ATTORNEY PAUL A. KSICINSKI 414-530-5214
ATTORNEY PAUL A. KSICINSKI
TOP 100 WISCONSIN CRIMINAL DEFENSE LAWYER
​414-530-5214
  • Home
  • References
  • PEER ENDORSEMENTS
  • PAST CASES
  • Blog
  • Contact
  • KNOW YOUR RIGHTS
  • How to deal with police
  • Practice Areas
  • About
  • Criminal Law Links
  • News

Discussion of current legal issues

Henry Nellum case selected by USA Network as a compelling homicide trial to keep an eye on in 2018

Button Text

Can the government take my computer?

12/9/2014

1 Comment

 
I recently answered the following question:

“I'm 46 yrs old. Moved out of my childhood home and into a home with my wife in another town two years ago, leaving my 48 year old brother and mom still living at the residence. Left behind my old pc since I didn't really have room for it. Haven't used it hardly in the past two years except for a handful of days when due to inclement weather it was easier to crash there for the night. Last week my brother's laptop and other electronics were seized from the home due to a report of questionable photos on his computer. While searching his room they went to the back room and took my computer as well. Were they lawful in seizing my computer since I had nothing to do with these complaints or any of this fiasco for that matter?”

Generally my answer hinged on whether there was a warrant or a subpoena or was this a warrantless search.  Now I would like to explore this question giving some more detail.  However, there is no way I can explore all the areas of this complex issue here.  If the police have seized or are searching your computer, I strongly urge you to contact me immediately so I can put my years of experience to work to protect you.

The same Fourth Amendment principles that apply to other kinds of searches apply to computer searches. The search and seizure must not only be reasonable, but must be performed pursuant to a warrant, issued on probable cause and particularly describing the place to be searched and the things to be seized.  In a rare case, one of the few exceptions to the warrant requirement may apply. In other words, there are two steps in a search and seizure of computerized information, each of which must comply with the Fourth Amendment: (1) the search for and (possible) seizure of the hardware or other media (e.g., thumb drives etc) upon which the information described in the warrant is believed to be stored, and (2) the search for and seizure of the particular files or data specified in the warrant.

The Supreme Court told us of the "grave danger" to privacy inherent in a search and seizure of a person's papers -- that private documents for which there is no probable cause may be examined in the course of searching for documents described in a warrant.  The privacy threat is heightened in searches of computers because of the broad nature of what is stored there.  Individuals and businesses use computers to create, store, and communicate every type of information imaginable, from the most public to the most sensitive, including trade secrets, privileged communications, private correspondence, pictures, and stray thoughts never intended to see the light of day. Any given hard drive is full of information the average user assumes never was or is no longer there -- the content of Web sites visited, e-mails sent off and forgotten, documents deleted or never deliberately saved.  Furthermore, embedded in any computerized document is information that can appear to be damning evidence that a specific person downloaded, wrote, modified or viewed the document at a certain time, i.e., Tommy wrote the threatening email on July 10, 2014 between 3:02 and 3:10 A.M., though in fact it may have been his new roommate Jill who wrote it or the dates and times may have been altered because Jill was jealous of the time Tommy was spending with the ex because of the kids on July 4th.  And even Tommy did write the email, what was his intent?  Was he drunk or high when he wrote it?

Compared to a physical environment, there is much less control over what data is stored on a computer. In the context of a physical environment, items can be positively destroyed. In contrast, files marked for deletion on computers can still be recovered by investigators; as long as a user does not reuse a particular "cluster" of data, the file marked for deletion will remain undisturbed, and "slack space" on a hard drive can even save this information after reuse.  Temporary files created by programs like Microsoft Word and the automatic data retention of

Internet browsers also add to this confusion.  And as computers become integrated in businesses and people's daily lives, it is more often necessary in normal criminal investigations that do not involve cyber-crimes to search a suspect's computer.  The question of what rules should govern these searches is of utmost importance.

Computers are thus tempting and frequent search targets in criminal investigations. Fortunately, the technical means exist to search computers for particular information by keyword searches without rummaging through private information not described in a warrant. In an internet threat case, the prosecution can search for files with certain words or even pictures without the need to look at any text file. The constraints of physical environments make it unreasonable to search for a stolen car inside a house, or for any number of items that cannot physically be in the area searched.  This consideration is not present with the fungibility of computer files.  However, one court has noted the inherent problem of limiting computer searches where evidence "could be nearly anywhere on ... [a] computer[]" because of "manipulation to hide [file] contents."  Mann, 592 F.3d 779 (7th Cir. 2010)

For a good start on the case law and a look at Office of Legal Educ., Exec. Office for U.S. Attorneys, Searching and Seizing Computers and Obtaining Electronic Evidence In Criminal Investigations 62 (2009), available at http://www.cybercrime.gov/ssmanual/ssmanual2009.pdf.

1 Comment
UK data recovery link
7/30/2018 04:08:21 am

Across the world, instances of data loss continue to rise, thus complicating the process of hard drive data recovery and making this a process of utmost importance. Sadly, there are two types of computer users in this world - those who understand the computer system because they respect the work it does for them and those who don't care to know the details as long as work gets done.

Reply



Leave a Reply.

    Author

    These are reflections I have had about our criminal justice system.  Some of it may make sense, some of it might not.

    Archives

    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    February 2021
    January 2021
    November 2020
    October 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    October 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014

    Categories

    All

    RSS Feed

Powered by Create your own unique website with customizable templates.