In re Application for a Search Warrant

Decision Date16 February 2017
Docket NumberCase Number 17M081
Citation236 F.Supp.3d 1066
Parties IN RE APPLICATION FOR A SEARCH WARRANT
CourtU.S. District Court — Northern District of Illinois

Jeannice Williams Appenteng, Northern District of Illinois, AUSA, United States Attorney's Office, Chicago, IL, for Plaintiff.

OPINION AND ORDER

M. David Weisman, United States Magistrate Judge

The government has presented an application for a search and seizure warrant to seize various items presumed to be located at a particularly identified location (hereinafter "subject premises"). The warrant further requests the authority to seize various items (identified in Attachment B of the warrant application), including various forms of electronic storage media and computer equipment (hereinafter collectively "electronic storage media"). Pursuant to Fed. R. Crim. P. 41(e)(2)(B), the government further requests the authority to remove the electronic storage media from the subject premises, and conduct forensic analysis of these materials at a secure location in a more controlled environment. The Court has reviewed the application and finds that there is sufficient probable cause to conduct a search of the subject premises. Thus, all the aforementioned requests seem justified and appropriate to the Court.

However, in its warrant application, the government also seeks the authority to compel any individual who is present at the subject premises at the time of the search to provide his fingerprints and/or thumbprints "onto the Touch ID sensor of any Apple iPhone, iPad, or other Apple brand device in order to gain access to the contents of any such device." For the reasons set forth below, this aspect of the search warrant application is denied.

To begin, there are several aspects of the warrant application that are noteworthy. First, the government has plainly established probable cause to believe that someone has been receiving and trafficking child pornography using the subject premises' internet service. Obviously, these are extremely serious allegations. The warrant application makes plain multiple vulnerable victims are, or were, being sexually abused, and someone associated with the subject premises (although as explained below the exact nature of the association is not known) is involved in trafficking these images.

Despite the apparent seriousness of the offenses involved, the Court notes that some of the "boilerplate" background information included in the warrant is a bit dated, such as its explanation that "[t]he internet allows any computer to connect to another computer [so] [e]lectronic contact can be made to millions of computers around the world;" its explanation that a "Blackberry" is a common "Personal Digital Assistant" (see ¶ 19); and its suggestion that the use of "cloud technology" is the exceptional way of transferring files and that transferring images to a computer by directly connecting a cable to a camera or other recording device is the expected means of data transfer. (¶ 18.)

The inclusion of this somewhat dated view of technology certainly does not distract from the application's goal of establishing probable cause. However, the dated "boilerplate language" is problematic for what is not included. There is absolutely no discussion of wireless internet service and the possibilities and capabilities that wireless service presents in this context. For example, an unsophisticated internet user, or a careless one, may fail to properly encrypt his wireless service or may share the password injudiciously. Such practices leave open the possibility that it is not an inhabitant of the subject premises that has used the internet to gather and distribute child pornography, but rather it is a person who has access to the internet service at the subject premises. Obviously, this possibility holds true in all investigations that track the investigation outlined in the instant application. The limitations of this investigation are not fatal to establishing probable cause, but, in the Court's view, these limitations do impact the ability of the government to seek the extraordinary authority related to compelling individuals to provide their fingerprints to unlock an Apple electronic device.

The warrant application also lacks any detailed information about the resident(s) of the subject premises other than the name of the individual who is likely residing there. There is no assertion that the resident has a known link to criminal acts involving child exploitation. There is no testimony from a source linking the resident to trafficking or possessing child pornography. Nor does the warrant application explain what types of internet-accessible hardware are located at the subject premises. Indeed, part of the warrant application states that "it is likely that Apple brand devices" will be found at the subject premises.1 (¶ 25.) Finally, the warrant application does not identify a comprehensive list of files that the government expects to find on the electronic storage media at the subject premises (or files that can be readily linked to the electronic storage media at the subject premises through other forensic techniques).

The above-noted deficiencies are not surprising. Based on the information contained in the search warrant application, the government's investigation is still developing, and these questions may be answered in the future. As discussed below, however, these factual deficiencies are important for purposes of the Fourth and Fifth Amendment issues presented by this case.

The issues presented in this warrant application are at the cross section of protections provided by the Fourth and Fifth Amendments. Essentially, the government seeks an order from this Court that would allow agents executing this warrant to force "persons at the Subject Premises" to apply their thumbprints and fingerprints to any Apple electronic device recovered at the premises. (See Attach. B, ¶ 12.) The request is neither limited to a particular person nor a particular device. And, as noted below, the request is made without any specific facts as to who is involved in the criminal conduct linked to the subject premises, or specific facts as to what particular Apple-branded encrypted device is being employed (if any).

First, the Court finds that the warrant does not establish sufficient probable cause to compel any person who happens to be at the subject premises at the time of the search to give his fingerprint to unlock an unspecified Apple electronic device. The government argues that "there is no Fourth Amendment right implicated by taking a fingerprint."2 (Gvt. Mem. at 3 n.1) (citing United States v. Sechrist , 640 F.2d 81 (7th Cir. 1981) ). Sechrist does not stand for the simple proposition that "there is no Fourth Amendment right implicated by taking a fingerprint." Indeed, Sechrist recognizes that the compelled fingerprinting of a criminal suspect involves two levels of Fourth Amendment analysis. 640 F.2d 81. The Sechrist court considered the Fourth Amendment implications of seizing an individual to obtain his fingerprints, and the Fourth Amendment implications of securing the fingerprints themselves. See id. at 85 ("The analysis of any Fourth Amendment claim involves a potential violation at two different levels: the ‘seizure’ of the ‘person’ necessary to bring him into contact with government agents ... and the subsequent search for and seizure of the evidence.") (quoting United States v. Dionisio , 410 U.S. 1, 93 S.Ct. 764, 35 L.Ed.2d 67 (1973) ); see also Davis v. Mississippi , 394 U.S. 721, 89 S.Ct. 1394, 22 L.Ed.2d 676 (1969) (discussing the potential Fourth Amendment implications of law enforcement attempts to gather fingerprint evidence without regard to the initial seizure necessary to obtain the fingerprints).

Significant to this Court is that the government is seeking "forced fingerprinting" of any person who happens to be at the subject premises—inclusive of any resident(s) or itinerant visitors. Courts have appropriately and practically recognized that when executing a search warrant, law enforcement officers may detain residents present at the time of the search, Michigan v. Summers , 452 U.S. 692, 101 S.Ct. 2587, 69 L.Ed.2d 340 (1981) ; conduct pat downs of individuals present during the search under the appropriate circumstances, cf. Ybarra v. Illinois , 444 U.S. 85, 100 S.Ct. 338, 62 L.Ed.2d 238 (1979) ; and sweep the location being searched, Maryland v. Buie , 494 U.S. 325, 110 S.Ct. 1093, 108 L.Ed.2d 276 (1990). In some circumstances, these Fourth Amendment intrusions are permitted categorically, see Muehler v. Mena , 544 U.S. 93, 98, 125 S.Ct. 1465, 161 L.Ed.2d 299 (2005) (noting that "[a]n officer's authority to detain incident to a search is categorical" in nature), while other Fourth Amendment intrusions are premised on some showing of necessity. See Ybarra , 444 U.S. at 91, 100 S.Ct. 338 (stating "a person's mere propinquity to others independently suspected of criminal activity does not, without more, give rise to probable cause to search that person") (citation omitted); Buie , 494 U.S. at 331, 110 S.Ct. 1093 (noting distinction between sweeping areas "immediately adjoining the place of arrest" as a matter of course and a broader search based on "articulable facts which, taken together with the rational inferences from those facts, would warrant" a search broader than the immediate area of arrest).

Perhaps most significantly, the Summers case, which allows the Fourth Amendment event of seizing occupants of a residence, has been read narrowly by courts to be limited to the "residents" of the searched premises. Summers , 452 U.S. 692, 101 S.Ct. 2587. In Summers , while police officers were executing a warrant to search a house for narcotics, they encountered respondent on the front steps. Id. at 693, 101 S.Ct. 2587. The police officers requested Summers' assistance in gaining entry and detained him while they searched the premises. The...

To continue reading

Request your trial
13 cases
  • Matter of Search Warrant Application for cellular telephone in United States v. Barrera, Case No. 19 CR 439
    • United States
    • U.S. District Court — Northern District of Illinois
    • 22 Noviembre 2019
    ...privilege because that act does not qualify as a testimonial communication."); In re Application for a Search Warrant , 236 F.Supp.3d 1066 (N.D. Ill. Feb. 16, 2017) (Weisman, J.) (holding that compelling a thumb print to unlock an encrypted device violated the Fifth Amendment because the ac......
  • In re Search of [Redacted] Wash.
    • United States
    • U.S. District Court — District of Columbia
    • 26 Junio 2018
    ...because there is a reasonable suspicion to believe that the individual is a user of the device.7 Cf. In re Application for a Search Warrant , 236 F.Supp.3d 1066, 1070 (N.D. Ill. 2017) (denying warrant on Fourth Amendment grounds where government sought authority "to seize any individual at ......
  • State v. Andrews
    • United States
    • New Jersey Supreme Court
    • 10 Agosto 2020
    ...application seeking permission to compel fingerprint or facial recognition device unlocking), and In re Application for a Search Warrant, 236 F. Supp. 3d 1066, 1073-74 (N.D. Ill. 2017) (same as to forced fingerprint device unlocking), with In re the Search of: A White Google Pixel 3 XL Cell......
  • Seo v. State
    • United States
    • Indiana Supreme Court
    • 23 Junio 2020
    ...(N.D. Ill. 2019) ; In re Residence in Oakland, Cal. , 354 F. Supp. 3d 1010, 1016 (N.D. Cal. 2019) ; In re Application for a Search Warrant , 236 F. Supp. 3d 1066, 1073 (N.D. Ill. 2017) ; State v. Diamond , 905 N.W.2d 870, 875 (Minn. 2018).4 Pew Research Ctr., Mobile Fact Sheet (June 12, 201......
  • Request a trial to view additional results
6 books & journal articles
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Suppressing Criminal Evidence Fourth amendment searches and seizures
    • 1 Abril 2022
    ...See Matter of Residence in Oakland, California , 354 F. Supp. 3d 1010, 1016 (N.D. Cal. 2019); In Re Application for a Search Warrant , 236 F. Supp. 3d 1066 (N.D. Ill. 2017). In both of these cases, the courts denied the portion of the government’s search warrant application to force all per......
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2020 Contents
    • 31 Julio 2020
    ...See Matter of Residence in Oakland, California , 354 F. Supp. 3d 1010, 1016 (N.D. Cal. 2019); In Re Application for a Search Warrant , 236 F. Supp. 3d 1066 (N.D. Ill. 2017). In both of these cases, the courts denied the portion of the government’s search warrant application to force all per......
  • PASSWORD UNPROTECTED: COMPELLED DISCLOSURE OF CELLPHONE PASSWORDS AND THE FOREGONE CONCLUSION EXCEPTION.
    • United States
    • Rutgers Computer & Technology Law Journal Vol. 48 No. 1, March 2022
    • 22 Marzo 2022
    ...In re Residence in Oakland, Cal., 354 F. Supp. 3d 1010, 1016 (N.D. Cal. 2019); then citing In re Application for a Search Warrant, 236 F. Supp. 3d 1066, 1073 (N.D. Ill. 2017); and then citing State v. Diamond, 905 N.W.2d 870, 875 (Minn. (93) See id. at 958. (94) Id. at 962 ("Yet, while we h......
  • ACTIONS SPEAK LOUDER THAN WORDS: COMPELLED BIOMETRIC DECRYPTION IS A TESTIMONIAL ACT.
    • United States
    • Washington University Law Review Vol. 100 No. 3, February 2023
    • 1 Febrero 2023
    ...Home & Attached Garage, No. 17 M 85, 2017 WL 4563870, at *7 (N.D. Ill. Feb. 21, 2017); In re Application for a Search Warrant, 236 F. Supp. 3d 1066, 1073 (N.D. Ill. (111.) See, e.g., In re Search of a Residence in Oakland, 354 F. Supp. 3d 1010, 1015-16 (N.D. Cal. 2019). (112.) Some cour......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT