Professional Documents
Culture Documents
AUG — S 2co9
JACOBS CHASE FRICK
KLEINKOPF&KEL FY
Certification o or ‘5 ,
Petitioners:
AMALIA CERI{ILLO; LUIS NORIEGA, on
behalf of himself and as class representative; JOHN
DOE, on behalf of himself and as class
representative; FRANK DOE, on behalf of himself
and as class representative; ROBERT DOE, on
behalf of himself and as class representative;
v.
Respondent:
KENNETH R. BUCK, in his official capacity as
District Attorney for the Nineteenth Judicial District;
JOHN COOKE, in his official capacity as Weld
County Sheriff,
Attorneys for Respondent Kenneth R. Buck:
Lisa Hogan, #14 132
Richard P. Barkley, #17161
BROWNSTEIN HYATT FARBER
SCHRECK, LLP
410 Seventeenth Street, Suite 2200
Denver, CO 80202-4437
Phone: 303-223-1100; Fax: 303-223-1111
Email: rbarkley@bhfs. corn;
lhoganbhfs.com
2
TABLE OF CONTENTS
Page
TABLE OF AUTHORITIES iii
STATEMENT OF FACTS 2
E. The Search 7
PROCEDURAL HISTORY 10
ARGUMENT 13
I. INTRODUCTION 13
1
TABLE OF CONTENTS
Page
II. THE COURT’S RULING THAT THE WARRANT DII) NOT MEET THE
REQUIREMENTS OF THE CONSTITUTIONAL PROVISIONS WAS
ERRONEOUS 20
A. The Sheriff Did Not Exceed the Scope of the Warrant by Performing a
Cursory Review of All of the Business’ Files 30
U
TABLE OF CONTENTS
Page
CONCLUSION .41
111
TABLE OF AUTHORITIES
Page
FEDERAL CASES
Andresen v. Maryland,
427 U.S. 463 (1976) 31
iv
TABLE OF AUTHORITIES
Page
V
TABLE OF AUTHORITIES
Page
STATE CASES
K1inenstein v. State,
624 A.2d 532 (Md.App. 1992) 40
People v. Alameno,
193 P.3d 830 (Cob. 2008) 19-20
People v. Ball,
639 P.2d 1078 (Cob. 1982) 16
People v. Eirish,
165 P.3d 848 (Colo.App. 2007) 39
People v. Gall,
30 P.3d 145 (Cob. 2001) passim
People v. Miller,
75 P.3d 1108 (Cob. 2003) 16
People v. Reed,
56 P.3d 96 (Cob. 2002) 16
People v. Roccaforte,
919 P.2d 799 (Cob. 1996) 19
People v. Schmidt,
473 P.2d 698 (Cob. 1970) 18
People v. Slusher,
844 P.2d 1222 (Cobo.App. 1992) 22
vi
TABLE OF AUTHORITIES
Page
People v. Staton,
924 P.2d 127 (Cob. 1996) 28
vii
ISSUE PRESENTED FOR REVIEW
unincorporated tax preparation business violated the rights of either the business
seizure of records from — a tax preparation business (“Search”) with the trade name
of Amali&s Translation and Tax Services (“Business”). After the Weld County
Sheriffs Office (“Sheriff’) uncovered information that the Business maintained tax
records for customers that showed they were using social security numbers
(“SSN”) that were stolen or otherwise did not belong to them, the Sheriff obtained
and executed a search warrant (“Warrant”). Evidence from the Search showed that
several hundred of the Business’ customers possessed, and were using, false or
stolen SSNs.
More than three months after the Search — and after the District Attorney for
the Nineteenth Judicial District (“DA”) had obtained indictments against more than
100 individuals — Amalia Cerrillo, the Business’ owner (“Cerrillo”), and three
unidentified customers of the Business (“Customers”), filed an action in Weld
County District Court (“court”) against the DA and the Sheriff The complaint —
which sought declaratory and injunctive relief — alleged that the Search violated
the Fourth Amendment to the United States Constitution and Article II, § 7 and
STATEMENT OF FACTS
Identity theft has been described as the fastest growing crime in the United
theft. Identity Theft Victims Rights: Hearing Before the H. Oversight and
Government Reform Comm., 111th Cong. (July 17, 2009) (statement of Jason M.
Weinstein, Deputy Ass’t Att’y Gen. of the United States). By 2008, that number
had increased twenty-five percent, to 10 million. (RI.) The direct financial losses
‘Although Cerrillo and the Customers referred to Article II, §7 and 25 of the
Colorado Constitution in their complaint, they did not contend that the analysis
under those constitutional provisions differed from the Fourth Amendment
analysis. Accordingly, the DA and the Sheriff treat the state and federal
constitutional provisions as coextensive here.
2
from identity theft — without considering indirect costs and damage — are ‘in the
Weld County. In 2007, the last fhll year before the Search at issue here, Colorado
ranked eighth per capita among the fifty states in the number of identity theft
area had the second highest number of identity theft complaints per capita of any
Fraud and Identity Theft Complaint Data January — December 2007 (Feb. 2008)
To combat identity theft, the federal government — and forty-nine of the fifty
states — have enacted criminal statutes prohibiting identity theft. See, e.g., National
3
enacted C.R.S. § 18-5-901 through 905 in 2006,2 which makes it a class four felony
to:
In August 2008, the Sheriffs Office learned from a detainee, Servando Trejo
(“Trejo”), that evidence of identity theft was likely in the possession of the
SSN and name. [Trans.No.23477721, Affat3.] The Business prepared and filed
tax returns for him. (j4.) The Business requested from the Internal Revenue
Service (“IRS’) an Individual Tax Identification Number (“ITIN”) for Trejo, using
2
C olorado has also enacted C.R.S. § 18-5-113, which prohibits Criminal
Impersonation. The Affidavit stated that evidence of both crimes existed at the
Business.
4
his real name. When the Business received the ITTN, it filed tax returns using
Trejo’s real name and ITIN, but attaching the W-2 forms with his false name and
SSN. (Id.) Trejo stated that he had used the Business to file returns for several
years, and that “recently [it had] started E-Filing his tax returns.” Trejo said that he
learned through “word of mouth” that the Business would assist illegal immigrants
using false identities in filing tax returns, and that it was widely known within the
community that illegal immigrants could “go to [the Business] for their taxes.”
“several tax returns filed by [the Business], an advertisement for the [B]usiness and
receipts Trejo paid for the tax services.” (Id. at 4.))These documents corroborated
Bratten, interviewed Cerrillo about the Business’ practice of filing tax returns for
illegal immigrants. Cerrillo said that the Business “knowingly prepar[ed tax
Cerrillo acknowledged that “with this type of client, almost all of them provide her
with wage information W-2/l099 with a [SSN] that belongs to someone else.”
(Id.) Cerrillo stated that “generally on the wage document W-2/1099 she w[ould]
cross out the fake name and SSN and input the real information before sending it
5
in.” She also confirmed that she retained “a copy of the [client’s] tax returns, wage
Bratten told the Sheriff that it was possible to file tax returns electronically
(as Trejo had said was being done) even though the person to whom the ITIN had
been issued was different from the person to whom the SSN had been issued.
expressed the opinion that the tax returns and related documents stored on
computers could not “be readily accessed at the location the computer is seized
from.” (Id. at 6) Rather, any computers would “need to be removed and processed
Detective Ford warned, “may result in an incomplete examination and could result
Based on its investigation, the Sheriff concluded that probable cause existed
that the Business possessed evidence of multiple instances of identity theft. The
23477721], seeking to search the Business and seize (a) all tax returns for 2006 and
2007 “in which the ITEM name and number d[id] not match the wage earnings
6
returns; and (b) computer systems, computer equipment, computer storage devices,
and documents relating to use of the computers. On October 16, 2008, Judge
E. The Search
[Trans.No.25967467, 2Tr.89:2-8.]
3 When they arrived, Cerrillo and others were
moving furniture, equipment, and supplies from the office because she was
“extremely concerned about [Sheriff officers] being present in her office” because
the Sheriff that if they gave her “a couple of days,” she could “go ahead and sort
The Sheriff was unwilling to wait “a couple of days” to complete the Search.
Instead, the officers responded that the Search would be completed more quickly
“if she could identif’ where the 2006 and 2007 files were.” Cerrillo said she could
not do that because her files were arranged alphabetically, not by year. [Trans.No.
25967467, 2Tr.90:20.] Cerrillo identified a file cabinet where “most of [the 2006
3
T he March 9, 2009 Transcript is cited as lTr.; the March 10, 2009 Transcript is
cited as 2Tr.; and the April 13, 2009 Transcript is cited as 3Tr.
7
and 2007] files might be.” [Trans.No.25967467, 2Tr.90:20-23.] Cerrillo also
identified files and file cabinets in the basement that contained tax records. The
files were not well-organized; in the words of Detective Noonan, “Everything was
“looked like somebody tried to put them in alphabetical order ... for the most part
Afier surveying the files to be searched, the Sheriff determined that because
for several days ... to complete the search warrant, we would remove
all the files and boxes, complete the search at the Sheriffs Office and
then return the documents to her as quickly as possible.
4,000 and 5,000 tax return files for somewhere between 650 and 750 people — from
in a locked room at the Sheriffs Office, and when that space was hill, in a locked
determine whether it fell within the scope of the Waifant. Officer Noonan
8
Q. ... What did you do to be able to look at these files?
Q. So let me see if I have the sequence right. You get a file. You
look to see is there a form in this file that would contain an
ITfN?
A. Correct.
Q. If you found a form that had an ITIN on it, you looked further?
A. Yes.
A. Yes....
A. No.
paper documents took more than five days to complete, and the copying of files
9
[T]hree computers, several CDs or DVDs and maybe some floppy disks”
were also taken from the Business, and delivered to the Sheriffs forensic lab.
There, the computers were imaged and then returned to the Business. Except for a
cursory review of the hard drive, no search of the computer files occurred.
that tax records existed on the computers, although they could not be read without
the necessary software; and (b) the hard drives contained a customer list for the
Business. The customer list — which fell within one of the categories of documents
identified in the Warrant — was copied onto a CD and placed into evidence.
Otherwise, no search of the hard drives was conducted, and no evidence was
PROCEDURAL HISTORY
On January 26, 2009, Cerrillo and four Customers filed this action. The
complaint sought a declaration that the Search violated the Colorado and the
4
W ith respect to the storage media, the disks that were determined to contain
material unrelated to tax returns were returned to the Business without being
copied. The few disks that appeared to contain tax records were copied, and the
originals were returned to the Business. The information contained on those disks
was not searched.
10
Cerrillo and the Customers also moved for a mandatory injunction directing
the Officials to turn over to the court “all materials seized” in the Search.
on March 9 and 10, 2009. On April 13, 2009, the court ruled that the Search was
don’t know who and we don’t know how many — there would be
evidence of some crime by someone. There was not probable cause as
to a specific individual, as to specific files, as to a specific crime....
[To establish probable cause to search a specific customer’s file] there
would [have to] be [evidence] that that person or that person’s records
would substantiate the claim and would be in violation of the law.
[Trans.No.25967467, 3Tr.15:15-16:15.] The court also ruled that the search was
“unreasonably overbroad as to the 5,000 files. The warrant itself was overbroad to
3Tr. 15:2-5.]
petitioning for immediate certiorari review by this Court. The Court granted the
petition.
11
SUMMARY OF THE ARGUMENT
In this case, substantial evidence existed that the numerous customer tax
files maintained by the Business contained evidence of the crimes of identity theft
and criminal impersonation. Despite this, the court ruled that the Warrant
authorizing a search of the Business’ files lacked probable cause because it was not
specific either to the individuals who committed the crimes, or to the files that
contained evidence of the crimes. The court held that such specificity was required
because there was no evidence that the Business’ owner had committed any crime.
United States Supreme Court has expressly rejected a more stringent probable
seized is not guilty of a crime. The Court has similarly held that identification of
the culpable individual is not a requirement under the Fourth Amendment. And
numerous courts have held that a warrant is not required to have the specificity
required by the trial court with respect to the files in which the material to be
The court also ruled that the Warrant was overly broad with respect to the
search of the Business’ computers and electronic storage devices. The court
12
preserve and protect the integrity of the information, and thus was appropriate.
The search of the computers was limited to a search for the documents identified in
the Affidavit and Warrant and thus was equivalent to the search of the paper files
The court also ruled that the scope of the Search was not authorized by the
Warrant because the Sheriff searched all of the Business’ files even though only
Warrant’s scope, it is permitted. Moreover, this Court has recognized, that such
Finally, the court erred in ordering the return of all of the files. Even if the
Warrant, or the Search, were overly broad, absent a flagrant disregard of the
constitutional rights of Cerrillo and the Customers — which does not exist here —
the remedy is to suppress only the items that fall outside the permissible scope.
ARGUMENT
I. INTRODUCTION
No dispute exists here that the Affidavit supporting the Warrant contained
substantial, reliable evidence — from both Trejo and Cerrillo — that the Business
obtained ITII’4s, and prepared tax returns, for numerous customers who were using
13
SSNs belonging to others. The district court acknowledged as much, ruling that
Trejo had provided evidence “that not only he, but others who used [the tax]
service” of the Business “had filed taxes using ITIN[s] and possibly using [SSNs]
that did not belong to [Trejo], or in the case of the others, did not belong to these
Similarly, no dispute exists here that the use of SSNs by customers of the
Business who also obtained TINs almost certainly violated Colorado’s identity
respondents alike agreed that an ITIN could only be obtained when an individual
did not have a valid SSN and that the fact that a tax return listed both a SSN and an
ITIN for a single taxpayer was prima facie evidence of fraudulent behavior.
2Tr.8:25-l0:14.]
Nonetheless, because neither the Business nor its owner was “suspected of a
3 Tr. 12:21-22.] Under this new standard, an affidavit would not only have to show
nothwithstanding the fact that identity theft was the crime being investigated, it
14
also would have to show the identity of the person whose “records would
the Business for a specific individual, and then only upon a showing that probable
cause existed that the specific individual had committed a crime and the file likely
mandates such detailed, specific, information for the issuance of a search warrant.
In fact, in the context of identity theft — which seeks to hide the true identity of the
perpetrator the specificity requirement that the district court seeks to impose
Sheriff and the DA request the Court to reverse the district court’s ruling, and to
hold that the Warrant and Search complied with the Constitutional Provisions.
cause, and (b) to describe particularly the place to be searched and the person or
15
things to be seized.” People v. Gall, 30 P.3d 145, 149 (Cob. 2001). The Warrant
probable cause, however, is probability, not certainty. People v. Ball, 639 P.2d
1078, 1082 (Cob. 1982). The probable cause analysis “does not lend itself to
People v. Miller, 75 P.3d 1108, 1113 (Cob. 2003). Accordingly, probable cause
exists so long as an affidavit alleges facts that would lead “a person of reasonable
reviewed with deference to the issuing [Judge].” Gall, 30 P.3 d at 150. The
appropriate question for a reviewing court is “whether the issuing magistrate had a
substantial basis for issuing the search warrant rather than whether the reviewing
court would have found probable cause in the first instance.” Id.; see also People
v. Reed, 56 P.3d 96, 101 (Cob. 2002). Application of that standard here
16
establishes that the Affidavit — which contained information from multiple sources
that evidence of the crimes of identity theft and criminal impersonation was likely
issuing the search wanant.” First, Trejo provided information that (a) he had
learned from “word of mouth” that the Business would assist him in preparing and
filing tax returns even though he was using the identity of another person;
(b) “everyone knows to go to [the Business] for their taxes;” (c) he provided the
Business with evidence of identity theft by him; and (d) the Business had recently
consensual search of Trejo’s residence showed that the Business had filed, and
been paid to file “several tax returns” for Trejo. Third, Cerrillo acknowledged that
(a) she filed tax returns for immigrants who were working illegally in the United
States; (b) “almost all” of these employees provided her with wage records
containing a SSN “that belongs to someone else;” (c) she would obtain ITII’Js, and
then file tax returns, for the employees; and (d) she retained in her files evidence
showing (i) the true identity of these employees, and (ii) that they were using false
SSNs. Fourth, Agent Bratton established that tax returns with mismatched SSNs
17
recent tax returns would be found on the Business’ computers. This evidence, all
of which was contained in the Affidavit, was sufficient to establish probable cause.
described in exhaustive detail the “place to be searched.” It gave the address of the
challenged the adequacy of the description given of the Business’ location in the
trial court, and the district court did not rule that the description was insufficient.
numerous courts have recognized, “the necessary particularity for a search warrant
varies according to the circumstances and type of items involved. Also, built into
Fed. Appx. 300, 306 (4th Cir. 2006); see also People v. Schmidt, 473 P.2d 698,
United States v. Hill, 459 F.3d 966 at 973 (9th Cir. 2006) (“A warrant describing a
Here, the Warrant satisfied the particularity requirement both with respect to the
18
documents that were to be searched, and the electronic equipment that was to be
were (a) “tax returns filed with an Individual Tax Identification Number (ITIN) for
tax years 2006 and 2007 in which the ITfN name and number do not match the
“Contracts,” “W-7 Forms,” “Wage and tax earning documentation,” and “[a]l1
confusion, either by the Sheriff or by the Business, about the physical documents
that fell within the scope of the Warrant. When the warrant was executed, Cerrillo
was told that the Sheriff was seeking “files that [she] had in [her] offices which
related to mismatches of Social Security numbers and ITINs for 2006 and 2007.”
the Business’ tax files were located. Thus, the Warrant was “sufficiently particular
in that it enable[d] the executing officer” — and the Business’ owner — reasonably
5
1 n the hearing, Cerrillo and the Customers contended that tax records for years
other than 2006 and 2007 were seized. Their seizure, however, was authorized by
the plain view doctrine because the Sheriff “had a reasonable belief that the
19
The Warrant was equally specific as to the electronic equipment to be
where they could be copied and searched for documents within the scope of the
(d) computer programs and software, and (e) documents relating to the operation of
the computers. Again, both the Sheriff and Cerrillo were able to “ascertain and
identi& the things authorized to be seized,” id., and no confUsion existed as to the
II. THE COURT’S RULING THAT THE WARRANT DID NOT MEET
THE CONSTITUTIONAL REQUIREMENTS WAS ERRONEOUS.
The court ruled that the Waifant was constitutionally infinn for two reasons.
First, the Warrant was deficient because the Affidavit failed to establish probable
evidence seized was incriminating.” People v. Alameno, 193 P.3d 830, 834 (Cob.
2008).
6
T he court’s assertion that the Affidavit fails to establish probable cause as to a
“specific crime” is baffling. The Affidavit identified specifically two crimes:
identity theft and criminal impersonation. [Trans.No.23477721,Aff. at 6.]
20
Second, the Warrant was “overbroad to the extent it dealt with computer and
The court’s ruling that that the Warrant was unconstitutional because it did
not identify the specific individuals whose files contained evidence of crimes is
Daily, 436 U.S. 547 (1978), that the identification of specific individuals in a
Search warrants are not directed at persons; they authorize the search
of “place[s]” and the seizure of “things,” and as a constitutional matter
they need not even name the person from whom the things will be
seized.... [A] search warrant may be issued on a complaint which does
not identify any particular person as the likely offender. Because the
complaint for a search warrant is not ‘filed as the basis of a criminal
prosecution,’ it need not identify the person in charge of the premises
or name the person in possession or any other person as the offender.”
is especially untenable given that the Sheriff was investigating identity theft and
21
acknowledged, even if the Sheriff had specific W-2s, the names on them would not
ascertained at the time the warrant is issued, naming only the generic class of items
will suffice.” United States v. Abboud, 438 F.3d 554, 575 (6th Cir. 2006)
(quotation omitted); see also United States v. Davis, 226 F.3d 346, 352 (5th Cir.
2000). Courts applying this rule have consistently upheld warrants that are far less
specific than the Warrant here. See, e.g., United States v. Harris, 903 F.2d 770,
774 (l0thCir. 1990); United States v. Majors, 196 F.3d 1206, 1216 (11th 1999).
be seized will vary with the level of information available to the police and the
type of items involved.” People v. Slusher, 844 P.2d 1222, 1228 (Colo.App.
22
simply recognizes the practical fact that law enforcement officials cannot know “at
the time [they] appl[yj for the warrant what precise records and files would contain
information concerning the” crime under investigation. Abboud, 438 F.3d at 575;
see also In re Grand Jury Subpoena (Under Seal), 920 F.2d 235, 239 (4th Cir.
1990).
practical reality. For example, consider the more common situation in which law
enforcement searches for documents; where documents may reveal the sale of
illegal drugs. Once police have probable cause to suspect evidence of drug crimes
are contained in a file cabinet, would police need to identif the specific file header
to conduct a search? Of course not. Once the items to be seized are identified with
particularity, and the premises containing such items identified, police may sort
Numerous cases have rejected the “specific file” requirement imposed by the
court. In United States v. Riley, 906 F.2d 841 (2d Cir. 1990), for example, police
business records, and safety deposit box records.” 906 F.2d at 844. The Second
Circuit rejected the defendant’s particularity argument, holding: “No doubt the
description, even with illustrations, did not eliminate all discretion of the officers
23
executing the warrant, as might have occurred, for example, if the warrant
authorized seizure of the records of defendant’s account at a named bank. But the
identify the name of the bank involved in laundering drug money, the Sheriff here
did not need to identify the specific names on the Business’ files that contained
Similarly, in United States v. Hayes, 794 F.2d 1348 (9th Cir. 1986), the
court considered a warrant authorizing the seizure of “all records which document
medical office. j at 1355. The defendant complained that the warrant permitted
officers to sort through 10,000 patient files in order to find the documents
identified, and argued that the search should have been limited to specifically-
named patient files. The Ninth Circuit rejected the specific file approach to
We also conclude that the warrants need not have been more narrowly
drawn. [Defendant] contends that the officers possessed information
concerning 58 cases of potential violations involving Schedule II
drugs and that the warrants should have been limited to those 58
patient files. Such a conclusion, however, ignores the magistrate’s
fmding, unchallenged on appeal, of probable cause to seize all
documents concerning controlled substances. The 58 known cases
could fairly be considered as representative of more pervasive
violations of the Act.
24
Id. at 1356 (footnote omitted); see also In re Grand Jury Subpoena (Under Seafl,
920 F.2d 235, 239 (4th Cir. 1990) (“Likewise, there is no flaw in the fact that the
documents covered by the warrant did not have specific time periods attached.
The dates of specific documents could not have been known to the Government
As shown previously (see supra pp.-J, the Warrant identified very specific
Individual Tax Identification Number (ITIN) for tax years 2006 and 2007 in which
the ITfl’J name and number do not match the wage earning documentation.”
context for seizing these documents by describing why files with both ITINs and
SSNs are evidence of criminal activity. That is all the Constitutional Provisions
require.
In its Ruling, the court repeatedly emphasized that the Business’ owner,
25
reasonable or not. The fact that she was not herself the target removes
this case from the holding of many other cases where professional
offices that have been a target have been involved with the search
warrants.... And that goes to issues of specificity, where the items
might be found, how specific the warrant is, et cetera.
specificity standard based on that standard, were legal errors. In Zurcher, the
United States Supreme Court expressly considered the “recurring situation where
other evidence of crime is located on identified property but do not then have
probable cause to believe that the owner or possessor of the property’ is himself
implicated in the crime that has occurred or is occurring.” 436 U.S. at 553. The
Court concluded that the validity of the warrant was unaffected by the lack of
26
7 at 554. See, e.g., United States v. Barker, 623 F. Supp. 823, 843 (D. Cob,
Id.
1985) (“The Supreme Court has made clear that ‘[t]he critical element in a
reasonable search is not that the owner of the property is suspected of crime but
that there is reasonable cause to believe that the specific ‘things’ to be searched for
and seized are located on the property to which entry is sought.”) (quoting
Zurcher, 436 U.S. at 556); United States v. Tehfe, 722 F.2d 1114, 1118 (3rd Cir.
1983). Accordingly, the heightened standard imposed by the court was, once
The Court also ruled that the Warrant “was overbroad to the extent it dealt
the court failed to elaborate on its statement, the court may have accepted the
argument, made by Cerrillo and the Customers, that the Warrant did not limit the
computer files that could be searched. If so, the court misapprehended the Warrant
7
1 n Tattered Cover, Inc. v. City of Thornton, 44 P.3d 1044 (Cob. 2002), this Court
declined to construe the Colorado Constitution in accordance with the Zurcher
Court’s interpretation of the Fourth Amendment when the search implicated rights
of fundamental rights of free expression. See Tattered Cover, 44 P.3d at 1055-56.
This case implicates no such rights. Accordingly, Tattered Cover provides no
basis for arguing and Cerrillo and the Customers have not argued that Article
— —
II, § 7 of the Colorado Constitution provides greater protections than the Fourth
Amendment in this case.
27
in three respects. First, it failed to distinguish between the seizure of the
explained more fUlly in the Affidavit, the seizure of the computers was to protect
the integrity of the information stored in them, and thus the entire computers were
seized. The search for documents stored on the computers, by contrast, was
limited to the same categories as paper documents. In fact, the Warrant draws no
distinction between electronic documents and paper documents. Thus, the search
of the computers was analogous to the search of the paper files located at the
Second, even if that were not the case, the Waifant must be read in a
common sense fashion, and in light of the supporting Affidavit. See People v.
Staton, 924 P.2d 127 at 132-33 (Cob. 1996). Here, there is no question that the
Sheriff understood the Warrant to authorize only a search for documents related to
that is the only plausible reading of the Warrant. The Warrant and supporting
Affidavit describe the Sheriffs Office investigation of identity theft and criminal
states that the Warrant is seeking “evidence of Identity Theft and Criminal
28
Impersonation.” [Trans.No.23477721,Aff. at 6.] It would be wholly unreasonable
to read the Warrant as implying a power over electronic records other than the
permissible sorting for the specified evidence; and the conduct of the Sheriffs
Office in handling the electronic records demonstrates its understanding that the
warrant did not authorize it to search electronic records that were unrelated to tax
Third, the Affidavit describes the basis for removing computer storage
media from the site of the search. Forensic demands require that such media be
Affidavit thrther explains that evidence can be stored on a wide variety of media.
(Id.) Accordingly, the Sheriffs Office knew prior to the search that it would need
to seize all computer media in order to sift the documents related to mismatched
social security numbers in its forensics laboratory. The Warrant’s listing of all
computers and storage devices thus was intended to advise Cerrillo that the Sheriff
would be removing these items from the premises. The Warrant did not contain
the same notice with respect to paper documents because it was not until the
Sheriff began the search that it became clear on-site sorting was impractical. (See
Trans.No.25967467,2Tr.94:7- 15).
29
III. THE COURT ERRED IN HOLDiNG THAT THE SEARCH WAS
“UNREASONABLY OVERRROAD AS TO THE 5,000 FILES.”
In its Ruling, the court concluded that the Sheriffs cursory review of the
5,000 flIes maintained by the Business was a search of them. The Sheriffs actions,
the court stated, were “not some preliminary or precursor activity or anything other
than a search.... They were — all the materials were reviewed. They were evaluated,
the search conducted by the Sheriff was “unreasonably overbroad as to the 5,000
files.” Although the court did not elaborate, it could have been ruling either that
(a) the Warrant did not authorize the Sheriff to review all of the files to determine
which of them fell within the scope of the Warrant; or (b) the Warrant did not
authorize the seizure, and removal, of all 5,000 files so they could be reviewed
enforcement officials will come into contact with documents outside the scope of a
scope, it must be briefly inspected. As the Second Circuit noted, “few people keep
30
documents of their criminal transactions in a folder marked ‘drug records.” United
States v. Riley, 906 F.2d 841, 845 (2d Cir. 1990). Because documentary evidence
of criminal activity is often intermingled with other papers, courts have uniformly
held that a cursory inspection of all business records does not transform a valid
warrant into a “general warrant.” As a result, “in searches for papers, it is certain
determine whether they are, in fact, among those papers authorized to be seized.”
Recognizing this reality, courts uniformly hold that “all items in a set of files
may be inspected during a search, provided that sufficiently specific guidelines for
identifying the documents sought are provided in the search warrant and are
followed by the officers conducting the search.” United States v. Tamura, 694
F.2d 591, 595 (9th Cir. 1982); see also United States v. Slocum, 708 F.2d 587, 604
(11th Cir. 1983); United States v. Hayes, 794 F.2d 1348, 1356 (9th Cir. 1986);
People v. Gall, 30 P.3d 145, 154 (Cob. 2001). “[N]o tenet of the Fourth
surgical precision.” United States v. Conley, 4 F.3d 1200, 1208 (3d Cir. 1993)
(quotation omitted).
31
That is the precise situation here. At the very beginning of the search,
officers attempted to narrow the search by asking Cerrillo where the documents
covered by the Waifant were located. She informed the officers that the
documents were not segregated, but were mixed with other files. As a result, to
locate the documents that fell within the scope of the Warrant, the Sheriff was
required to investigate cursorily all of the Business’ files, including those that were
determined to be outside the scope of the Warrant. That investigation did not
impact the propriety of the search, however, because the Warrant provided
review files to determine whether they were covered by the Warrant, searches
from a search through the mere artifice of intermingling them with documents that
were not within the scope of the Warrant. This is not, and cannot be, the case.
Accordingly, to the extent the Court’s ruling holds that the Waifant’s scope was
exceeded by the cursory examination of 5,000 files to identi the 1,300 covered
files, the ruling is contrary both to the law and to practical reality.
32
B. The Sheriff Appropriately Conducted Its Sorting Off-Site.
conduct a cursory review of documents to determine whether they fall within the
scope of a search warrant. They are not, however, required to conduct such sorting
at the searched premises. As the Colorado Supreme Court held, the removal of a
group of documents
the ability to conduct less-intrusive off-site sorting. In addressing this issue, the
Given that the officers were entitled to examine the documents while
they remained in the home, we cannot see how [Defendant]’s privacy
interest was adversely affected by the agents’ examination of the
documents off the premises, so long as any items found not to be
relevant were promptly returned. Indeed, as we previously found .
United States v. Santarelli, 778 F.2d 609, 616 (11th Cir. 1985).
33
Here, two categories of evidence were sorted off-site. First, the Sheriff
search, Cerrillo indicated that the Business did not keep its files segregated by tax
segregate the files containing fraudulent SSNs from those containing the correct
her files to determine which documents fell within the scope of the Waifant.
[Trans.No.25967467, 1 Tr. 129:1 9-l 30:6.] CernIlo also expressed concern that the
[Trans.No.25967467,2Tr.61 :2162:18.18
Office to sort the documents off-site. (2Tr.94:7-15); see United States v. Hargus,
8
C errillo testified that she told the officers conducting the search that ‘they’d have
to give me a couple of days so I can go ahead and sort them [her files] out.”
[Trans.No. 25967467,lTr.129:17-18.] In fact, it took the Sheriff five days, using
six to eight employees, to conduct the sorting. [Trans.No. 25967467,2Tr.100:23-
25.] Because of the intrusiveness of an on-site search under these circumstances,
the “preferred” approach was to do what was done: “to take that entire group of
items to another location and do the sorting there.” Gall, 30 P.3d at 154.
34
128 F.3d 1358, 1363 (lothCir. 1997) (off-site sorting of filing cabinets
permissible); United States v. Shilling, 826 F.2d 1365, 1369-70 (4th Cir. 1987)
(same). Moreover, the Sheriffs Office handled the files properly by returning
promptly all records, without copying them, that were not related to mismatched
respect to documents that were determined to fall within the scope of the wanant,
the Sheriffs Office made copies and returned the originals. [Trans.No.
25967467,2Tr.l00:9-21.]
The second category of evidence that was taken off-site was computer
equipment and electronic storage media. The Colorado Supreme Court has held
that the rule permitting off-site sorting is “not only applicable but in fact
a degree of expertise beyond that of the executing officers.” Gall, 30 P.3d at 154
(citation omitted); see also United States v. Upham, 168 F.3d 532, 53 5-36 (1st Cir.
1999) (off-site sorting of computer data permissible); United States v. Schandl, 947
F.2d 462 (11th Cir. 1991) (off-site sorting of computer storage media permissible).
That was the case here. The Affidavit contained the opinion of Detective Ford, a
cannot be readily accessed from the location the computer is seized from.” (Aff.
35
at 6.) Accordingly, Detective Ford concluded that the “computer will need to be
In United States v. Hill, 459 F.3d 966 (9th Cir. 2006), the court addressed
whether a search warrant was overly broad “because it authorized the officers to
seize and remove from [the defendant’s] home his computer and storage media
without first determining whether they actually contained” evidence of a crime. Id.
at 974. In Hill, the warrant authorized the search and seizure of “[a]n IBM ‘clone’
medium tower personal computer ... [and] [a]ll storage media belonging to either
.“
item . Id. The defendant contended that the waifant was overly broad
because “it authorized seizure of storage media whether or not they contained child
pornography,” and argued that the warrant should have authorized “seizure only of
Id. The court also rejected the argument that the police should have “brought their
own laptop computer” so they could have seized only the files that contained
illegal material. The court concluded that “the police were not required to bring
with them equipment capable of reading computer storage media and an officer
36
competent to operate it.” Id. at 975. Such a requirement, the court recognized,
would create “significant technical problems,” make the search “more intrusive,”
and create significant risks that the search “might damage the storage medium or
compromise the integrity of the evidence by attempting to access the data at the
scene.” Id.. Additionally, the court found that “the process of searching the files at
the scene can take a long time,” which would impose a “significant and unjustified
burden on police resources” and “also make the search more intrusive.” Id. Based
on these considerations, the court ruled that “the warrant was not fatally defective
In this case, as in Hill, the Sheriff adopted the most feasible, least
obtaining the Warrant, the Sheriff explained why it was necessary to remove the
media off-site to protect them. In executing the Warrant, the Sheriff removed all
computer media so they could be sorted, protected and preserved properly. The
off-site activities of the Sheriff were limited to sorting the media storage devices
9
T he court upheld the warrant at issue even though the affidavit did not contain an
explanation why the seizure of the entire computer was necessary. The court
suggested in dicta, however, that such an explanation should ordinarily be
contained in the supporting affidavit. Here, the Affidavit explains the necessity for
the seizure. ($ç Trans.No.23477721,Aff. at 6.)
37
into those that contained tax records and those that did not. The Sheriffs Office
promptly returned the storage devices that did not contain tax records without
included creating an image of the computer hard drive — and then returned the
the Sheriff did not search the computer media. It is hard to understand what more
the Sheriff could have done — other than to ignore the records showing criminality
of those whose records did not fall within the scope of the Warrant.
As shown above, the Waifant, and the Search, satisfied the requirements of
the Constitutional Provisions. But even if that were not the case, the court erred in
ordering the return of all of the documents seized. Absent a flagrant disregard of
the constitutional rights of Cerrillo and the Customers — which does not exist here
— the remedy for an excessively broad Warrant or seizure is to suppress only the
10 customer list on the computer hard drive was also copied to a disk, although it
A
was not otherwise searched. The customer list falls within the scope of the
Warrant. (See Trans.No.23477721,Warrant ¶J2, 3.)
38
A. The Remedy for an Insufficiently Particular Warrant is Return of
the Evidence Seized Improperly, Not a Return of All Evidence.
defective), it does not render the entire warrant invalid. Rather, under the
“severance” rule, the insufficient portion of a warrant may be severed, leaving the
remainder intact:
United States v. Fitzgerald, 724 F.2d 633, 637 (8th Cir. 1983) (en banc). Colorado,
along with all federal circuit courts, has explicitly adopted the severability rule.
People v. Eirish, 165 P.3d 848, 856 (Colo.App. 2007) (collecting cases).
As shown above, each portion of the Warrant complied with the particularity
requirement and was supported by probable cause. Even if the Court were to
determine otherwise, however, the remedy would not be the wholesale return of
everything that was seized that the court ordered. Rather, the proper remedy would
be the return of only the items seized pursuant to the defective portion of the
Warrant. For example, if the Court were to rule that the portion of the Warrant
39
authorizing seizure of computer equipment was invalid, such a holding would not
The same rule applies generally with respect to the seizure of evidence that
falls outside the scope of a warrant. As the Maryland Court of Appeals concluded
Klingenstein v. State, 624 A.2d 532, 536 (Md.App. 1992) (and cases cited therein).
Some courts, including the Tenth Circuit, have created an exception to the
general rule where “there was a flagrant disregard for the terms of the warrant.”
llgrgM, 128 F.3d at 1363. These courts hold that the where police officers
executed a warrant with flagrant disregard for its limits, the exclusion of all seized
evidence is justified. See United States v. Foster, 100 F.3d 846, 852 & n.9
requirement of search warrants and to seize anything of value”). But as the Foster
40
court emphasized, “the extreme remedy of blanket suppression should only be
Here, Cerrillo and the Customers cannot point to any flagrant disregard of
the scope of the Warrant that would make this one of the “most ‘extraordinary’ of
cases.” To the contrary, the undisputed evidence establishes that the Sheriffs
actions were motivated by practical concerns, and that a diligent effort was made
to comply fUlly with the applicable constitutional requirements. The Foster court
has specifically suggested that such actions do not justify the “extreme remedy of
blanket suppression.” at 852 n.9 (citing Tamura, 694 F.2d at 597 for the
the Sheriff erred in seizing records that were outside the scope of the Warrant, the
CONCLUSION
For the reasons set forth above, the DA and Sheriff request the Court to
reverse the court’s grant of a preliminary injunqtion to Cerrillo and the Customers,
and to rule that the Warrant and the Search satisfied the requirements of the
41
_______________
rule that only the documents or equipment improperly searched or seized must be
returned to Cerrillo, and the properly seized and searched documents and
By:
42
CERTIFICATE OF SERVICE
The undersigned hereby certifies that on this 3rd day of August, 2009, a true
and correct copy of the foregoing OPENING BRIEF OF APPELLANTS-
RESPONDENTS was delivered via hand delivery to:
N. Reid Neureiter
Elizabeth L. Harris
Jacobs Chase Frick Kleinkopf& Kelley, LLC
1050 17th Street, Suite 1500
Denver, Colorado 80265
Mark Silverstein
Taylor S. Prendergrass
American Civil Liberties Union Foundation of Colorado
400 Corona Street
Denver, Colorado 80218
Shannon Lyons
Collins, Liu & Lyons LLP
812 8th Street
Greeley, Colorado 80631
Thomas J. Lyons
Hall & Evans, L.L.C.
1125 17th Street, Suite 600
Denver, CO 80202-2052
Melissa Nelson
Paralegal
43