer should be 
authorized to find this evidence through whatever forensic methods are required. Since a 
properly conducted forensic examination will frequently entail a cursory physical and 
logical review of all otherwise unidentified data on the computer for evidence of the 
6 
Case No. 08-80736-CV-MARRA 
P-000954 
EFTA00228334
Sivu 955 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
crime set forth in the warrant, nothing in the warrant should restrict such a scor of 
review. Furthermore, as recently noted by the Ninth Circuit in United States 
Hill, No. 
05-50219, 2006 WI. 2328721 (9th Cir. Aug. 11, 2006), if properly justified in the 
warrant, computer media may be seized in bulk for subsequent, thorough off-site forensic 
analysis. 
However, this review is not unlimited. In a case that predates widespread 
personal computers and Internet usage, the Supreme Court said that a search of "a 
person's papers" poses "[s]imilar dangers" to "executing a warrant for the 'seizure' of 
telephone conversations," because both searches involve the initial examination, "at least 
cursorily," of evidence in order to determine whether the warrant authorizes its seizure. 
The Court warned that "[i)n both kinds of searches, responsible officials, including 
judicial officials, must take care to assure that they are conducted in a manner that 
minimizes unwarranted intrusions upon privacy." Andresen I. Maryland, 427 U.S. 463, 
482 n.11 (1976). Courts have therefore sought to limit the intensity of agents' review of 
potentially nonresponsive documents. Courts impose this limit partly by limiting the 
amount of time for the review. The leading case is United States'. Heldt, which allows 
only a "brief perusal" of each document, and requires that "the perusal must cease at the 
point of which the warrant's inapplicability to each document is clear." United States'. 
iFlth, 668 F.2d 1238, 1267 (D.C. Cir. 1982); see also United States I. Rude 88 F.3d 
1538, 1552 (9th Cir. 1996). United States I. Slocum, 708 F.2d 587, 604 (11th Cir. 1983); 
United States,. Ochs, 595 F.2d 1247, 1258 (2d. Cir. 1979) ("some perusal, generally 
fairly brief"). If a document falls outside the warrant but nonetheless is incriminating, 
Heldt allows that document's "seizure" only if during that brief perusal the document's 
"otherwise incriminating character becomes obvious." 668 F.2d at 1267. 
Heldt and Andresen do not address computers, and their guidance of "brief 
perusal" and "minimization of invasions of privacy" to a complete physical and logical 
forensic examination of a computer may not always fit. Because part of the computer 
forensic review process is automated, we believe that a largely automated but thorough 
forensic examination of a computer that contains hundreds of thousands if not millions of 
files meets this requirement if the warrant describes with particularity the evidence that is 
being sought, and the search is confined to the evidence set forth in the warrant. 
Nevertheless, in light of Carey, a prudent approach by law enforcement is to proceed with 
a review of all files in a computer, but stop and seek a second warrant when evidence of 
another unrelated crime is discovered, and an additional search for evidence of this crime 
is now envisioned. 
E. Forfeiture. Instrumentalities, and Contraband 
We have also been asked to address whether the quantum of seizure of electronic 
evidence, or the scope of search of such evidence, would be affected by a number of 
factors: the legal forfeiture of the media to the government; the seizure of the media as 
an instrumentality of a crime; or the media's status as contraband. In general, the 
government's authority to search electronic media is significantly expanded when its 
original owner has lost any reasonable expectation of privacy because title has shifted to 
7 
Case No. 08-80736-CV-MARRA 
P-000955 
EFTA00228335
Sivu 956 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
the government through forfeiture, or because the former owner has no reasonable 
expectation of privacy in electronic media that is contraband. 
If computer equipment has been forfeited and is in the possession of law 
enforcement, the Fourth Amendment does not prohibit law enforcement from searching 
data contained in that equipment without a warrant. In automobile forfeiture cases, 
courts have held that "where police have probable cause to believe a car is subject to 
forfeiture, or have validly seized aar for forfeiture, the police may search the car 
without a warrant." United States I. Pace, 898 F d 1218, 1245 (7th Cir. 1990) (citing 
numerous cases). For example, in United States'. Zaicek, 519 F.2d 412 (2d Cir. 1975), a 
defendant's car was seized by state police pursuant to a forfeiture statute that allowed 
seizure "when there is good reason to believe that [the car] has been stolen." Id. at 414. 
After seizure, police searched the car and found evidence of an unrelated crime—the theft 
of mail—located in an attaché case in the car's locked trunk. The Second Circuit reversed 
the district court's suppression of the evidence, holding that "once the police have 
properly seized a car pursuant to a statute because they have reasonable grounds for 
believing it has been s len, they have the authority to search the car without a warrant." 
See also United States 
Gaskin 364 F.3d 438, 458 (2d Cir. 2004) (reaffirming Zaicek).
Nothing in these cases limits their application to seized automobiles. Indeed, in 
Zaicek the Court let stand the district court's finding that neither the inventory search nor 
the search-incident-to-arrest exceptions applied, 519 F.2d at 413, and in Gaskin the court 
explicitly held that the "forfeiture exception" independently justified the search (in 
addition to the automobile exception), 364 F.3d at 458. Consequently, when a forfeiture 
statute gives law enforcement a possessory interest in computer equipment that is greater 
than the defendant's interest and the computer is seized and in law enforcement 
possession, we believe the Fourth Amendment does not require a warrant to search data 
stored in the computer equipment for any reason. 
Despite this supportive case law, dicta in one Ten Circuit decision involving a 
computer forfeiture contradicts this conclusion. In Davis I. Gracev, Ill F.3d 1472 (10th 
Cir. 1997), law enforcement seized, pursuant to a warrant, computer equipment being 
used to operate a bulletin board system that disseminated obscene material. Id. at 1479. 
Law enforcement also obtained civil forfeiture of the equipment a at 1476. The seized 
and forfeited equipment incidentally contained e-mail and material that plaintiffs claimed 
was protected by the Privacy Protection Act. The Tenth Circuit affirmed a grant of 
summary judgment to defendants in a subsequent lawsuit arising from the search, 
because "the computer equipment was more than merely a 'container' for the files; it was 
an instrumentality of the crime." Id. at 1480. The Davis court concluded that it could 
"find no legal or practical basis for requiring officers to avoid seizing a computer's 
contents in order to preserve the legality of the seizure of the computer hardware;" thus, 
"[t]he seizure of a container is not invalidated by the probability that some part of its 
'innocent' contents will be temporarily detained without independent probable cause." 
Id. 1480-81. 
8 
Case No. 08-80736-CV-MARRA 
P-000956 
EFTA00228336
Sivu 957 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
However, going beyond the facts before it, the court in Davis did not give law 
enforcement a green light to search all files stored on a computer seized as an 
instrumentality. The court cautioned that "our conclusion that the seizure of the 
computer equipment pursuant to a warrant here allowed the incidental seizure of files 
stored therein should not be read as approval of any subsequent efforts by the police to 
search or retain the stored files without a warrant" Id. at 1481. This cautionary warning 
is odd: it implies that law enforcement can be justified in seizing an entire computer as an 
instrumentality, and can obtain title to the equipment through a civil forfeiture 
proceeding, but that the forfeited computers' original owner would still retain some 
reasonable expectation of privacy in the computer's contents. Davis did not have to 
address this issue, as there was no evidence in Davis that the files on the computer had 
been examined by law enforcement 
2 id. at 1481 n.6. Nevertheless, it suggests that 
there may be some litigation risk in relying solely on computer forfeiture to justify a full 
review of information stored on the computer. 
F. Law enforcement data-mining of previously seized and imaged data. 
As set forth in more detail below in Issue 2. B., the dissipation of probable cause 
also poses constitutional obstacles to using seized data as part of a data-mining system for 
review after the criminal investigation involving the seized data is complete. (We use the 
term "data-mining" generally to refer to computerized searches through multiple 
collections of data to extract implicit, previously unknown information or patterns). 
Although there may no longer be a reasonable expectation of privacy in particular files 
that were determined to fall within the scope of the initial search, the same cannot be said 
for entire seized hard drives. To data-mine a large set of seized data, agents must have a 
warrant supported by probable cause (or an exception to the warrant requirement) that 
covers all of the data that is to be mined. A warrant that authorizes searching a drive for 
specified information does not support copying the entire image into a database for 
unrestricted future use. Moreover, data mining is never appropriate if there is no longer 
probable cause to believe a particular drive contains contraband or evidence of a crime. 
Issue 2: Time limits on forensic review of computers 
We have been asked to address whether the Fourth Amendment or Rule 41 of the 
Federal Rules of Criminal Procedure places any limit on the time frame in which a 
forensic analysis of a seized computer must be completed. In general, we believe that 
neither the Fourth Amendment nor Rule 41 places any specific time limit upon the 
completion of forensic analysis, as long as that analysis has been completed in a 
"reasonable" time frame. 
Generally, magistrate-imposed time limits or methodologies for forensic analysis 
are unsupported by law and should be opposed. 
9 
Case No. 08-80736-CV-MARRA 
P-000957 
EFTA00228337
Sivu 958 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
A. Constitutional requirements for forensic review 
When searching for digital evidence that falls within the scope of a warrant, 
investigators often seize computer data (either by seizing computers or imaging hard 
drives) when they execute search warrants. As part of the forensic review process, they 
later cull through that data to identify a smaller set of data that falls within the scope of a 
warrant. 
Courts have frequent  characterized this culling through a set of data as a search. 
For example, United States I. Svphers., 426 F.3d 461, 468 (1st Cir. 2005), and Triumph 
Capital 211 F.R.D. at 66, both referred to a review of data on a seized computer as a 
"search." Similarly, Commonwealth I. Ellis, a landmark state decision often cited in 
federal opinions, referred to a reviewer's techniques as "se 
h mechanisms" and 
referred to his activities as a "search." 
Commonwealth I. Ellis, 10 Mass. L. Rptr. 
429, 1999 WL 815818 at 4'10 (Mass. Super. 1999) ("[f]or most of the search, he worked 
alone"). However, not all examinations of data are Fourth Amendment searches. Once a 
file has been found to fall within thejcope of a warrant, subsequent forensic examination 
of that file is not a search. cf.State I. Petrone, 468 N.W.2d 676, 681 (Wis. 1991) 
(holding that seizing undeveloped film during a search and then later developing the film 
did not violate the Fourth Amendment because it was the use of "technological aids... to 
assist [law enforcement] in determining whether items within the scope of the warrant 
were in fact evidence of the crime alleged."); United States'. Maali, 346 F.Supp.2d 
1226, 1263 (M.D. Fla. 2004) (holding that foreign-language documents that appeared to 
be responsive to the warrant could appropriately be seized for off-site translation "to 
verify their responsiveness to the warrants."). 
When a review of seized data is a search, it is subject to the requirements of the 
Fourth Amendment. Either a warrant or an exception to the warrant requirement must 
support the search.2 Thus, even if a warrant satisfied the basic criteria of probable cause 
and particularity at the time of the initial search, any subsequent forensic analysis of the 
seized computer or image must continue to satisfy those constitutional requirements 
throughout the review. 
B. Timing and dissipation of probable cause 
On their face, neither the Fourth Amendment nor Rule 41 places explicit limits on 
the duration of any of these steps, so long as investigators obtain the data during the ten-
2 A new warrant is not required, even for forensic efforts, to recover hidden data or to decrypt data. "A 
defendant's attempt to secrete evidence of a crime is not synonymous with a legally cognizable expectation 
of privacy." Commonwealth 
Copenhefcr, 587 A.2d 1353, 1356 (Pa. 1991); les Orin S. Kerr The Fourth 
Amendment In Cyberspace; Can Encryption Create A "Reasonable Expectation Of Privacy? " 33 Conn. L. 
Rev. 503, 513 (2001). In Copenhefer the Pennsylvania Supreme Court held that the FBI's forensic efforts 
to recover "deleted" files from a hard drive did not require a second warrant, because the defendant's 
computer "was validly seized pursuant to a warrant." Id. See also United States'. Upham, 168 F.3d 532, 
537 (Ist Cir. 1999) ("recovery [by law enforcement of unlawful images] after attempted destruction, is no 
different than decoding a coded message lawfully seized or pasting together scraps of a tom-up ransom 
note."). 
10 
Case No. 08-80736-CV-MARRA 
P-000958 
EFTA00228338
Sivu 959 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
day period required by Rule 41. 
R. 
 
So United States I. Hernandez, 183 F. Supp.2d 468, 
ti
480 (D.P. 
2002); United S t 
iies I. Habershaw 2001 WL 1867803, at *8 (D. Mass. 
May 13, 2001); United States 
Triumph Capital Grout), Inc. 211 F.R.D. 31, 66 (D. 
Conn. 2002); a: United States . New York Tel. Co. 434 U.S. 159, 169 n.16 (1977) 
(applying Fourth Amendment standards to pen registers before the enactment of the pen 
register act, holding that "the requirement ... that the search be conducted within 10 days 
of its issuance does not mean that the duration of a pen register surveillance may not 
exceed 10 days"). 
Case law does not provide a clear rule on when a delay in review would violate 
the Fourth Amendment or Rule 41. Although "the Fourth Amendment itself 'contains no 
requirements about when the searc or seizure is to occur or the duration,'" Svphers, 426 
I
F.3d at 469, quoting United States I. Gerber, 994 F.2d 1556, 1559-60 (11th Cir. 1993), 
"unreasonable delay in the execution of a warrant that results in the lapse of probable 
cause will invalidate a warrant" 
quoting United States'. Marin-Buitrazo 734 F.2d 
889, 894 (2d Cir. 1984). Thus, even if a warrant clearly supported the initial seizure of a 
computer, the probable cause showing supporting that warrant must remain valid 
throughout the forensic review of that hard drive or data. The Fourth Amendment 
therefore may constrain the government's ability to delay its initial forensic review or to 
resume forensic review after a period of inaction. 
Many courts treat the dissipation of probable cause as the chief measure of the 
"reasonableness" of a search's length under the Fourth Amendment. For example, the 
court in Ellis, 1999 WL 815818 at *10, stated that "the test of whether the time within 
which a search warrant was executed was reasonable revolves around the question of 
whether there continued to be probable cause for the search, or whether probable cause 
had dissipated." 
Typically, the government satisfies this requirement even if its review begins 
months after investigators acquire a computer or data, or if there was a break in the 
search's continuity. If there was probable cause to believe a hard drive contained 
contraband or evidence of a crime when agents acquired it, then there will often continue 
to be probable cause to believe the hard drive (or a copy of it) contains that contraband or 
evidence of the crime at any point in the nature. As the Ellis court put it, "the evidence 
was frozen in time" when it was copied to media owned by the investigators, and "[for 
that reason, probable cause continued to gist and allowed continual review of the stored 
information." a 
See also United States I. Svohers 296 F. Supp.2d 50, 58 (D.N.H. 
2003) ("just as probable cause existed to support a search of the CPU when the warrant 
issued ..., probable cause also existed to support the search at any time during [the .period 
specified in a warrant extension for forensic review], because the CPU was under the 
exclusive control of the police during that period."), affd on other grounds, 426 F.3d 
461, 469 (1st Cir. 2005). 
Similarly, in In the Matter of the Search of Scranton Housing Authority 436 F. 
Supp. 2d 714 (E.D. Pa. 2006) the court ruled that by forensically imaging a computer, the 
11 
Case No. 08-80736-CV-MARRA 
P-000959 
EFTA00228339
Sivu 960 / 2265
Attorney-client privileged material 
Law enforcement sensitive 
evidence was "frozen in time" and that a forensic analysis six months after the seizure of 
the image was appropriate. The court ruled that in order to successfully challenge the 
search, the owner of the property would have to establish that probable cause no longer 
existed and that prejudice had been suffered. Finally, the court held that neither the 
Fourth Amendment nor Rule 41 imposed any time limit for the completion of a forensic 
analysis. 
C. Specific limitations in the warrant language 
In a few cases, warrant language has been held to limit the time for review. One 
court held suppression was appropriate because the government failed to comply with 
time limits for reviewing se
 computers when those time limits were required by the 
warrant. See United States I. Brunette, 76 F. Supp.2d 30, 42 (D. Maine 1999), affd, 256 
F.3d 14 (1st Cir. 2001). Generally, time limits on computer forensic examinations set by 
issuing magistrates are not supported by law and should be opposed. Similarly, because 
neither the Fourth Amendment nor Rule 41 requires a specific computer search 
methodology to be used in forensic analysis, attempts by magistrates to require that such 
a methodology be set forth in the warrant should also be opposed. See, United States'. 
$111, No. 05-50219, 2006 WL 2328721 (9th Cir. Aug. 11, 2006); United States'. Brooks, 
427 F.3d 1246 (10th Cir. 2005). 
However, warrant language can justify a lengthy, or long-delayed, review. No 
warrant can authorize an "unreasonable" time to conduct a search, United States  I, 
Grimmett, 2004 WL 3171788.5 (D. Kan. 2004), yet when a lengthy review will be 
necessary, a magistrate's advance approval of that procedure (either in the original 
warrant or through an extension) can 
mbat later defense challenges to the search's 
length. For example, in United States. Svuhers, after state police seized a defendant's 
computer, prosecutors sought an additional warrant to authorize a forensic review of the 
computer. The same day they received that warrant, prosecutors moved for an additional 
twelve months to search the computer. Svnhers 426 F.3d at 463. The district court cited 
that extension, in part, as evidence that the police did not "act in bad faith" by delaying 
their search unreasonably. 296 F. Supp.2d at 58; affd, 426 F.3d at 469. 
Generally, creating et ante limitations on how a warrant is to be executed is 
inconsistent with the role for issuing magistrates that has been set forth by the Supreme 
Court. As set forth in Dalia I. United States 441 U.S. 238, 258 (1979), "It would extend 
the Warrant Clause to the extreme to require that, whenever it is reasonably likely that 
Fourth Amendment rights may be affected in more than one way, the court must set forth 
precisely the procedures to be followed by the executing officers. Such an interpretation 
is unnecessary, as we have held — and the Government concedes — that the manner in 
which a warrant is executed is subject to later judicial review as to its reasonableness." 
D. Difficulty of the search 
Lengthy reviews arc not "unreasonable" under the Fourth Amendment when the 
government can demonstrate that the review was complex. Commonwealth'. Ellis, 10 
12 
Case No. 08-80736-CV-MARRA 
P-000960 
EFTA00228340
Sivut 941–960 / 2265