Friday, August 15, 2014

Electronic Searches : United States v. Ganias

“Time works changes, brings into existence new conditions and purposes. Therefore a principle to be vital must be capable of wider application than the mischief which gave it birth.”


Introduction

            In 1928, with uncanny prescience and profound wisdom, United States Supreme Court Justice Louis Brandeis made the following observation in his famously exquisite dissenting opinion in Olmstead v. UnitedStates:

Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may some day be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home.

Olmstead v. United States, 277 U.S. 438, 473-474 (1928) (Brandeis, J., dissenting). In Olmstead, the United States Supreme Court, applying a property-based interpretation of the Fourth Amendment, held that there was no constitutional violation for warrantless wiretapping of the defendant’s phone because there had been no physical intrusion of the defendant's property – a decision that took nearly 40 years to overturn in Katz v. United States, 389 U.S. 347(1967).

The day Justice Brandeis predicted has arrived. Although the government routinely seizes computers as part of a criminal investigation, the government can also obtain all of a person’s emails and other online documents maintained by third-party providers (Google, Yahoo, AOL, etc.) and reproduce them in court, without ever entering a person’s home.

Electronic data provides the most intimate look at a person’s life – far more intimate than a search of a person’s home or office would reveal. As Judge Kleinfeld of the United States Court of Appeals for the Ninth Circuit has observed:

for most people, their computers are their most private spaces. People commonly talk about the bedroom as a very private space, yet when they have parties, all the guests including perfect strangers-are invited to toss their coats on the bed. But if one of those guests is caught exploring the host’s computer, that will be his last invitation.
***
Emails and history links may show that someone is ordering medication for a disease being kept secret even from family members. Or they may show that someone’s child is being counseled by parents for a serious problem that is none of anyone else’s business. Or a married mother of three may be carrying on a steamy email correspondence with an old high school boyfriend. Or an otherwise respectable, middle-aged gentleman may be looking at dirty pictures. Just as a conscientious public official may be hounded out of office because a party guest found a homosexual magazine when she went to the bathroom at his house, people’s lives may be ruined because of legal but embarrassing materials found on their computers.

United States v. Gourde, 440 F.3d 1065, 1077 (9th Cir.2006) (Kleinfeld, J., dissenting) (cited in In the Matter of an Application for a Search Warrant to Seize and Search Electronic Devices from Edward Cunnis, 770 F. Supp. 2d 1138, 1144 (W.D. Wash. 2011)). See also Riley v. California, 134 S. Ct. 2473,2489, 189 L. Ed. 2d 430, 446, 2014 U.S. LEXIS 4497 *34 (2014) (“The term ‘cell phone’ is itself misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.”).

As Justice Brandeis realized in 1928 when considering the relatively new technology of the telephone, search and seizure law must always keep up with advances in technology, just as when the “telephone instrument” (a quaint term used in Olmstead) became popular and the government began using wiretapping as an investigative tool. It took 39 years for Fourth Amendment law to catch up with telephone technology, with the Supreme Court’s decisions in Katz v.United States, 389 U.S. 347 (1967) and Berger v. New York, 388 U.S. 41 (1967) and the enactment of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which established strict protocols for the government to follow when wiretapping a telephone. Similarly, electronic data searches present new issues for courts and it seems that we are still in the early stages of that body of case law.

The practical realities of an electronic search often mean that electronic data that falls outside the scope of the search warrant is seized by the government so that it can be searched at a later time. This leaves voluminous, private, non-responsive electronic data in the hands of the government after the search has been concluded. Courts have begun to provide guidance on how electronic searches should be conducted, especially how the government should handle non-responsive electronic data.

1.     Pump Up the Volume: Seize First – Search Later

An issue in almost every electronic search is how the government can search voluminous electronic data without violating the overbreadth and particularity requirements of the Fourth Amendment.

When the government obtains a search warrant for voluminous paper records, courts permit the backwards protocol of seizing all of the documents first and then searching for the responsive documents later, out of practical necessity. See, e.g., Doane v. United States, 2009 U.S.Dist. LEXIS 61908 *27 (S.D.N.Y. 2009) (“Several courts have upheld the reasonableness of the wholesale seizure of folders or boxes of documents without an on-site examination of every individual document to determine if it fits within the scope of the warrant.”) (collecting cases).

This type of backwards search protocol is often used to search and seize computer records and emails, since nearly every electronic search includes voluminous data that cannot be identified as responsive to the search warrant at the time of the search. See United States v. Vilar, 2007 U.S. Dist. LEXIS 26993 *113 (S.D.N.Y.2007) (“’it is frequently the case with computers that the normal sequence of ‘search’ and then selective ‘seizure’ is turned on its head,’ as computer hardware is seized from a suspect’s premises before its content is known and then searched at a later time.” (quoting Inthe Matter of the Search of: 3817 W. West End, First Floor Chicago, Illinois60621, 321 F. Supp. 2d 953, 958 (N.D. Ill. 2004)); United States v. Metter, 860 F. Supp. 2d 205, 213 (E.D.N.Y. 2012) (“Unlike warrants seeking readily identifiable evidence such as narcotics or firearms, an onsite search of a computer for the evidence sought by a warrant is not practical or even possible in some instances.”); In the Matter of a Warrant for All Content and Other InformationAssociated with the Email Account XXXXXXX@Gmail.com Maintained at Premises Controlled by Google, Inc., 2014 U.S. LEXIS98008 **14-17 (S.D.N.Y. 2014) (“The need to permit the Government to examine electronic materials off-site rather than require it to conduct an on-site search is most obviously demonstrated in the case of a search of a computer hard disk drive (‘hard drive’), which is the part of a computer that actually stores files and documents.”) (collecting cases).

The “seize first-search later” method is specifically authorized by Rule 41 (e)(2)(B) of the Federal Rules of Criminal Procedure, which provides:

(B) Warrant Seeking Electronically Stored Information. A warrant under Rule 41(e)(2)(A) may authorize the seizure of electronic storage media or the seizure or copying of electronically stored information. Unless otherwise specified, the warrant authorizes a later review of the media or information consistent with the warrant. The time for executing the warrant in Rule 41(e)(2)(A) and (f)(1)(A) refers to the seizure or on-site copying of the media or information, and not to any later off-site copying or review.

Accordingly, there is no question that the government can seize all of a defendant’s computer data and emails and search that material at a later time. There is also no constitutional requirement that a search warrant for voluminous electronic data contain any ex ante search protocols.

2.     Search Warrants For Electronic Data Do Not Require a Search Protocol

Unlike the wiretapping protocols established by Title III (e.g., minimization, limited time duration, sealing, notice), searches of electronic data do not require any ex ante search protocols. Justice Alito, however, at the end of his concurring opinion in Riley v. California, 134 S. Ct. 2473, 2497-98, 189 L. Ed. 2d 430,2014 U.S. LEXIS 4497 (2014), which held that a warrant is required to search a suspect’s cell phone incident to arrest, noted that “because of the role that these devices have come to play in contemporary life, searching their contents implicates very sensitive privacy interests that this Court is poorly positioned to understand and evaluate” and encouraged that “Legislatures, elected by the people, are in a better position than we are to assess and respond to the changes that have already occurred and those that almost certainly will take place in the future.” Justice Alito specifically referenced the fact that Congress responded with Title III following the Supreme Court’s decision in Katz, hinting the Congress should likewise legislate search protocols for electronic searches.

A framework for what protocols for electronic searches might look like was presented in United States v. Comprehensive Drug TestingInc., 621 F.3d 1162 (9th Cir. 2010) (en banc) (per curiam) (“CDT III”). In CDT III, the United States Court of Appeals for the Ninth Circuit suggested “guidelines” for the government to follow in the search and seizure of electronic evidence.

In CDT III, the government obtained search warrants and a grand jury subpoena for a company called Comprehensive Drug Testing, Inc., which maintained a confidential list of Major League Baseball players who had tested positive for steroids. Although the warrant sought records for only ten players, the government obtained comingled drug test records of hundreds of baseball players and other professional athletes, far beyond the warrant’s scope, and sought to use that information to conduct additional investigations.

The Ninth Circuit recognized the dangers of “over-seizing” electronic records that could render a search unreasonably broad:

We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government’s interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.

The Court ultimately relied on issue preclusion to affirm suppression of the data that exceeded the warrants’ scope. In a concurring opinion, however, Chief Judge Kozinnski recommended a set of “procedures and safeguards” that “strike a fair balance” between the needs of law enforcement when conducting electronic searches and seizures and the protections of the Fourth Amendment:

1.         The government should waive reliance upon the plain view doctrine in digital evidence cases.
2.         Segregation and redaction must either be done by specialized personnel or an independent third party, who must not disclose to the investigators any information other than that which is the target of the warrant.
3.         Warrants and subpoenas must disclose the actual risks of destruction of information as well as prior efforts to seize that information in other judicial fora.
4.         The government’s search protocol must be designed to uncover only the information for which it has probable cause, and only that information may be examined by the case agents.
5.         The government must destroy or, if the recipient may lawfully possess it, return non-responsive data.
Id. (citations omitted).

Chief Judge Kozinski’s protocols were originally in the Ninth Circuit’s first en banc decision in United States v. Comprehensive Drug Testing,Inc., 579 F.3d 989 (9th Cir. 2009) (en banc) (“CDT II”) and seemingly imposed a protocol requirement on the government. The search protocols were relegated to mere suggestions when then-Solicitor General of the United States, Elena Kagan, sought “super en banc” review by the entire Ninth Circuit. In the Ninth Circuit, there are so many judges (28) that en banc review is only conducted by a randomly-selected 11-judge panel, not all 28 judges. Therefore, Kagan sought review by all 28 judges on the ground that the mandatory search protocols exceeded the Article III court’s proper role [and made the government’s job more difficult]. Perhaps getting the hint, the Ninth Circuit granted rehearing en banc by the same 11-judge panel and issued a per curiam opinion identical to first en banc opinion, but moving Chief Judge Kozinski’s protocols to a merely advisory concurring opinion.

Since then, most electronic search cases decided after CDT III do not require a search warrant to include an ex ante search protocol. See In the Matter of a Warrant for All Content and Other Information Associated withthe Email Account XXXXXXX@Gmail.com Maintained at Premises Controlled by Google, Inc., 2014 U.S. LEXIS 98008 **36-37 (S.D.N.Y. 2014) (citing the Sixth, Tenth, and Eleventh Circuits); see also United States v. Dupree, 2011 U.S. Dist. LEXIS 28070 *98 (E.D.N.Y.2011) (“the government is not required to include in its application for a search warrant a search protocol, enumerating the methods that the government might use to search computers”); but see United States v. D’Amico, 734 F.Supp. 2d 321 (S.D.N.Y. 2010) (noting that while “it does not appear that any district court decision in this Circuit has embraced CDT”…“certain aspects of the CDT protocol seem sensible”); see also In re: [REDACTED]@gmail.com, No. 5:14-mj-70655 (PSG) (N.D.Cal. 2014) (noting that courts are required, ex ante, to approve the reasonableness of a computer search and rejecting warrant application for failure to include date restriction and for not requiring the government to return or destroy non-responsive documents).

One notable exception is a series of decisions by the Honorable David J. Waxse, United States Magistrate Judge for the District of Kansas, who has denied repeatedly the government’s applications for search warrants for both cell phones and email accounts where the government failed to include a search protocol or provided one the Court considered inadequate.

On September 21, 2012, in In re Search Warrants for Info. Associated with Target Email Address, 2012 U.S. Dist. LEXIS 138465 (D. Kansas)(Waxse, M.J.), Magistrate Judge Waxse denied the government’s applications for search warrants because the warrants sought disclosure of all of the target’s emails, but did not provide any search protocol to place any limits on the government’s review of the data, such as key word searches, appointment of a special master, or a taint team. Magistrate Judge Waxse concluded that the proposed warrants were overbroad. See 2012 U.S. Dist. LEXIS 138465 **32-33; see also In re Search Warrants for Info. Associated with Target EmailAccounts/Skype Accounts, 2013 U.S. Dist. LEXIS 123129 (D. Kansas August 27,2013) (Waxse, M.J.) (an almost verbatim rehash of 2012 U.S. Dist. LEXIS 138465).

On June 26, 2014, in In re Search of Nextel Cellular Phone,14-MJ-8005 (D. Kansas) (DJW), Magistrate Judge Waxse denied a government application to search a cell phone seized during a drug bust, because the government provided an inadequate search protocol. Magistrate Judge Waxse relied mostly on his own previous opinions and those of now-retired Magistrate Judge John Facciola of the United States District Court for the District of the District of Columbia (the reasoning behind which was rejected by Chief District Court Judge Richard W. Roberts in In reSearch of Info. Associated with [Redacted]@Mac.com That is Stored at PremisesControlled by Apple, Inc., 14-MJ-228 (D. D.C. 2014) (RWR) (Roberts, C.J.)).

In In re Search of Nextel Cellular Phone, the government’s application included a search methodology. Magistrate Judge Waxse concluded, however, that the search methodology did not satisfy the Fourth Amendment’s probable cause and particularity requirements because it sought authorization for the “overseizure of data and indefinite storage of data” and because the methodology was so broad that it was nothing more than a “general, exploratory rummaging in a person’s belongings.”

On August 4, 2014, in In re Search of Three Cellphone and OneMicro-SD Card, 14-MJ-8013 (D. Kansas) (DJW), Magistrate Judge Waxse denied the government’s application for a search warrant because it did not contain a search methodology. The Court held that a “search protocol is required.”

On December 30, 2014, in In reSearch of Cellular Telephones within Evidence Facility Drug EnforcementAdministration, 14-MJ-8017 (D. Kansas) (DJW), Magistrate Judge Waxse denied the government’s application for search warrants for five cell phone because the search warrant lacked a search protocol. The Court issued its longest (27 pages) and most comprehensive discussion of the applicable legal issues involved. The opinion includes a substantial discussion of United States v. Ganias2014 U.S. App. LEXIS 11222 (2d Cir. 2014).

Therefore, the limits of an electronic search are established ex post. As articulated by the Supreme Court, the Constitution “interpose[es], ex ante, the deliberate, impartial judgment of a judicial officer” and provides “ex post, a right to suppress evidence improperly obtained and a cause of action for damages” for an unreasonable search.” United States v. Grubbs, 547U.S. 90, 99, 126 S. Ct. 1494, 164 L. Ed. 2d 195 (2006) (quoted in In the Matter of a Warrant for All Contentand Other Information Associated with the Email Account XXXXXXX@Gmail.com Maintained at Premises Controlled byGoogle, Inc., 2014 U.S. LEXIS 98008 *27 (S.D.N.Y. 2014)). Courts are clearly able to establish search protocols through ex post decisions. See, e.g., Berger v. United States, 388 U.S. 41(1967) (establishing the procedural limits of wiretapping).

3.     The Development of Ex Post Search Restrictions: United States v. Ganias

NOTE: On June 29, 2015, the United States Court of Appeals for the Second Circuit granted the Government's motion for rehearing en banc in United States v. Ganias. Oral argument is scheduled for September 30, 2015. A copy of the Order is here.

An example of an ex post limitation of the government’s conduct in executing an electronic search is United States v. Ganias, 2014 U.S. App.LEXIS 11222 (2d Cir. 2014), in which the United States Court of Appeals for the Second Circuit held that the government violated the defendant’s Fourth Amendment rights by seizing and indefinitely retaining non-responsive computer records, and then seizing them when it later developed probable cause to search those records. The Court held that those computer records should have been suppressed and vacated the defendant’s conviction for tax evasion. In some ways, the holding in Ganias mirrors the suggested ex ante protocol in CDT III that the government must destroy or return non-responsive electronic data, although in Ganias the Second Circuit did not order the government to return or destroy the suppressed non-responsive documents.

In Ganias, the government obtained a search warrant to seize computer data from Stavros Ganias, the accountant for two companies related to an investigation of defrauding the United States Army and two additional search warrants for other computers, not owned by Ganias. To execute the search, the government made copies of all of the computer hard drives, 11 in total, 3 of which belonged to Ganias. See United States v. Ganias, 2011 U.S. Dist.LEXIS 67806 **4-5 (D. Conn. 2011) (the underlying district court opinion). The computer data from the 11 hard drives was copied onto 19 DVDs. Id. at*8.

            The search warrant for Ganias’ computers identified the types of documents to be seized and listed protocols that might be used to locate them, such as surveying the file directories, opening and reading the first few pages of files, scanning for recently deleted files, and performing key word searches. (See UnitedStates v. Ganias, 3:08-CR-224 (EBB) (D. Conn.) Dkt. No. 108-1 – November17, 2003 Search Warrant). Beside these protocols, the search warrant was silent as to any other protocols or safeguards to be used by the government. The government then took 13 months to identify, isolate, and extract the computer files responsive to the search warrant. The extracted responsive materials were contained on a single DVD. Id. at *14. The government retained the remaining non-responsive computer files.

The government subsequently expanded its investigation to investigate Ganias for tax evasion and obtained a second search warrant to search Ganias’ computer files for his personal financial records. The second warrant was obtained nearly 2 ½ years after the computer files were originally seized and the files would not have still existed had the government not maintained a copy. Ganias, 2014 U.S. App. LEXIS 11222 at *8.

Ganias was indicted for tax evasion and moved to suppress the computer files obtained from the second search. The United States District Court for the District of Connecticut denied the motion and Ganias was convicted of tax evasion after trial.

On appeal, the Second Circuit reflected on the historical context of the Fourth Amendment, recalling that ‘[t]he chief evil that prompted the framing and adoption of the Fourth Amendment was the ‘indiscriminate searches and seizures’ conducted by the British ‘under the authority of general warrants’” and that “[g]eneral warrants were ones ‘not grounded upon a sworn oath of a specific infraction by a particular individual, and thus not limited in scope and application.’” As the Second Circuit recalled “[t]he Framers abhorred this practice, believing that ‘papers are often the dearest property a man can have’ and that permitting the Government to ‘sweep away all papers whatsoever,’ without any legal justification, ‘would destroy all the comforts of society.’” Id. at**20-21 (all citations omitted).

Analogizing computer files to private papers, the Second Circuit stated that “[l]ike 18th Century ‘papers,’ computer files may contain intimate details regarding an individual’s thoughts, beliefs, and lifestyle, and they should be similarly guarded against unwarranted Government intrusion. If anything, even greater protection is warranted.” Id. at *22 (emphasis supplied).

From that important historical perspective, the Second Circuit ordered suppression of the emails seized during the second search, holding that “the Government clearly violated Ganias’ Fourth Amendment rights by retaining the files for a prolonged period of time and then using them in a future criminal investigation.” Id. at *31. The Court also commented that “[w]ith the Government’s use of forensic mirror images becoming increasingly common, deterring its unconstitutional handling of non-responsive data has grown in importance.” Id. at *39.

One significant shortcoming of Ganias, is that the Second Circuit did not order the government to return or destroy the non-responsive computer files it retained. The Second Circuit’s failure to order the government to return or destroy the non-responsive computer data does not appear to be a mere oversight because the Second Circuit suggested that the government could still use the suppressed computer data for impeachment (“We do not hold that the Government has waived its right to use the evidence in question for impeachment purposes.”). Id. at *33 n.11. It is not clear from the opinion whether the Second Circuit was referring to the suppressed (but responsive) computer data or the non-responsive computer data as well, although the former makes more sense. Permitting the government to use non-responsive computer data for impeachment could prove especially troubling when it comes to emails because they are a defendant’s own words and could have a chilling effect on a defendant’s right testify at trial, if all of the defendant’s emails become fair game for cross-examination.

Permitting the government to use suppressed evidence for impeachment purposes is consistent with other Supreme Court and Second Circuit precedent. See James v. Illinois, 493 U.S. 307,308-09 (1990) (“the exclusionary rule does not bar the prosecution from using illegally obtained evidence to impeach the defendant’s own testimony.”); Kansas v. Ventris, 129 S. Ct. 1841(2009) (testifying defendant may be impeached with a suppressed confession made in violation of Massiah); Walder v. United States, 347 U.S. 62, 65(1954) (evidence obtained in violation of the Fourth Amendment can be used for impeachment); United States v. Simels, 654 F.3d 161 (2d Cir. 2011) (permitting the government to use suppressed wiretap conversations to impeach the defendant).

In Ganias, the non-responsive data was not the subject of the suppression motion, since the government did not express any intention to use that material. Retention of non-responsive computer data, however, would be inconsistent with prior case law in the context of non-responsive paper documents, as comprehensively summarized in Doane v. United States, 2009 U.S. Dist. LEXIS 61908 **28-30 (S.D.N.Y. 2009):

Moreover, these cases do not contemplate the indefinite retention of all materials contained within intermingled files. The rationale for these decisions is that where a large number of files contain a mix of documents some of which fit a search warrant's criteria and some of which do not, it is impractical for the executing agents to analyze each document at the site of the search to determine whether it is within the scope of the warrant or not. UnitedStates v. Hargus, supra, 128 F.3dat 1363; United States v. Santarelli,supra, 778 F.2d at 615-16; United States v. Regan, 706 F. Supp.1102, 1114 (S.D.N.Y. 1989)(upholding a broad warrant because if the agents had been required to analyze each of the hundreds of thousands of documents “they would probably still be on the premises now”); 2 Wayne R. LaFave, supra, Search& Seizure, § 4.11(a) at 776 n.9 (collecting cases). Accordingly, a number of cases in this Circuit have held that “when items outside the scope of a valid warrant are seized, the normal remedy is suppression and return of those items . . . .” United States v. Matias,supra, 836 F.2d at 747; accord United States v. George, 975 F.2d 72, 79 (2d Cir. 1992); United States v. Dunloy, 584 F.2d 6, 11n.4 (2d Cir. 1978); United States v.Artieri, 491 F.2d 440, 445-46 (2d Cir. 1974); United States v. Argentina, 01 Cr. 245 (JSM), 2002 U.S. Dist. LEXIS449, 2002 WL 54602 at *1 n.1 (S.D.N.Y. Jan. 14, 2002); United States v. Longo, 70 F. Supp.2d 225, 252 (W.D.N.Y. 1999); United States v. Corcoran, 855 F. Supp.1359, 1367 (E.D.N.Y. 1994). Thus, even where practical considerations permit the Government to seize items that are beyond the scope of the warrant, once the fruits of the search are-segregated into responsive and non-responsive groups, the “normal” practice is to return the non-responsive items.

Neither the Government’s research nor my own has disclosed any authorities holding that the Government may seize folders containing documents outside the scope of a warrant and then retain and utilize these documents without demonstrating that they fit within one of the recognized exceptions to the search-warrant requirement. See e.g. United States v.Slocum, 708 F.2d 587, 606 (11th Cir. 1983)(Since each of “the individual documents contained in the file could be legitimately seized under the plain-view exception, [the officer] acted reasonably in ordering the seizure of the entire file.”); United States v.Tamura, 694 F.2d 591, 595-96 (9th Cir. 1982). Indeed, permitting the Government to retain items outside the scope of the warrant without such a showing would dramatically dilute the right to privacy in one’s personal papers. See Andresen v. Maryland, 427 U.S. 463, 482, 96 S. Ct. 2737, 49 L. Ed.2d 627 (1976).

In Doane, the court ordered that “documents seized by the Government do not fall within the plain-view exception to the warrant requirement and the originals and all copies must be returned to [the defendant].”). Id.at **44-45; see also United States v. Collins, et al., 2012 U.S. Dist. LEXIS 111583 (N.D. Ca. 2012) (denying government motion for reconsideration of court’s order to return all non-responsive computer data to the defendant). There does not seem to be any logical reason why the government should be permitted to retain indefinitely non-responsive computer data.

4.     Broadening the Application of Ganias

            The factual scenario in Ganias is sui generis in that it is very unusual for the government to re-search leftover non-responsive documents from a prior search to bring new charges. So even if the government cannot use non-responsive computer records that it held for an unreasonable length of time, the government has little incentive to purge those files, unless there is a stronger sanction in store.

Suppression of all computer files obtained in a search is a strong sanction that would incentivize the government to return or destroy non-responsive computer data. Support for that sanction is provided by the “flagrant disregard” doctrine. Where government agents exceed the scope of a search warrant, “suppression of all evidence seized is justified where those executing the warrant acted ‘in flagrant disregard’ of the warrant’s terms.” United States v. Matias, 836 F.2d 744, 747 (2d Cir. 1988) (citations omitted). “Government agents flagrantly disregard the terms of a warrant so that wholesale suppression is required only when (1) they effect a widespread seizure of items that were not within the scope of the warrant, and (2) do not act in good faith.” UnitedStates v. Liu, 239 F.3d 138, 140 (2d Cir. 2000) (internal citations and quotation marks omitted).

The first prong of this test requires proof that the search conducted actually resembled a “general search,” which has been described as a “wide-ranging exploratory search []” or an “indiscriminate rummaging,” and “ha[s] long been deemed to violate fundamental rights.” Id. at 140. In the absence of such evidence, the Court need not address whether the agents acted in bad faith in executing the search. Id. at 142 (declining to reach issue of whether search was conducted in good faith where first prong of test was not met); United States v. Dupree, 2011U.S. Dist. LEXIS 28070 *111 (E.D.N.Y. 2011) (where documents outside the scope of the warrant exceed those within its scope, the court may conclude that agents acted with flagrant disregard of the warrant’s terms).

By definition, searches of computers require a “wide-ranging exploratory search” of non-responsive computer data, so it seems that the first prong of the flagrant disregard test is easily met. In Ganias, the Second Circuit found that this prong was satisfied when “the Government effected a widespread seizure of files beyond the scope of the warrant -- conduct that resembled an impermissible general search. Shi Yan Liu, 239 F.3d at 141. For almost two-and-a-half years, the Government retained records that were beyond the scope of the 2003 warrant, in violation of Ganias’s Fourth Amendment rights.” Ganias,2014 U.S. App. LEXIS 11222 at **37-38.

The second prong requires a showing that the agents did not act in good faith. In Ganias, the court concluded that “the agents here did not act in good faith” because “the agents could not have had a good-faith basis to believe the law permitted them to keep the nonresponsive files indefinitely.” Id. at 38-39. Accordingly, Ganias forecloses the government from arguing that it acts in good faith when it retains non-responsive computer data after the search has been completed.

The “flagrant disregard” rule was applied in United States v. Metter, 860F. Supp.2d 205 (E.D.N.Y. 2012). In Metter, the United States District Court for the Eastern District of New York suppressed all emails and computer hard drives seized by the government because the government waited 15 months to conduct any sort of review to segregate the responsive data from the non-responsive data.

In Metter, the government obtained search warrants for Metter’s computer data and requested permission to seize all of Metter’s computers and emails and to perform an off-site search for responsive documents. Id. at 208. The government intended to set up a “taint team” to review the digital evidence for privilege issues. Id. at 210. In the meantime, the government intended to produce all of the electronic evidence to all of the defendants. Id. Metter objected to dissemination of all of his computer data to all defendants and moved to suppress. At the time the suppression motion was fully briefed, 15 months had passed since the government first seized the computer data and emails. Id. at 211.

The district court applied the “flagrant disregard” test and concluded that suppression of all of Metter’s computer data and emails was required. As the court reasoned “the Court cannot, in the interest of justice and fairness, permit the government to ignore its obligations. Otherwise, the Fourth Amendment would lose all force and meaning in the digital era and citizens will have no recourse as to the unlawful seizure of information that falls outside the scope of a search warrant and its subsequent dissemination. Accordingly, Metter’s motion to suppress is granted.” Id. at 216.

In Metter, the government filed an interlocutory appeal to the Second Circuit under 18 U.S.C. § 3731, on the ground that the suppressed evidence was substantial proof of a material fact in the proceeding. During the intervening proceedings, a plea deal was reached and Metter received a sentence of 5 years’ probation. The government’s appeal was therefore withdrawn. See United States v. Metter, 10-CR-600 (DLI), Dkt. Entry 304.

Interestingly, there is no indication that the district court in Metter ever ordered the government to return or destroy Metter’s computer data. But in In re: [REDACTED]@gmail.com, No. 5:14-mj-70655 (PSG) (N.D.Cal. 2014), the court denied the government's application to seize and search a gmail account because the warrant (1) failed to include date restriction and (2) the government did not commit to return or destroy evidence not relevant to its investigation.

5.     The Fourth Amendment’s Protection of Privacy Justifies a Strong Sanction When the Government Unjustifiably Retains Non-Responsive Electronic Data

The compromise of permitting the government to seize all computer data first and search it later, coupled with the Fourth Amendment’s protection of “privacy,” as developed by the Supreme Court, justifies a strong sanction when the government deliberately retains non-responsive computer data. The government is only in possession of this material as a matter of convenience and even the slightest abuse of that position requires strong rebuke by the courts.

The primary purpose of the Fourth Amendment is not to protect tchotchkes and knickknacks. While protecting a person’s home and property against warrantless search and seizure by the government is an important and practical protection provided by the Fourth Amendment, the grander purpose is the protection and nurturing of ideas and thoughts from government prying.

            Looking back at Olmstead, a 5-4 majority of the Supreme Court held that the government did not violate the Fourth Amendment “unless there has been an official search and seizure of his person, or such a seizure of his papers or his tangible material effects, or an actual physical invasion of his house ‘or curtilage’ for the purpose of making a seizure. We think, therefore, that the wire tapping here disclosed did not amount to a search or seizure within the meaning of the Fourth Amendment.” Olmstead, 277 U.S. 438 at 466. In other words, the Court was more concerned with the protection of property, than with the protection of privacy. But that interpretation of the Fourth Amendment has changed over time, especially with the creation of new technologies, such as the telephone and computers, which are based on intangible “property.”

            In his dissenting opinion, Justice Brandeis expressed a more enlightened application of the Fourth Amendment -- one that protected thoughts and ideas, described as “the privacies of life.” Olmstead, 277 U.S. 438 at 474 (quoting Boyd v. United States, 116 U.S. 616, 627-630 (1886)). “’Of all the rights of the citizen, few are of greater importance or more essential to his peace and happiness than the right of personal security, and that involves, not merely protection of his person from assault, but exemption of his private affairs, books, and papers from the inspection and scrutiny of others. Without the enjoyment of this right, all other rights would lose half their value.’” Id. at 475 n.3 (quoting In rePacific R. Com., 32 F. 241, 250 (C.C.D. Cal. 1887)).

Justice Brandeis viewed wiretapping telephone conversations as an especially intrusive investigative instrument that ultimately led to special protections under Title III. As Justice Brandeis observed in Olmstead:

The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.

Olmstead, 277 U.S. at 475-76. Justice Brandeis concluded that the Fourth Amendment’s achievement in protecting privacy extended beyond merely protecting things to protecting ideas, which was even more important:

The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations.  They conferred, as against the Government, the right to be let alone -- the most comprehensive of rights and the right most valued by civilized men.

Id. at 478 (emphasis supplied). And Justice Brandeis recognized that:

Experience should teach us to be most on our guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.


In the years since Olmstead, the exclusively property-based approach to the Fourth Amendment has been expanded, as in United States v. Jones, 132 S. Ct. 945,950, 181 L. Ed. 2d 911, 918, 2012 U.S. LEXIS 1063 *9 (2012), “later cases…have deviated from the exclusively property-based approach [to the Fourth Amendment].” See also Florida v. Jardines, 133 S. Ct. 1409, 185 L.Ed.2d 495, 2013 U.S. LEXIS 2542 (2013) ("By reason of our decision in Katz v. United States, 389 U.S. 347, 88 S. Ct. 507, 19 L. Ed. 2d 576 (1967), property rights 'are not the sole measure of Fourth Amendment violations,' Soldal v. Cook County, 506 U.S. 56, 64, 113 S. Ct. 538, 121 L. Ed. 2d 450 (1992)")Ironically, Jones itself (authored by Justice Scalia) applied a property-based approach in holding that the government violated the defendant’s Fourth Amendment rights by installing a GPS tracking device on his car without a warrant, because “[t]he Government physically occupied private property for the purpose of obtaining information.” Id. 132 S. Ct. at 949; see also Id. at 958 (“Ironically, the Court has chosen to decide this case based on 18th-century tort law.”) (Alito, J., concurring).

In Riley v. California, 134 S. Ct. 2473, 189 L. Ed. 2d 430, 2014 U.S.LEXIS 4497 (2014), the Court returned to a privacy-based Fourth Amendment approach and held that the police could not search a person’s cell phone incident to arrest without a warrant. Noting that “modern cell phones…are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy,” Riley, 134 S. Ct. at 2484, the Court recognized that “[c]ell phones place vast quantities of personal information literally in the hands of individuals.” Id.at 2485. Circling back to the Fourth Amendment’s protection of private thoughts, beliefs, emotions, and ideas, the Court recognized that “[m]odern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans ‘the privacies of life,’” Riley, 134 S. Ct. at 2494-95 (quoting Boyd v. United States, 116 U. S. 616,630, 6 S. Ct. 524, 29 L. Ed. 746 (1886)).

In Riley, the Court recognized that those “privacies of life” included internet search or browsing history revealing an individual’s private interests or concerns, “apps” revealing “information about all aspects of a person’s life,” including “apps for Democratic Party news and Republican Party news; apps for alcohol, drug, and gambling addictions; apps for sharing prayer requests; apps for tracking pregnancy symptoms; apps for planning your budget; apps for every conceivable hobby or pastime; apps for improving your romantic life. There are popular apps for buying or selling just about anything, and the records of such trans-actions may be accessible on the phone indefinitely.” Riley, 134 S. Ct. at 2490.

Consistent with other cases, Riley concluded that a search of a cell phone (or computer) was more intrusive than the search of a person’s home. “Indeed, a cell phone search would typically expose to the government far more than the most exhaustive search of a house: A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form--unless the phone is.” Id. at 2491. Although Riley applied to a cell phone search, the Court’s privacy observations in that case are equally applicable – if not more applicable – to computer and email searches.

6.     The Government Is Entitled To A Reasonable Search, Not A Perfect One

In Riley and Ganias, the Supreme Court and the Second Circuit, respectively, rejected the government’s arguments for why the government’s interest in obtaining electronic evidence should diminish a defendant’s Fourth Amendment right to privacy. Both courts recognized that Fourth Amendment protections will always result in the potential loss of some evidence, but that providing the government with a means to collect all possible evidence was outweighed by Fourth Amendment privacy concerns.

In Riley, the government argued that the police should not be required to obtain a search warrant for a suspect’s cell phone incident to arrest because or whenever: (1) evidence might be destroyed via remote wiping and data encryption (Riley, 134 S. Ct. at2486), (2) an arrestee has a reduced privacy interest upon being taken into custody (Id. at 2488), (3) “it is reasonable to believe that the phone contains evidence of the crime of arrest” (Id. at 2492), (4) “an officer reasonably believes that information relevant to the crime, the arrestee’s identity, or officer safety will be discovered” (Id.), (5) officers should always be able to search a phone’s call log (Id.), and (6) officers could have obtained the same information from a pre-digital counterpart (Id. at 2493).

In Riley, the Supreme Court rejected all of these arguments, pointing out that the government is not entitled to “a complete answer to the problem” as long as there is “a reasonable response.” Id. at 2487. As the Court recognized “we generally determine whether to exempt a given type of search from the warrant requirement ‘by assessing, on the one hand, the degree to which it intrudes upon an individual’s privacy and, on the other, the degree to which it is needed for the promotion of legitimate governmental interests.’ Wyomingv. Houghton, 526 U. S. 295, 300, 119 S. Ct. 1297, 143 L. Ed. 2d 408 (1999).” Riley, 134 S. Ct. at 2484. The Court concluded:

We cannot deny that our decision today will have an impact on the ability of law enforcement to combat crime. Cell phones have become important tools in facilitating coordination and communication among members of criminal enterprises, and can provide valuable incriminating information about dangerous criminals. Privacy comes at a cost.

Id. at 2493; see also Riley, 134 S. Ct. at 2496-97 (“Many cell phones now in use are capable of storing and accessing a quantity of information, some highly personal, that no person would ever have had on his person in hard-copy form. This calls for a new balancing of law enforcement and privacy interests.”) (Alito, J. concurring).

In Ganias, the government attempted to justify retaining indefinitely non-responsive electronic data by arguing that: (1) any “mirror images” the government made of a suspect’s computer were created by the government and were therefore “the government’s property” (Ganias, 2014 U.S. App. LEXIS 11222 at *31), (2) a subsequent search warrant for indefinitely retained non-responsive computer data, cured any Fourth Amendment defect (Id. at 32), (3) the non-responsive data might not exist if the government did not maintain a mirrored image of the defendant’s hard drive (Id. at *34), (4) returning or destroying non-responsive electronic data was “entirely impractical” because doing so would compromise the remaining data in a way that would make it impossible to preserve an evidentiary chain of custody to authenticate the data at trial (Id. at 35), and (5) the proper remedy for the defendant was a motion for the return of property under Fed.R.Crim.P. 41 (g) (Id. at35). The Second Circuit rejected all of these arguments, finding that “the ends…do not justify the means” and therefore none of these practical considerations outweighed the defendant’s privacy interests.

Conclusion


            Unless Congress creates special protocols for electronic searches, as it did for telephone wiretaps in Title III, litigants must rely on ex post, as opposed to ex ante, search rules to govern the scope of electronic searches. Ganias creates a rule that the government may not retain indefinitely non-responsive electronic data, based on the special privacy concerns with computers and the Supreme Court’s focus on the Fourth Amendment’s protection of “the privacies of life” in the cases leading up to and including Riley. Where the government violates this rule, suppression of all the electronic data, as done in Metter, seems to be an appropriate sanction, especially in light of the Second Circuit’s recognition that when it comes to computers “even greater protection is warranted” than in cases involving paper documents. Ganias. 2014U.S. App. LEXIS 11222 at *22. As one court recently reminded us, "constitutional rights, if they are to be rights at all, must have some discernible remedy." See Zherka v. Ryan, 2014 U.S. Dist. LEXIS 140564 *14 (S.D.N.Y. 2014) (Griesa, J.). Therefore, the sanction in Metter is the appropriate one, since merely authorizing suppression of non-responsive data that the government does not seek to introduce into evidence would be, in essence, no remedy at all.

Wednesday, August 13, 2014

ABCs of ACDs (Adjournment in Contemplation of Dismissal)

Misdemeanor and violation cases, such as shoplifting, assault, drugs, open alcohol containers, harassment, theft of services, trespass, etc., are often resolved via an ACD, which stands for “Adjournment in Contemplation of Dismissal” (called an “ACOD” in Nassau, Suffolk and maybe other counties). When the court grants an ACD, the case is adjourned for six months (one year if the case involves marijuana or a family offense) and then dismissed, without the defendant having to return to court – it is done automatically.

Felony cases can also be resolved via an ACD, but often involve a “re-pleader” in which the defendant pleads guilty to something (either a misdemeanor or a felony), with the understanding that if certain conditions are satisfied (community service, drug treatment, restitution, not being re-arrested), the defendant can return to court, withdraw the guilty plea and receive an ACD. Re-pleaders are really just a way to extend the length of the ACD because, by statute, an ACD can only last for six months (CPL 170.55 (2)) or one year (CPL 170.56 (2)). A re-pleader can last for any amount of time agreed upon by the parties and the court.

In 2015, a program called "Project Reset" was established in Brooklyn and Manhattan to permit 16- and 17-year-olds arrested for the first time for low-level offenses -- jumping a subway turnstile, shoplifting, or trespassing -- to avoid criminal charges by participating in a counseling program. Eligible teenagers receive a notice for the program, when they are issued a Desk Appearance Ticket.

Two Types of ACDs – Non-Marijuana v. Marijuana

There are differences between “marijuana ACDs” (CPL 170.56) and all other ACDs (CPL 170.55). For example, a marijuana ACD may be granted “upon motion of the defendant” (CPL 170.56 (1)) – the consent of the district attorney’s office is not required. On the other hand, a non-marijuana ACD may be granted only “upon motion of the people or the defendant and with the consent of the other party.” (CPL 170.55 (1)).

Another difference is that with a non-marijuana ACD, the district attorney’s office has the right to make an application to the court to restore the case to the calendar “at any time not more than six months” (CPL 170.55 (2)) (one year if the case is a family offense). There does not appear to be any statutory mechanism to shorten this time period, although the district attorney’s office could probably consent and waive the time period.

With a marijuana ACD, the statute specifically provides that “the court may modify the conditions or extend or reduce the term of the adjournment, except that the total period of adjournment shall not exceed twelve months.” (CPL 170.56 (2)). Therefore, marijuana ACDs can be as short as one day and judges will often agree to shorten the time period, if the defendant presents a compelling reason to do so.

ACDs v. Acquittal or Dismissal

ACDs are typically an excellent resolution to a case because the case is ultimately dismissed and the record sealed. To use a baseball analogy, “a walk is as good as a hit” and an ACD is nearly the equivalent of an outright dismissal or acquittal after trial, but there are some differences.

One difference is that an ACD is not deemed a favorable termination for purposes of malicious prosecution or false arrest claims, under 42 U.S.C. 1983See Green v. Mattingly, 585 F.3d 97, 103-04 (2d Cir. 2009). In other words, if you accept an ACD, you probably can’t sue the police or prosecution for false arrest or malicious prosecution.

A second difference is that at least one federal court has held that an ACD is the equivalent of a “pre-trial diversion program” and may be relied upon to disqualify a person from working at an FDIC-insured institution, e.g., a bank. In Smith v. Bank of America Corp., 865 F.Supp.2d 298 (E.D.N.Y. 2012), the United States District Court for the Eastern District of New York held that an ACD satisfied the definition of a “pretrial diversion or similar program” under 12 U.S.C. 1829 (a)(1)(A)(i). Under that section, any person “who has been convicted of any criminal offense involving dishonesty or a breach of trust or money laundering, or has agreed to enter into a pretrial diversion or similar program in connection with the prosecution for such offense, may not . . . become . . . an institution-affiliated party with respect to any insured depository institution.” See also In the Matter of Gaby Cucu, FDIC-08-341L (FDIC 2009) (granting a waiver to individual who received an ACD for jumping a subway turnstile as a high school student and was terminated for that reason under 12 U.S.C. 1829).

According to Smith, a defendant who received an ACD for any criminal offense involving 1) dishonesty, 2) breach of trust, or 3) money laundering, may not become “an institution-affiliated party” (i.e., an employee) of “any insured depository institution” (i.e., any FDIC-insured bank). In Smith, the defendant had received an ACD for shoplifting -- a criminal offense involving “dishonesty” -- and could therefore not be employed by Bank of America. The district court implied that the defendant’s lawyer had been constitutionally ineffective in failing to advise her of this potential consequence of accepting an ACD or her right to apply for a federal waiver (calling these “serious omissions by counsel”) and citing Padilla v. Kentucky, 130 S. Ct. 1473, 176 L. Ed. 2d 284 (2010), the Supreme Court case that held counsel was constitutionally ineffective for failing to inform defendant of automatic deportation that would follow guilty plea.

Can A Defendant Deny Having Been Arrested If The Case Is Dismissed? 

A question that usually comes up when a defendant is considering accepting an ACD is whether the defendant must disclose the fact that they were arrested if asked by employers or on other applications. The answer is: it depends.

It is important to understand the statutory framework in New York that applies to ACDs.

Dismissed Criminal Cases Are A “Nullity” Under New York Law

In general, all dismissed cases are deemed a “nullity” under New York law and a person is entitled to be restored to the status he occupied before his arrest and prosecution. There are three statutory sections in the Criminal Procedure Law that explain the legal effect of an ACD – CPL 160.60 (which addresses all dismissals, including all ACDs), 170.55 (8) (which addresses regular ACDs), and 170.56 (4) (which addresses marijuana ACDs).

            Criminal Procedure Law 170.56 (4) (marijuana ACDs) provides that “Upon the granting of an order pursuant to subdivision three, the arrest and prosecution shall be deemed a nullity and the defendant shall be restored, in contemplation of law, to the status he occupied before his arrest and prosecution.”

            Criminal Procedure Law 170.55 (8) (regular ACDs) provides that “The granting of an adjournment in contemplation of dismissal shall not be deemed to be a conviction or an admission of guilt. No person shall suffer any disability or forfeiture as a result of such an order. Upon the dismissal of the accusatory instrument pursuant to this section, the arrest and prosecution shall be deemed a nullity and the defendant shall be restored, in contemplation of law, to the status he occupied before his arrest and prosecution.”

            Criminal Procedure Law 160.60 (all dismissals) provides that “Upon the termination of a criminal action or proceeding against a person in favor of such person, as defined in subdivision two of section 160.50 of this chapter, the arrest and prosecution shall be deemed a nullity and the accused shall be restored, in contemplation of law, to the status he occupied before the arrest and prosecution. The arrest or prosecution shall not operate as a disqualification of any person so accused to pursue or engage in any lawful activity, occupation, profession, or calling. Except where specifically required or permitted by statute or upon specific authorization of a superior court, no such person shall be required to divulge information pertaining to the arrest or prosecution.”

            CPL 160.60 applies to cases that have been terminated in favor of a person against whom there was a criminal action or proceeding. According to CPL 160.50 (3)(b), a criminal action or proceeding against a person shall be considered terminated in favor of such person where an order has been entered to dismiss the entire accusatory instrument against such person pursuant to section 170.55 (regular ACDs) or 170.56 (marijuana ACDs).

As New York’s highest court, the New York Court of Appeals, has recognized:

the Legislature’s objective in enacting CPL 160.50 and the related statutes concerning the rights of exonerated accuseds was to ensure that the protections provided be “consistent with the presumption of innocence, which simply means that no individual should suffer adverse consequences merely on the basis of an accusation, unless the charges were ultimately sustained in a court of law” (Governor’s Approval Mem, 1976 McKinney’s Session Laws of NY, at 2451). Indeed, the over-all scheme of the enactments demonstrates that the legislative objective was to remove any “stigma” flowing from an accusation of criminal conduct terminated in favor of the accused, thereby affording protection (i.e., the presumption of innocence) to such accused in the pursuit of employment, education, professional licensing and insurance opportunities (citation omitted).


The companion statute to CPL 160.50, New York Executive Law § 296 (16), provides additional protection:

It shall be an unlawful discriminatory practice, unless specifically required or permitted by statute, for any person, agency, bureau, corporation or association, including the state and any political subdivision thereof, to make any inquiry about, whether in any form of application or otherwise, or to act upon adversely to the individual involved, any arrest or criminal accusation of such individual not then pending against that individual which was followed by a termination of that criminal action or proceeding in favor of such individual, as defined insubdivision two of section 160.50 of the criminal procedure law, in connection with the licensing, employment or providing of credit or insurance to such individual; provided, however, that the provisions hereof shall not apply to the licensing activities of governmental bodies in relation to the regulation of guns, firearms and other deadly weapons or in relation to an application for employment as a police officer or peace officer as those terms are defined in subdivisions thirty-three and thirty-four of section 1.20 of the criminal procedure law.

There Are Exceptions to the “Nullity” Rule

There are several important exceptions that apply to ACDs in which the existence of the underlying prosecution may be disclosed. First, CPL 160.60 states that “Except where specifically required or permitted by statute or upon specific authorization of a superior court, no such person shall be required to divulge information pertaining to the arrest or prosecution.” This exception was relied upon in Smith v. Bank of America Corp., 865 F.Supp.2d 298 (E.D.N.Y. 2012) (discussed above) to conclude that 12 U.S.C. 1829 (a)(1)(A)(i) created the type of statutory exception contemplated by CPL 160.60.

Second, Executive Law 296 (16) provides “that the provisions hereof shall not apply to the licensing activities of governmental bodies in relation to the regulation of guns, firearms and other deadly weapons or in relation to an application for employment as a police officer or peace officer.”

Third, CPL 160.50 (1)(d) lists circumstances under which sealed records can be made available to:
  1. the defendant or the defendant’s agent,
  2. a prosecutor if the defendant moves for a marijuana ACD under 170.56,
  3. law enforcement upon a showing that “justice requires” disclosure,
  4. a state or local agency that issues gun licenses,
  5. the New York State Department of Corrections if the defendant was on parole,
  6. a prospective employer of a police officer/peace officer, if the defendant applies for a job,
  7. any Probation Department responsible for the defendant’s supervision.

Judicial decisions in New York offer further guidance. In In the Matter of Wilson v. NYPD License Division, 2012 N.Y. Misc. LEXIS 4008; 2012 NY Slip Op 32191U (S.Ct. NY County 2012), the New York State Supreme Court held that an applicant for a handgun license correctly and truthfully answered “no” to the question on the licensing application asking “Have you ever been arrested?,” despite the fact that the handgun license application required the applicant to provide information about prior criminal cases “even if: the case was dismissed, the record sealed or the case nullified by operation of law.” The Court concluded that the applicant was entitled to deny her arrest, because it was a nullity, and she was restored to her status before the arrest, as if it never occurred. In the Matter of Wilson, 2012 N.Y. Misc. LEXIS 4008 *6. In the Court’s view, “[the NYPD] may not create a duty to disclose a fact that never occurred.” The Court also held that the NYPD could not consider the applicant’s arrest and/or failure to disclose the arrest as grounds to deny her handgun license application. Id. at *11-12.

In March 2014, however, the Appellate Division, First Department reversed and held that:

An applicant for a handgun license who was previously arrested is required to submit a certificate of disposition showing the offense and disposition of charges, as well as a detailed statement describing the circumstances of the arrest (see Rules of the City of NY Police Dept [RCNY] § 5-05(6)). Although petitioner’s arrest was a nullity after the charges against her were dismissed (see N.Y. Crim. Proc. Law § 160.60), she was required to disclose it on the application. Her denial that she was arrested constitutes a false statement which is a sufficient ground for the denial of the application (see Penal Law § 400.00DeMeo v Bratton, 237 AD2d 111, 112, 655 N.Y.S.2d 1 (1st Dept 1997)).

(6) Arrest information. If the applicant was ever arrested for any reason s/he shall submit a Certificate of Disposition showing the offense and disposition of the charges. Also, the applicant shall submit a detailed statement describing the circumstances surrounding each arrest. This statement shall be affirmed in writing. The applicant shall do this even if the case was dismissed, the record sealed or the case nullified by operation of law. The New York State Division of Criminal Justice Services shall report to the Police Department every instance involving the arrest of an applicant. The applicant shall not rely on anyone’s representation that s/he need not list a previous arrest.

In addition, licensing for a firearm requires “an investigation and finding that all statements in a proper application for a license are true.” New York Penal Law § 400.00 (1).

Although not explicitly stated by the First Department, 38 RCNY § 5-05 (b)(6) creates the type of statutory exception contemplated by CPL 160.60. In fact, there is a double exception when it comes to firearms, because Executive Law 296 (16) provides “that the provisions hereof shall not apply to the licensing activities of governmental bodies in relation to the regulation of guns, firearms and other deadly weapons or in relation to an application for employment as a police officer or peace officer.” Therefore, the First Department could have based its holding on this statutory provision as well.

If no specific statutory exception exists, then it appears that a person can legally deny being arrested if the case was dismissed. In People v. Ellis, 184 A.D.2d 307, 584 N.Y.S.2d 569 (1st Dep’t 1992), the First Department held that it was not error for an assault victim to deny the existence of two prior dismissed and sealed arrests during his direct testimony. When the victim was cross-examined about those dismissed cases, the trial court struck the testimony. The First Department affirmed the conviction, concluding that “It was not error for the prosecutor to fail to disclose such confidential information, nor was it error for the complainant to deny the existence of prior arrests during direct examination.” Ellis, 184 A.D.2d at 308, 584 N.Y.S.2d at 570. The victim was permitted to avail himself of the statutory “nullity” that accompanied dismissal of his cases and could testify under oath that they never occurred.

Federal courts have relied on Ellis to conclude that witnesses may deny the existence of prior arrests if their cases were dismissed and sealed. See Padilla v. Artuz, 2010 U.S. Dist. LEXIS 144969 *18 (S.D.N.Y. 2010) (”As interpreted by New York courts, an individual testifying in court may deny the existence of a prior arrest that was sealed pursuant to Section 160.50See People v. Ellis, 184 A.D.2d 307, 308, 584 N.Y.S.2d 569 (1992). As Ellis was thus permitted by state law to testify that he had never been arrested, Petitioner had no basis to impeach Ellis on that point.”) (by coincidence, the witness’ name in Padilla was “Ellis”); see also First American Corp. v. Al-Nahyan, 2 F.Supp.2d 58, 62 (D.C. Cir. 1998) (“It is clear that § 160.60 operates to allow a person protected by the Sealing Statute, as defined in § 160.50(1)(d) (hereafter a ‘protected individual’), to truthfully state on an application for employment, or even under oath in a court of law, that no arrest or prosecution took place.”) (citing Ellis).

What Rights Exist After a Case Has Been Dismissed Via an ACD?

Pursuant to CPL 160.50 (1) (a)-(c), after a case has been dismissed by way of an ACD, the following things must occur:

1.     the record of the proceeding shall be sealed,

2.     the clerk of the court shall notify (a) the commissioner of the division of criminal justice services and (b) the heads of all appropriate police departments and other law enforcement agencies that the action has been terminated in favor of the accused and that the record shall be sealed,

3.     upon notification from the clerk of the court, the following items shall be either destroyed or returned to the defendant (the choice is up to the agency):

a.      all photographs of the person,
b.     all fingerprints and palmprints (except for marijuana ACDs), and
c.      all official records or papers (except published court decisions).


In addition, under CPL 160.50 (4), a person in whose favor a criminal action or proceeding was terminated is entitled to an order from the court granting the relief listed in CPL 160.50 (1).