Skip to main content

Category: search warrants

What I Learned from Reviewing 279 Search Warrants

Over the past several months, I’ve been dropping by clerks’ offices to look at search warrants. I’ve made it to six offices, including offices in eastern, central, and western North Carolina, and in urban and rural areas. I’ve reviewed and made notes on 279 warrants and have at least skimmed hundreds more. The warrants I’ve reviewed were sought by 38 different agencies for a range of offenses. What follows are a few observations based on what I saw.

Search Warrants for Digital Devices and the Requirement that Warrants be Executed within 48 Hours

I’ve had several questions lately about the requirement in G.S. 15A-248 that “[a] search warrant must be executed within 48 hours from the time of issuance.” The specific concern is how this applies to searches of digital devices, which frequently require off-site forensic analysis that may not begin, let alone end, until substantially more than 48 hours after issuance of the warrant. Although we don’t have an appellate case on point in North Carolina, courts in other jurisdictions have held that so long as the initial seizure of the device is timely, the forensic analysis may be conducted later.

Geofencing Warrants

WRAL has several stories up about geofencing warrants. One major article is here. It describes a search warrant obtained by the Raleigh Police Department in a murder case. The warrant ordered “Google [to] hand over the locations of every [mobile] device within the confines of [a defined geographic area] during a specified time period.” In a nutshell, the police were trying to figure out who was near the scene of the crime when the murder took place and asked Google to comb its data banks to find out. This post is intended to start a conversation about warrants of this kind.

May Search Warrants for Cell Phones Include Connected Cloud Services?

While preparing to teach a recent class about search warrants for digital devices, I spoke with a number of experts in digital forensics. Each conversation was very helpful. Almost all of them touched on an issue I’d never previously considered: whether search warrants for cell phones do or may include the authority to search connected cloud services.

Delays in Obtaining Search Warrants for Digital Devices

There have been several recent cases regarding delays in obtaining search warrants for digital devices that have been lawfully seized. For example, in United States v. Pratt, 915 F.3d 266 (4th Cir. 2019), officers seized a suspect’s phone based on the suspect’s admission that it contained nude pictures of an underage girl. The opinion doesn’t say, but I assume that the basis of the seizure was risk of destruction of evidence. However, the officers didn’t obtain a search warrant for the phone for 31 days. On appeal, the Fourth Circuit ruled that the delay was unreasonable in violation of the Fourth Amendment. It turns out that Pratt isn’t alone.

Search Warrants for Very Minor Offenses

What’s the most inconsequential criminal offense in North Carolina? My personal favorite is sale of immature apples, a Class 3 misdemeanor under G.S. 106-189.2. But take a look at the list of Class 3 misdemeanors compiled by the Sentencing Commission and make your case in the comments.

Whatever your answer, now consider this: could a court properly issue a search warrant if there were probable cause to believe that evidence of a very minor crime was in a person’s home? Suppose that a sheriff’s office receives a report that a vendor is selling immature apples at a farmers’ market. A deputy applies for a search warrant for the home of the vendor in question on the basis that she likely has receipts and other evidence of the crime in her house. May a judicial official issue the warrant? Or are there some offenses that are so minor that the “cure” of the search warrant is worse than the “disease” of allowing the crime to go unpunished?

Particularly Describing the Evidence to Be Seized under a Search Warrant

The Fourth Amendment states in part that “no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” The reference to a particular description of the place to be searched and the things to be seized is called the particularity requirement. As it pertains to the things to be seized, the Supreme Court’s most famous exposition of the requirement is in Marron v. United States, 275 U.S. 192 (1927), where it opined that the requirement “makes general searches . . . impossible and prevents the seizure of one thing under a warrant describing another.  As to what is to be taken, nothing is left to the discretion of the officer executing the warrant.”

In practice, officers regularly seek search warrants with catchall provisions. For example, in a drug case, an officer may seek authorization to seize drugs, paraphernalia, customer lists, and “any and all other evidence connected to drug activity.” Are catchall statements like these consistent with the particularity requirement?

Probable Cause and Child Pornography

Shea blogged last week about State v. Terrell, a case in which the defendant’s girlfriend saw on one of the defendant’s USB drives an “image of [the girlfriend’s] nine-year-old granddaughter sleeping without a shirt.” She called the police, and an officer found additional images of “partially or fully nude minors” on the drive. The officer sought and obtained a search warrant that led to the discovery of child pornography. Shea’s post, and the case itself, focused on the officer’s initial warrantless search and whether it was justified under the private search doctrine. But the court’s recitation of the facts reminded me of another common issue in child pornography cases: how much information about an image must an officer provide in order to establish probable cause that the image constitutes child pornography?