FBI BRIEFING ON COMPUTER CRIME

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89B01356R000100140029-3
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
16
Document Creation Date: 
December 23, 2016
Document Release Date: 
December 2, 2011
Sequence Number: 
29
Case Number: 
Publication Date: 
September 11, 1987
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP89B01356R000100140029-3.pdf1.13 MB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 OS REGISTRY 15 SEP 1987 11 SEP 1887 STAT MEMORANDUM FOR: Director of Information Technology, DA Chief, Information Management Staff, DO Chief, Counterintelligence Staff, DO Director o Security STAT SUBJECT: FBI Briefing on Computer Crime 1. I have made arrangements for Mr. George Lane, who is an FBI agent, to brief us on gathering evidence in computer crime. Bill Donnelly heard Mr. Lane's briefing at a recent National Telecommunications Information Systems Security Committee (NTISSC) meeting and suggested the message was one that should be shared. Mr. Lane will be speaking to us on 22 September at 1000 hours You and two or three members o your staff are invited to loin me. 2. Attached are two documents relevant to this topic. STAT Attachments cc: DDA STAT OS/ISG, Retyped:0 D Sec:rjw (11 Sept 87 Distribution: 0 - D/OIT/DA 0 - C/IMS/DO 0 - C/CI/DO 1 D/Sec Ewoeter} OS Registry 1 - DD/PTS 1 - ISG Subj 1 - ISG Chrono (w/o atts) 1 - DDA (9 Sept 87) ADMINISTRATIVE - INTERNAL USE ONLY Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 STAT Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Next 21 Page(s) In Document Denied Iq Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 dosja0 Mg @@4 Raiding the Computer Room Fourth Amendment Considerations (Part I) "Computer-related crimes present new challenges in the establishment of probable cause...." For several decades, electronic computing machines have been changing the world. Businesses now record their activities by computer, law enforcement agencies maintain crimi- nal records by computer, children are entertained by computer-driven elec- tronic games, and authors process their words by computer. Even tasks such as medical diagnoses are being performed with the aid of computers. In the last decade, the prolifera- tion of low-cost "home computers" has facilitated the spread of computer power and knowledge to vast numbers of citizens. Thus, it should be no sur- prise that criminals have begun to use computers to commit crimes and to record the activities of their criminal enterprises. Consequently, law en- forcement officers are finding it in- creasingly necessary to search for, ex- amine, and seize computers and computerized records in successfully investigating and prosecuting many criminal acts. While conducting investigations of computer-related crimes, officers must comply with an 18th century prohibition against "unreasonable searches and seizures"' and contend with 20th cen- tury electronic technology. For exam- ple, investigators may at times find themselves searching for intangibles rather than familiar physical evidence, such as guns or stolen stock certifi- cates. As one court has noted, the tar- get of a search may be "records [that) exist as electronic impulses in the stor- age banks of a computer.,2 This new technology creates the possibility of a criminal armed with a home computer in Wisconsin contacting a computer in New York by telephone and illegally causing funds to be transferred electronically to a bank account in France. Regardless of these techno- logical advances, search and seizure by law enforcement officers continues to be governed by the fourth amend- ment to the U.S. Constitution.3 This two-part article will examine issues that arise when officers seek a warrant to search and seize a com- puter and the information it has proc- essed. Part I will address the applica- tion of the fourth amendment warrant requirement to computer-related searches, focusing on special prob- lems officers may encounter in estab- lishing probable cause to search and particularly describing the computer equipment to be seized. Part II will ad- dress the description of computer- processed information to satisfy the particularity requirement and then consider issues that may arise in the execution of a warrant authorizing the seizure of a computer and computer- processed information. By JOHN GALES SAULS Special Agent FBI Academy Legal Counsel Division Federal Bureau of Investigation Quantico, VA Law enforcement officers of other than Federal jurisdiction who are interested in any legal issue discussed in this ar- ticle should consult their legal adviser. Some police procedures ruled permis- sible under Federal constitutional law are of questionable legality under State law or are not permitted at all. (Published by the Federal Bureau of Investigation, U.S. Department of Justice) Reprinted from the FBI Law Enforcement Bulletin, May, and June 1986. Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 WARRANT REQUIREMENT The fourth amendment protects the right of the people to be "secure in their persons, houses, papers and ef- fects" against unreasonable Govern- ment intrusion.4 This protection ex- tends to computers, which are effects, and to information processed by this electronic technology, which can be categorized as papers. The constitu- tional demand upon the officer seeking to seize a person's computer or com- puterized information is that the sei- zure be reasonable.' The U.S. Su- preme Court, in establishing guidelines for reasonable searches and seizures, has stated a preference that they be made pursuant to a judicially issued search warrant. The "Constitution re- quires that the deliberate, impartial judgment of a judicial officer be inter- posed between the citizen and the po- lice ... searches conducted outside the judicial process, without prior ap- proval by judge or magistrate, are per se unreasonable under the Fourth Amendment-subject only to a few specifically established and well- delineated exceptions."6 This require- ment that a warrant be obtained prior to a search or seizure is applied with special strictness where business or residential premises, the places com- puters are most likely to be located, must be entered to perform the search The fourth amendment sets forth cer,a,n procedural requirements that must r met if a valid warrant is to be issued There must be a showing of probable cause supported by oath or affirmation, and the warrant must par- ticularly describe the place to be searched and the persons or things to be seized.8 In addition, the Supreme Court has held that the probable cause determination must be made by a neu- tral, detached magistrate.9 The re- quirements of oath or affirmation and of presentation to a neutral, detached magistrate raise no special problems where computer searches are con- cerned; however, the probable cause and particularity requirements pose unique problems where computers are the search target, and these issues merit discussion. Probable Cause To Search Central to the protections provided to citizens by the warrant requirement is the command that no warrants shall issue but upon probable cause.10 This language has been interpreted to re- quire that before a search warrant may be issued, the Government must set forth facts that would cause a reason- able person to conclude that it is prob- ably true that (1) a crime has been committed, (2) that evidence of that crime is in existence, and (3) that the evidence presently exists at the place to be searched." Obviously, satisfying this requirement necessitates the col- lection and presentation of information, and law enforcement officers perform this task daily in regard to numerous crimes. Computer-related crimes pres- ent new challenges in the establish- ment of probable cause though, be- cause of the unfamiliar technology involved. Although a magistrate likely already understands how a murder may be committed with a gun, he may require considerable explanation be- fore finding that an embezzlement was committed by means of a computer. The problem is largely an educational one. Inasmuch as computers may be used in a wide variety of criminal en- deavors, ranging from fraud to espio- Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 "... an officer seeking to convince a magistrate that a novel crime has been committed should use care to ensure that the explanation of the mechanics of the crime is clear and easily understood." nage, it is difficult to state concisely An example of an officer success- Obviously, an officer seeking to what is required to satisfy the probable fully obtaining a search warrant in a convince a magistrate that a novel cause requirement in a computer- case where new technology was being crime has been committed should use related crime. In general, probable employed to commit the crime of fraud care to ensure that the explanation of cause will be established just as it is found in the case of Ottensmeyer v. the mechanics of the crime is clear would in a case where no computer Chesapeake & Potomac Telephone and easily understood. If the officer was involved, except that additional Co. 14 Ottensmeyer, who ran a tele- wishes the magistrate to consider the facts will have to be presented regard- phone answering service, decided to officer's interpretations of the facts he ing the role of the computer in the provide an alternative to his customers has observed, he must inform the criminal activity. to normal, commercial long-distance magistrate in his affidavit of the experi- telephone service. He found a ence and training that accredit these That a Crime Has Been strategically located town that enjoyed interpretations. Consideration of such Committed nontoll calling service to a larger city inferences by a magistrate determining The first hurdle in establishing on either side, despite the fact that a probable cause has been approved so probable cause to search is call from one of the larger cities to the long as the officer sets forth the train- articulating facts to indicate that a other was a toll call. Ottensmeyer in- ing and experience upon which they crime probably has been committed. In stalled an electronic device in the are based." determining what additional facts a small town that allowed a customer in An officer seeking to establish magistrate will need to make such a one of the large cities to "patch" a call probable cause where the crime is un- finding where a computer is involved in to the other large city through the de- usual or unfamiliar may also elect to the crime, it is helpful to examine the vice, thereby avoiding a toll call and use the services of an expert. An ex- role played by the computer in the defrauding the phone company of rev- ample of using information provided by criminal activity. For example, where a enues to which it was entitled. experts in affidavits for search war- computer is stolen, the crime is the The investigator, a police officer rants is found in United States v. same as any other theft, and the re- who had special training in electronic Steerwell Leisure Corp., Inc.18 quired factual showing, describing the technology and telecommunications, Steerwell was charged with infringing computer as the object of the crime, sought a warrant to search the prem- upon the copyrights of a number of would likewise be the same. Where a ises where the "patching" device was electronic video games, and the ques- computer is used as a tool to commit a located. In his affidavit, the officer "in- tion of whether a crime had been crime, facts must be presented to formed the judge of his experience in committed turned on whether the show the crime was committed and to the electronic field and of his inde- games Steerwell was distributing were explain how the computer was used in pendent investigation and con- sufficiently similar to the copyrighted the commission. Because. computer clusions."15 The officer articulated facts games to violate the copyright statute. systems are commonly installed so that explained how the scheme to de- The affidavits to support search war- they may be used from distant loca- fraud functioned, and drawing on his rants presented the magistrate with re- tions by means of electronic communi- expertise, cited inferences he had sults of expert analysis in comparing cation over telephone lines, novel drawn from the facts he had observed. the games distributed by the defend- criminal opportunities have been The warrant was issued and the ants with the copyright-protected created.12 Valuable data may be search performed.16 transferred from one computer to an- games. In determining the validity of other or modified to achieve advantage the warrants issued on those affidavits, the court concluded that the magistrate for the computer criminal." Inasmuch was entitled to accept the conclusions as the means used to commit these of the experts, but noted the "magis- crimes are unfamiliar, the officer must trate's determination of probable cause convince the magistrate that such a would be facilitated if the agents' affi- crime has been committed by detailing davits contained more details concern- how it was committed. ing the comparisons between pro- tected games and infringing games."19 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 "The primary rule of particularity should be to make the description of the items to be seized as precise as the facts will allow." The court also made reference to the importance of explaining to the magis- trate how the crime was committed, in this case by duplication of the circuit boards that control the action of elec- tronic games.20 Again, the task of the officer includes providing sufficient technical details in layman's terms to familiarize the magistrate with the me- chanics of an unusual crime. That Evidence of the Crime Exists The second hurdle for an officer seeking to establish probable cause to search is setting forth facts to convince a magistrate of the probability that evi- dence of the crime exists. Where a computer is stolen, the stolen com- puter is evidence of the crime. If the theft is established factually, then the existence of the computer as evidence is likewise established. Similarly, where facts establish that a computer was used to commit a crime, the same facts establish that the computer used was an instrumentality of the crime. This was demonstrated in the Steerwell Leisure Corp. case where if the magistrate found that the circuit boards in question violated the copy- right laws then the boards would also constitute evidence of that violation.21 Where an investigator seeks to establish that computerized records of criminal activity are in existence, his task is essentially the same as estab- lishing the existence of noncomputer- ized records. He must factually estab- lish that records of the criminal activity have probably been created and re- tained. There is authority for the posi- tion that it is unnecessary to establish factually in the affidavit the physical form in which the records sought are expected to be found.22 If the officer can establish factually the creation and retention of the records, he need not specify (or know) whether they are be- ing maintained in written, magnetic, or some other form. In United States v. Truglio, audio cassettes were seized during the execution of a search war- rant authorizing the seizure of "... books, records, indices, movies re- garding the interstate prostitution oper- ation located at the King of the Road Health Club... .,,23 in approving seizure of the audio cassettes, the court noted that "it would have been more precise for the warrant to have specified 'writ- ten or electronic records,' " but then stated that "[sjtandards of pragmatism and commonsense must necessarily be adaptable to changing times and technological advances."24 The court concluded by saying that "[w]hile dec- ades ago it might have been difficult reasonably to infer that records existed in some form other than written, in the mid-1980's commonsense demands that we refrain from remaining so inflexible. ,25 That Evidence of the Crime Pres- ently Exists at the Place to be Searched Finally, the investigator seeking to establish probable cause to search must factually establish the probability that the evidence sought is presently located at the place he is seeking au- thorization to search. Whether this re- quirement of recent information has been met is "... determined by the cir- cumstances of each case."26 As stated by the U.S. Supreme Court, "[t]he task of the issuing magistrate is simply to make a practical, commonsense deci- sion whether, given all the circum- stances set forth in the affidavit before him ... there is a fair probability that ... evidence of a crime will be found in a particular place."27 The requirement for recent infor- mation is easily satisfied where the in- vestigator can set forth reliable infor- mation that the object sought has been recently observed at the proposed search site. Where such facts are not available, other facts must be used to infer that the items to be seized are presently at the place to be searched. At times, having a computer or its rec- ords as the target of the search may simplify meeting this requirement. If a computer has been used to commit a crime telephonically, it is possible that it has also been set up to "answer" in- coming calls, to allow other computer operators to call it using their computer terminals and a telephone. If such an operation exists, an incoming call will be answered with a tone called a "carrier."28 When a particular phone is answered with a "carrier," it seems reasonable for a magistrate who has been informed of the significance of the "carrier" to find that a computer and related equipment are probably present at the location of the telephone. A somewhat analogous case in- volved a search warrant issued for the seizure of a "blue box," an electronic device used to create tones on the tel- ephone system to facilitate the making of long-distance calls without being billed for the toll charges.29 In this case, tones such as those produced by a "blue box" had been monitored by the telephone company on a particular telephone for a period of weeks, end- ing the day prior to the issuance of the warrant. This information was related to the magistrate in the affidavit. In Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 upholding the validity of the resulting search warrant, the court concluded that "[t]he affidavit set forth substantial information establishing clear probable cause to believe that a device emitting a 2600 cycle tone and Southwestern Bell multifrequency tones was being utilized ... at [the] residence. ,30 Where computerized records are sought, the magistrate should consider that records by their nature are created to be kept for at least a minimum pe- riod of time, along with the other facts presented, in determining whether the records are presently at the place to be searched .$1 Although each case must be evaluated on its own facts, the U.S. Supreme Court and lower courts have held that under certain circum- stances, it is reasonable to expect that records seen 3 months previously will still be present at that same location.32 Particularity The fourth amendment commands that "no warrants shall issue except [those] ... particularly describing the place to be searched and the persons or things to be seized."33 This provi- sion requires that a warrant authorize only a search of a specific place for specific named items. Coupled with the probable cause requirement, this provision prevents general searches by ensuring that the warrant describes a discrete, defined place to be searched, describes only items con- nected with criminal activity for which probable cause has been established, and describes the items so definitely that it removes from an officer executing the warrant the discretion of determining which items are covered by the warrant and which are not.34 It also provides a signal of when a search is at an end, that is, when all items named in the warrant have been located and seized or when all possi- ble hiding places for items not located have been explored.35 Since the "place to be searched" portion of the particu- larity requirement has no special im- pact on computer searches, it will not be discussed. However, the "things to be seized" portion of the requirement has a marked impact in seeking a war- rant to authorize the seizure of a com- puter or information processed by a computer. This portion will be exam- ined in regard to both the computer and the processed information. Describing the Computer The primary rule of particularity should be to make the description of the items to be seized as precise as the facts will allow. A court measuring the particularity of a description in a search warrant may consider what facts could reasonably be known by the investigator at the time application for the warrant was made, so long as the investigator includes all the facts known to him in the affidavit.36 Conse- quently, the circumstances of each case can help determine whether a de- scription is sufficiently particular. The nature of the item sought also is con- sidered in determining the degree of particularity required. A less precise description is required of items which are contraband, such as controlled substances.31 Conversely, greater par- ticularity is demanded when the item sought is of a type in lawful use in sub- stantial quantities.38 Generally, where computer equipment is sought for sei- zure pursuant to a search warrant, a quite particular description will be required. Where a computer has been re- ported stolen, it is reasonable to ex- pect that the owner will provide a de- tailed description of the stolen item. Therefore, if the object of the search is a stolen computer, a detailed descrip- tion, including manufacturer, model number, and serial number if known, will probably be required. This is espe- cially true if the computer sought is a type commonly in lawful use. Care should be taken to ensure all available descriptive information is included. Where computer equipment is sought because it was used as an in- strumentality to commit a crime, the most precise description the facts will allow may be a more general one.39 Where a victim complains that his computer system has been accessed telephonically by an unknown person and a loss has resulted, it is likely that the investigator will only be able to de- termine generally what types of de- vices were used to accomplish the crime. He may, for example, learn that a computer terminal (a keyboard and display monitor) and a modem (a de- vice that allows digitally encoded com- puter information to be transmitted over telephone lines) were necessary to perform the acts accomplished, but will have no information regarding the manufacturers of the equipment, model numbers, or serial numbers. If a telephone trace reveals the location from which the intruding call origi- nated, the investigator may have prob- able cause to search. Under these cir- cumstances, the general description of "a computer terminal and a modem of unknown make or model" may suffice. An analogous case is State v. Van Wert,40 where police had probable cause to believe Van Wert was using equipment to forge checks. A search warrant was issued authorizing the sei- zure of "check protectors and typewrit- ers used in preparation of forged checks." The court approved use of this general language based upon the nature and information known con- Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 "Where a computer is used as a tool to commit a crime, facts must be presented to show the crime was committed and to explain how the computer was used in the commission." cerning the crime, stating that greater particularity "... was not needed in this case where defendant was under in- vestigation for forgery rather than theft of a certain item .,,41 Similarly, the warrant in United States v. Harvey authorized the sei- zure of "a 'blue box,' an electronic de- vice that allows a caller to make long distance calls without them being re- corded for billing by the telephone company."42 The Agents executing this warrant ultimately seized audio cassette tapes that had tones such as those produced by a "blue box" re- corded on them. The court noted that the affidavit clearly established that a device emitting "blue box" type tones was being used at the place to be searched and then addressed the par- ticularity question, observing that "[n]either the Southwestern Bell offi- cials nor the FBI Agents knew the ac- tual physical form which the device would take, and they assumed it would be in the form familiar to their research and experience...."43 The court, in ap- proving the seizure, said, "[t]he cas- sette tapes constituted 'an electronic device that allows a caller to make long distance phone calls without them being recorded for billing by the tele- phone company' and were thus prop- erly seized as within the limitations of the warrant. "40 Since computer systems are often comprised of a number of component parts,45 an investigator applying for a warrant to seize a computer should en- sure that the warrant describes all parts of the computer system that are probably present, as well as the vari- ous types of storage devices upon which the machine's operating instruc- tions (computer programs) are main- tained. It is prudent to consult an ex- pert concerning the items to be listed. Equipment components will probably include a central processing unit, print- ers, terminals (keyboards and display screens), magnetic tape drives, and magnetic disc drives. Storage media will include magnetic tapes, magnetic discs, punched cards, and paper tapes. Computer printouts will also likely be present.46 If information that has been processed is being sought, it is especially important to particularly describe the storage media. Consulta- tion with an expert will increase the likelihood of a thorough listing of the items of evidence probably present, and provided the expert's education and experience are set forth in the affi- davit, will give the magistrate a sound basis for concluding that the items sought are probably located at the place to be searched. Part II of this article will conclude the particularity analysis and discuss problems with executing this type of search warrant. Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 "... the legal standard by which ... searches and seizures [of computers and computerized information] will be measured is the same as is applied to searches less concerned with modern technology." Part I of this article examined the fourth amendment's requirements of establishing probable cause and par- ticularly describing the items to be seized in affidavits which support war- rants to search and seize computers and computer-processed information. Part I concluded with the particular de- scription of computer equipment. Part II continues with a consideration of the particularity requirement as applied to computerized information and a dis- cussion of fourth amendment stand- ards regarding execution of search warrants on computer facilities. Describing Computer-Processed Information Officers seeking to describe par- ticularly information that has been processed by a computer face two sig- nificant obstacles. The first obstacle is explaining in an affidavit for a search warrant that records being sought may be contained in sophisticated techno- logical equipment. For example, digital computer systems store and process information in the form of electronic impulses." For these purposes, this information is encoded into the binary number system, a "language" com- prised only of the characters zero and one.48 Since, for the officer seeking authority to search and seize and the court reviewing his application, "infor- mation (either numbers or text) in bi- nary form is useless unless it can be decoded,"?9 describing computerized information in its encoded form is not meaningful. Fortunately, therefore, for officers drafting search warrant appli- cations, this first obstacle is easily overcome, since officers are not re- quired to confront the technological re- alities of what occurs when information is transformed into an electronic rec- ord. They can simply state that the in- formation sought may be in electronic or written form. It is the information itself that must be described with particularity, rather than the form in which the information may be found. Thus, if what is sought is "a letter from John Jones to Bill Smith dated November 9, 1985, and concerning the ownership of 200 shares of IBM stock," the letter should be described in those specific terms. The descriptive problem regarding whether the letter should be found in the form of paper with writing on it or magnetic tape electronically inscribed with binary code is solved by using more general terms. Concluding the description of the letter and similar items with the statement that "the rec- ords sought are 'written or electronic' " should be sufficient to permit lawful Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 seizures of the documents in either for segregating the 'innocent' from the form, if the information sought is itself 'culpable' in the form of requiring a (as in the letter example) described connection with [the] specific, identifia- with sufficient detail.50 As previously ble crime [of loansharkingj."56 Approv- noted, the storage media (magnetic ing the particularity of the warrant, the discs, etc.) which could contain the in- court stated, "... most important, it i9 formation in electronic form should difficult to see how the search warrant also be described as concisely as the could have been made more facts known will allow. precise."57 The more-difficult obstacle then is The task of the officer is to de- particularly describing the information scribe the information sought with suf- which is the object of the search. Infor- ficient particularity to avoid a forbidden mation, whether recorded in written or "general" warrant. If he is aware of electronic form, is generally collected specific documents sought, he should into documents. Documents are what designate them by type (letter, memo, officers usually describe in warrants etc.), date, subject, author, addressee, authorizing the seizure of information. providing as much detail as possible. Because the particularity requirement The earlier description of the letter re- is strictly applied where documents are garding ownership of IBM stock is an concerned,51 the descriptive task is of- example of this technique. ten a demanding one. Nonetheless, Where only the general nature of courts reviewing applications for the information sought is known, a search warrants evaluate the particu- highly detailed description is impossi- larity of the description of a document ble. In such cases, officers must use in light of the degree of precision the gYeat care to give a description that in- facts of a case will allow.52 The officer cludes the information sought but limits must be as precise as possible in the search as narrowly as possible. describing a document, consistent with This is accomplished by use of a gen- the facts that are available to him. The eral description that is qualified by detailed description is required some standard that will enable the whether the information is computer- executing officers to separate the infor- ized or not. mation to be seized from innocent in- For example, in the United States formation that may also be present. v. Timpani,53 a search warrant This qualifying standard is known as a authorizing the seizure of "... any and limiting phrase. all records relating to extortionate The limiting phrase must be credit transactions (loansharking) crafted based on the facts establishing ..."54 was challenged as being insuffi- probable cause to search. If the facts ciently particular. In reviewing the war- establish that the information sought rant, the- court noted that the warrant comes from a particular time period, included a lengthy list of types of rec- the phrase should limit the warrant to ords (including "... lists of loan cus- information of that time period. If the tomers, loan accounts, telephone num- information sought is known to have bers, address books ..."B5) and that been produced by a particular individ- the warrant "... provide[d] a standard ual, the phrase should limit the de- scription to material authored by that person. If the phrase combines sev- eral such factors, it is even more ef- Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 " .. it is often desirable to incorporate the affidavit into the warrant by appropriate language and to'attach the affidavit to the warrant." fective. As in United States v. Tim- layouts, computer tape printouts, Of- for the premises of Lloyd, Carr & Com- pani, the phrase may restrict the de- fice of Education (HEW) documents pany, a commodities brokerage firm. scription to particular criminal conduct. and forms ... which constitute evi- The warrant authorized the seizure of In that case, the limiting phrase was dence of the commission of violations "Lloyd, Carr's bank statements, casks "... records relating to extortionate of the laws of the United States, that is receipt books, option purchase rec- credit transactions (loanshark- violations of 18 U.S.C. Sections 286, ords, sales material distributed to cus- ing).... "S8 It is most important that the 287, 371, 1001, and 1014...."61 The tomers, employee compensation rec- limiting phrase restrict the scope of the probable cause in this case related to ords, customer account records, sales search so that it remains within the frauds pertaining to the FISLP. The training material and customer lists."65 bounds of the probable cause set out court, in invalidating the search war- Noting that the described items consti- in the affidavit. The warrant may not rant, criticized the limiting phrase be- tuted most of the business records of authorize the seizure of items for cause it allowed seizure of items for the company, the court nonetheless which probable cause to search has crimes beyond the scope of the proba- upheld the warrant's particularity, since not been established. In upholding the ble cause established. The court the affidavit's facts "... warranted a description of items in the warrant in stated, "[tihe warrant is framed to allow 'strong belief that Lloyd, Carr's opera- the Timpani case, the court noted that seizure of most every sort of book or tion was, solely and entirely, a scheme "[ejach item is plausibly related to the paper at the -described premises, lim- to defraud...."86 Since the facts in the crime-loansharking or gambling-that ited only by the qualification that the affidavit established that all of the rec- is specifically set out [in the affida- seized item by evidence of violations ords of the business probably were ev- vitj."59 The description, even though of the laws of the United States, that is idence of the crime being investigated, the items to be seized were described violations of 18 U.S.C. Sections 286, the scope of the description was suffi- in generic terms, did not exceed the 287, 371, 1001, and 1014.' The cited ciently particular. In upholding the va- probable cause because of the use of statutes, however, penalize a very lidity of the warrant, the court stated, an appropriately narrow limiting phrase. wide range of frauds and conspiracies. " .. where there is probable cause to In Application of Lafayette Acad- They are not limited to frauds per- find that there exists a pervasive emy, Inc.,60 a case involving a search taining to FISLP, and there is no indi- scheme to defraud, all the business for computerized information, the infor- cation from the warrant that the viola- records of an enterprise may be mation sought was described in gen- tions of federal law as to which seized, if they are, as here, accurately eral terms with the inclusion of a limit- evidence is being sought stem only or described so that the executing offi- ing phrase, but the phrase was not indeed at all from Lafayette's participa- cers have no need to exercise their made sufficiently narrow. Lafayette tion in FISLP. Thus, the warrant pur- own judgment as to what should be Academy, Inc., was being investigated ports to authorize not just a search and seized."67 for fraudulent activities in connection seizure of FISLP-related records as The items to be seized should be with their participation in the Federally the government contends but a gen- described as precisely as the facts will Insured Student Loan Program eral rummaging for evidence of any allow, and items for which probable (FISLP). The warrant authorized sei- type of federal conspiracy or fraud."62 cause to search has not been estab- zure of "books, papers, rosters of stu- The court continued that "... the pre- lished should not be included. An inno- dents, letters, correspondence, docu- cise nature of the fraud and conspiracy vative means of limiting the items de- ments, memoranda, contracts, offenses for evidence of which the scribed to those for which probable agreements, ledgers, worksheets, search was authorized-fraud and cause to search has been established books of account, student files, file conspiracy in the FISLP-needed to is found in the case In Re Search War- jackets and contents, computer tapes/ be stated in order to delimit the broad rant Dated July 4, 1977, Etc-68 Here, discs, computer operation manuals, categories of documentary material the scope of the description of items to computer tape logs, computer tape and thus meet the particularity be seized was limited to documents re- requirement...."63 lated to "the crimes ... which facts re- Occasionally, the nature of the cited in the accompanying affidavit probable cause will allow a very broad description. In United States v. Brien,64 a search warrant was issued Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 make ."69 The court, in upholding the warrant, noted with ap- proval the limiting phrase. As was done in this case, it is often desirable to incorporate the affidavit into the war- rant by appropriate language and to at- tach the affidavit to the warrant. Offi- cers preparing search warrants for computerized information should con- sider the use of this procedure. EXECUTING THE SEARCH WARRANT The protection of the fourth amendment does not end when an of- ficer obtains a valid search warrant. The right of citizens to be free of "un- reasonable searches and seizures" ex- tends to the manner in which a search warrant is executed.70 For the search to be lawful, it must be done in a rea- sonable manner .71 The U.S. Supreme Court has recognized the flexibility of this standard, stating "[t]here is no for- mula for the determination of reasona- bleness. Each case is to be decided on its own facts and circumstances."72 Perhaps because of the vagueness of this standard, certain statutes also reg- ulate the action of officers executing search warrants.73 Generally, officers must give no- tice of their authority and purpose prior to entering premises to execute a search warrant.74 Once inside, the ac- tions taken to secure control of the premises and prevent destruction of evidence must be reasonable under the circumstances.75 The search itself must be performed within the scope of the warrant,76 and care must be taken to cause no unnecessary damage dur- ing the search.77 Finally, only items named in the search warrant may be seized, subject to a limited exception, the "plain view" doctrine.78 These as- pects of execution will be examined as they relate to computer searches. The Announcement Requirement To protect the privacy interests of citizens and the safety of both occu- pants of premises and the officers making entry to execute a warrant, offi- cers are generally required to knock and announce their identity and pur- pose before forcibly entering premises to perform a search.79 This require- ment is subject to certain exceptions which allow entry without notice under some circumstances.80 The exceptions include situations where the an- nouncement would jeopardize the safety of the officers or others and where it would likely result in the de- struction of evidence.81 This latter ex- ception, destruction of evidence, be- comes relevant in searching for computer-processed information. Due to the manner in which it is processed and stored, computerized information is easily and quickly de- stroyed. As previously discussed, in- formation is encoded into the binary number system for processing pur- poses. This encoded information may then be stored in the computer's inter- nal memory or on magnetic or other external storage media.82 Generally, the internal memory is used to store data that must be immediately accessi- ble to perform the tasks for which the computer is presently being used. Be- cause any power interruption will result in the loss of information stored in the computer's internal memory. important information is usually duplicated and stored on an external storage device, such as a magnetic tape or disc. Infor- mation that is in the computer's inter- nal memory that has not been "backed-up" by more permanent exter- nal storage may be destroyed in the in- stant it takes to flip a power interrup- tion switch. Depending on the memory capacity of the computer, a considera- ble amount of information may be lost in this manner. Personal computers with internal storage capacities equal to 200 double-spaced typewritten pages are now common, and larger computers have much greater internal memory capacity. Information stored externally, especially if a magnetic storage medium is used, is likewise subject to rapid destruction. A device known as a degausser can instantly erase millions of data characters from a tape or disc.83 A pre-entry announcement is not required where officers know facts that cause them to reasonably believe that the making of an announcement will result in the destruction of evidence.84 The ease and rapidity of destruction of the evidence sought is a factor courts will consider in determining whether a "no-knock" entry was reasonable.85 Consequently, where officers know prior to execution of a warrant that in- formation sought has been stored by computer and that persons with a mo- tive to destroy the information are likely present at the place to be searched, an unannounced entry is likely reasonable.86 The announcement requirement is less stringently applied where warrants are executed against business premises.87 Since computers are often located at businesses, this fact should also be considered in determining whether a pre-entry announcement is required. Another alternative to the an- nounced entry may exist when search- ing for processed data. Where compu- terized information is the target of the search, technology may allow the exe- cution of the search without any physi- cal entry. If the computer is one where access is available to persons with re- mote terminals via telephone lines, it is possible that the information sought Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 "Investigators executing a search warrant must use care to insure that the search is restricted to places where the items to be seized may be concealed." may be obtained by an expert who "breaks in" the system remotely, using his own terminal and telephone.88 Also, the electronic operations of some computer systems may be observed from as far away as one-half mile if the proper equipment is used.89 Presuma- bly, where no physical entry takes place, no announcement is required. Such searches do, however, fall within the application of the fourth amend- ment and its attendant requirements,90 and in most cases, a search warrant will be required for performing such a search.9' Additionally, some sort of no- tice to the operator of the computer that a search has been performed is likely required.92 Controlling The Premises The U.S. Supreme Court has noted the utility of officers who are executing a search warrant exercising "unquestioned command of the situation."93 Consequently, officers executing a search warrant have the power to control access to the prem- ises being searched and to control the movements of persons present to facil- itate the search and to prevent the re- moval or destruction of evidence. Due to the previously noted ease of de- struction of computerized information and the size and complexity of some computer facilities, the need likely will exist to quickly take control of a com- puter facility being searched. Actions taken to control the premises and pre- vent the destruction of evidence will be evaluated based upon the reasonable- ness of the actions under the circumstances. An example of this analysis is found in United States v. Offices Known as 50 State Distrib.,94 where a search warrant was executed on a building housing a large "boiler room" sales operation that was engaged in fraud and misrepresentation in selling its promotional merchandise. About 50 local and Federal officers entered the premises to perform the search. At least 300 employees were present. The warrant authorized the seizure of almost all business records present. Upon entry, the officers required all persons present to remain at desks or in their assigned work areas. No one was permitted to go to the restroom without an escort. The court, in upholding the validity of the execution of the warrant, noted, "[t]he breadth of the warrant ... rendered the execution of the warrant a most difficult task at best. Some control over the 300.. . employees was necessary for an or- derly search.,95 Searching Within The Scope Of The Warrant The requirement of a particular description of the items to be seized limits the allowable scope of a search in two ways. First, it restricts the places where an officer may look. An officer may look only in places where the item sought might reasonably be concealed.96 Second, it restricts the time of execution. An officer may only search under the authority of the war- rant until all named items have been located or seized or until all possible places of concealment have been explored.97 Failure to comply with ei- ther of these restrictions can result in an illegal, general search that violates the fourth amendment. Investigators executing a search warrant must use care to insure that the search is restricted to places where the items to be seized may be concealed. This can be quite difficult where records are sought and a great number of files are present. Regard- less of the difficulty, reasonable steps must be taken to ensure that the search is no broader than authorized by the warrant. A sensible first step is to make sure that all searching officers are aware of what items are listed in the warrant. In upholding the execution of the warrant in In Re Search Warrant dated July 4, 1977 Etc., the court noted the procedure followed in that case, saying, "[i]n preparation for the search the agents attended several meetings to discuss and familiarize themselves with the areas and docu- ments described in the search warrant and accompanying affidavit. They were instructed to confine themselves to these areas and documents in their search. During the search each agent carried with him a copy of the search warrant and its 'Description of Prop- erty' and could contact one of three persons on the scene who carried the supporting affidavit."98 In upholding a warrant execution in United States v. Slocum,99 the court also noted a pre- execution meeting.100 Familiarizing the search team with the language of the warrant will increase the likelihood that a search will be performed in a manner a court will deem reasonable. Once on the scene, the officers should continue to use care to restrict the search to the items listed in the warrant. A problem that frequently arises is that of sorting the items sub- ject to seizure from those that are in- nocently possessed. This problem is especially common in cases where business records are the target of the search. In all cases, officers must re- strict their search to places where the items named in the warrant are likely to be found and to limit the examina- tion of innocent items to an extent no greater than that necessary to deter- 11 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 mine whether the item being examined is one of the items named in the warrant.101 Again, the yardstick is reasonableness. In many cases, a simple sorting process will be upheld as reasonable. 102 In United States v. Slocum, a warrant authorizing the sei- zure of business records related to ille- gal importation of tropical birds was executed. The U.S. Court of Appeals for the 11th Circuit described the exe- cution process as follows: "... [T]he of- fices were a shambles and ... there was no apparent filing system: it was therefore concluded that it would be necessary to view each document to determine if it fell within the warrant. When an agent discovered a docu- ment that he or she believed covered by the warrant, the document was taken to one of four supervising agents who made the ultimate decision whether to seize the document. "l 03 The court approved use of "a common sense standard"104 in evaluating the reasonableness of the search method and noted that where a warrant author- izes the seizure of documents, "some perusal, generally fairly brief, was nec- essary in order for police to perceive the relevance of the documents to the crime.?t05 The court cautioned, how- ever, that "the perusal must cease at the point of which the warrant's inappli- cability to each document is clear."'06 In Re Search Warrant Dated July 4, 1977, Etc. also concerned the exe- cution of a search warrant requiring the examination of a multitude of docu- ments. Fifteen agents conducted a search which lasted 91h hours, during which they examined the contents of 93 file drawers, 14 desks, 3 bookshelves, and numerous boxes and piles of loose documents. The court described a systematic search where each document encountered was evaluated by search personnel to determine whether it fell within the de- scription of items to be seized con- tained in the warrant. The U.S. Circuit Court of Appeals for the District of Co- lumbia Circuit, in upholding the rea- sonableness of the search, noted that nothing in the record indicated a "gen- eral rummaging operation"107 had taken place and that the agents in- volved in the search had been "... ex- tensively briefed, instructed and supervised."'O' Search for documents stored in electronic form by a computer will re- quire use of the computer to view doc- uments on a display screen or to print them by means of a printer. A sorting process similar to that employed in a search for "ink on paper" documents would seem reasonable under the cir- cumstances. Such a sorting process was employed in United States v. Harvey.i09 There, an agent seeking, pursuant to a search warrant, an elec- tronic device that produced telephone switching tones discovered some cas- sette audio tapes. He played about 12 of the tapes on a cassette player on the scene and determined that 2 con- tained recorded telephone switching tones. These tapes were seized. The U.S. Court of Appeals for the Eighth Circuit held these tapes were "properly seized as within the limitations of the warrart "' Use of computer equip- ment !o r'x?9rr,ne computerized records should -owise be reasonable, since the records are otherwise incompre- hensible to the searchers. Obviously, certain operational knowledge regard- ing the computer equipment will be re- quired to perform this type of search. Under these circumstances, expert as- sistance during the search may be essential."' The sorting process, performed at the scene of the search, serves to pre- vent the seizure, and thus the denial of access and use by the owner, of inno- cent records. The mere fact that the sorting process is time consuming will not make a wholesale seizure of rec- ords reasonable. Obviously, where a valid warrant authorizes the seizure of all business records, no sorting is re- quired other than the elimination of nonbusiness records. 112 Otherwise, the reasonableness standard may re- quire an arduous sorting process. Thus, where agents seized 11 card- board boxes of computer printouts which were bound in 2000-page volumes. 34 file drawers of vouchers bound in 2000-page volumes. and 17 drawers of cancelled checks and hauled these records to another loca- tion where they sifted through them to extract the relevant documents (that were described in the search warrant) as a consequence of their determina- tion that sorting at the site of the search would take a very long time, the seizure was held to be an unrea- sonable one.' 13 Sorting at the scene of the search is generally required. Certain characteristics of compu- terized recordkeeping may result in dif- ferent treatment for computerized records.10 First, the storage capacity of some computerized systems is such that review of all documents stored in the system could take a very long time. Second, unlike with paper files, the number of investigators who may as- sist in the search is limited by the num- ber of computer terminals available for document display. Finally, where the records are stored magnetically, they may be quickly duplicated in their com- puterized form. Based on these con- siderations, it may be reasonable in some cases to duplicate the records quickly, leave copies for the use of the owner of the records, and seize the original records for later examination. Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 The likely legal concern in this situa- tion is that the innocent documents in- cluded in the records would be avail- able for unrestrained viewing by investigators resulting in a postponed "general search." A potential control for this problem would be continuing judi- cial supervision of the sorting process.' 15 Finally, when all items named in a warrant have been located and seized, the warrant provides no authority to continue the search. 116 Absent other legal justification, the search must terminate. Avoiding Damage During a Search A further. requirement for the rea- sonable execution of a warrant is that the officers take care to avoid unnec- essary damage to the property being searched and seized. Since computers are complex and fragile,17 considera- ble care must be exercised where one is seized. Expert assistance may be necessary to ensure a damage-free seizure. The "Plain View" Doctrine As previously noted, an officer executing a search warrant will fre- quently need to sort through informa- tion to determine what portion of it may be seized pursuant to the warrant. If, during the course of the process, the allowed limited perusal of information is sufficient to cause the officer to con- clude that the information is probable evidence of a crime, he is not required to leave the document behind, even through it is not described in the war- rant. He may seize it under the "plain view" exception to the warrant require- ment provided that he is lawfully pres- ent (searching reasonably within the scope of the warrant), it is readily ap- parent that the document is evidence, and the discovery of the document is "inadvertent" (that is, the officer did not possess probable cause to search for the document prior to beginning the search he is presently engaged in).18 CONCLUSION Since judicial guidance is still lim- ited in the area, investigators seeking and executing search warrants authorizing the seizure of computers and computerized information are on untested ground. However, the legal standard by which such searches and seizures will be measured is the same as is applied to searches less con- cerned with modern technology. Care- ful adherence to established fourth amendment principles, coupled with the use of expert assistance where needed, will enhance the likelihood of obtaining computerized evidence that is judicially admissible. Footnotes 'U S. Const amend IV 2Unteed States v. Hall. 583 Va. 1984). U E0 ISee Katz v United States. 389 U S. 347 (1967). 'U.S. Cons) amend. IV SSee Katz v. United States. 389 U.S. 347 (1967). 61d. at 357. 'See Michigan v Tyler 436 U.S 499 (1978) 8U.S. Coast amend IV. 9Cookdge v New Hampshire. 403 U.S. 443 (1971). '0U S. Const amend. IV "Zurcher v Stanford Daily. 436 U S. 547. 556-557 n 6 )1978). Quoting Comment. 28 U. Chi L. Rev. 664. 687 (1961). For a discussion of computer telecommunication cr;me. see Marbach. 'Beware Hackers at Play.- Newsweek. September 5. 1983, p. 42. "For an interesting discussion of computer crimes. see T. Whiteside. Computer Capers (Thomas Y Crowell Co. 1978). 1'7S6 F 2d 986 loth Or 1985). "Id. at 990. '6ld. at 990. 991 'See. e g. United States v Ortiz. 422 U.S 891 (1975) See also Johnson v, United States, 333 U.S. 10 It 9481 '6598 F Supp 171 IW.D.N.Y 1984) '91d. at 176 20Id at 177. 21 Id, 22 United States v Truglio. 731 F.2d 1123 )4th Cir. 19841, cert. denied. 83 L. Ed.2d. 130 (1984) Id, at 1126. "Id. at 1128 2sid. 26Sgro v. United States. 287 US. 206 (1932). 27lllinots v. Gates. 462 U.S. 213. 238 (1983). 26See Fitzgerald and Eason. Fundamentals of Data Communication. pp. 42-43 (John Wiley & Sons. 1978) svUnited States v Harvey. 540 F 2d 1345 (8th Or 1976) -"to at 1354 "Umlod Sines v McM:unrs. 71,11 ?d 1395 11,11, Cn 1983) 3'Andresen v Maryland. 427 U S 463. 478 n 9 (19761 US Const amend IV "See Marron v United States. 275 US 192 119271 For a thorough discussion, see 2 W LaFave, Search and Seizure 95-101 (1978) "See 2 W LaFave. Search and Seizure 162 (19781 MCI Andresen v Maryland. 427 U S 463 (1976) 77See. a g.. Steele v United States. 267 U S 498 (1925. Supra note 35. at 99. 39ld. at 104 See. e g. Ouigg v Estelle. 492 F 2d 343 (9th Cv 1974). '0199 NW2d 514 (Minn. 1972) "ld. at 515-516 "Supra note 29. at 1353 q/d. at 1354 "Id. 'SFor a discussion of computer system components, see T. Schabeck. Computer Crime Investigation Manuel. see. 2.3-2.6 (Assets protection. 1980) 'An example of a detailed description of a computer system is: -Otte Alpha (Brand) Micro computer central processing unit. approximately tour Alpha (Brand) Micro computer terminals. computer printers. and computer manuals. logs. Printout files. operating instructions. mctud? ing coded and handwritten notations. and computer Slor- age materials. including magnetic tapes. magnetic discs. floppy discs. programs. and computer source documenta- tion." Quoted from Voss v. Bergsgaard. 774 F.2d 402. 407 (1985) (warrant invalidated on other grounds). '214 Am. Jur. Proof of Facts 2d 183 (1977) 'aid. See also King v State ax Tel Murdock Acceptance Corporation. 222 So.2d 393. 398 (1969). afd. at 184. 50See United States v. Truglio. 731 F.2d 1123 (th Cir. 1984), cert. denied. 83 L.Ed2d 130 (1984) See also United States v Offices Known as 50 State Distnb.. 708 F.20 1371 (91h Cir. 19831. cert. denied. 79 LEd.2d 677 (1984). "See Andresen v Maryland, 427 U S. 463 (1976) 52For a thorough discussion. see Rissler. "Documentary Search Warrants." FBI Law Enforcement Bulletin. vol 49. No. 7. July 1980. pp 27-31 57665 F 2d I (1st Cir 1981) 5'Id. at 4 ss/d. '6/d at 5 Srld. Said. at 4. Said. at 5. 60610 F2d 1 (1st Cir 1979) 6'Id. at 3 62 Id. 'Id. at 3. 4. 64617 F 2d 29911 st Or 919A11980) 'Id. at 306. 66ld. at 308. "'Id. at 309. contra Voss v Bergsgaard. 774 F 20 402 (70th Cir. 1985). 6s 667 F.2d 117 (D C Cm. 1981). cart. denied. 102 S.Ct. 1971 (1982). 691d. at 141. 70Go?Bart Importing Company v. United States. 75 L.Ed. 374 (1931). r'Id. Said. at 382. Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3 73An example is 18 U.S.C. ?3109. "Cf. Kee v. California. 374 U.S. 23 11963) (concerning an entry to arrest). For a thorough discussion. see 2 W. LaFave. Search and Seizure. 122-140 (1978). "See United Stares v. Offices Known as 50 State Distrib.. supra note 50. 'Cl. 6Harris V. United States. 33' U.S 145 (1947) For a thorough discussion. see 2 W. LaFave. Search and Seizure 160-163 (1978) "See 2 W. LaFave. Search and Seizure 161 (1978) "See Coolidge v. New Hampshire. 403 U S. 443 (1971). For a thorough discussion, see 2 W LaFave. Search and Seizure 163-184 (1978) "Supra note 74. "Ord. a lid. a2See generally 16 Am Jur. Proof of Facts 285-291 (1965). 63D. Parker. Fighting Computer Crime. page 42 (Charles Scribner s Sons. 1983) ''Supra note 74. bold. 6b1d. ''See United States v. Francis. 646 F.2d 251. 258 (6th Cie. 1981). can. denied, 70 L.Ed.2d 616 (1981). 6BFor a discussion of the ease with which an expert can gain access to a supposedly secure system. see T. Whiteside. Computer Capers. pp 117-121 (1978). T. Schabeck. Computer Crime Investigation Manual. section 9.2.9 (Assets Protection. 1980). 90See Katz v. United States. 389 U.S. 347 (1967). 9'Id.. 92See Berger v. New York. 388 U.S. 41 (1967). 93Michigan v. Summers. 452 U.S 692. 703 (1981). citing? W. LaFave. Search and Seizure 150-151 (1978). See United States v. Offices Known as 50 State Distrib.. supra note 50. 961d. at 1376. "Supra note 76. 971d. "Supra note 68. at 123. "708 F.2d 587 (t tth Cir. 1983). 1001d. at 601. '01See generally 2 W. LaFave. Search and Seizure 173-178 (1978). 102See. e.g.. In Re Search Warrant Dated July 4. 1977. Etc.. supra note 68. See also United States v. Tamura, 694 F 2d 591 (9th Cu. 1982) 103708 F.2d 587. 602 (11th Cir. 1983). 'aid. at 604. 1061d. 1061d. 107Supre note 68. at 124. 10eId. 109United States v. Harvey, 540 F.2d 1345 (81h Cie. 1976). "Old. at 1354. "'An expert accompanied officers executing the search warrant in Ottensmeyer v. Chesapeake & Potomac Telephone Co.. 756 F.2d 986 (4th CO. 1985). Another case considering the role of an expert accompanying officers executing a search warrant is Forro Precision. Inc. v. International Business Machines Corp.. 673 F.2d 1045 (9th Cir. 1982). 112See United States v. Brien, supra note 64. 11 3United Stares Y. Tamura. supra note 102. See e.g.. United States v Tamura, supra note 102. "SId. See also DeMassa v. Nunez. 747 F.2d 1283 (9th Cir. 1984) (special master appointed to supervise sorlmq of documents during search of attorney's office). 1 61n addition to suppression of evidence. civil liability may result when a search continues after all items named in warrant have been seized. See Creamer v. Porter. 754 F 2d 1311 (5th Cie. 1985). "'For a discussion of the ways a computer may be physically damaged. see Fighting Computer Crime. supra note 82. pages 41-42. "'Supra note 78 Declassified in Part - Sanitized Copy Approved for Release 2011/12/02 : CIA-RDP89B01356R000100140029-3