In Re the Search of Apple iPhone, IMEI 013888003738427

31 F. Supp. 3d 159, 2014 U.S. Dist. LEXIS 39703
CourtDistrict Court, District of Columbia
DecidedMarch 26, 2014
DocketCriminal No. 2014-0278
StatusPublished
Cited by3 cases

This text of 31 F. Supp. 3d 159 (In Re the Search of Apple iPhone, IMEI 013888003738427) is published on Counsel Stack Legal Research, covering District Court, District of Columbia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
In Re the Search of Apple iPhone, IMEI 013888003738427, 31 F. Supp. 3d 159, 2014 U.S. Dist. LEXIS 39703 (D.D.C. 2014).

Opinion

MEMORANDUM OPINION AND ORDER

JOHN M. FACCIOLA, UNITED STATES MAGISTRATE JUDGE

Pending before the Court is an Application for a search and seizure warrant pursuant to Rule 41 of the Federal Rules of Criminal Procedure for an Apple iPhone 4. See Affidavit In Support of Application for Search Warrant at 6 (hereinafter the “Affidavit”). 1 In response to this Court’s recent rulings with respect to the proper *161 scope of searches of electronic devices, 2 the government has provided a detailed “Attachment B” — which lists the items to be seized from the iPhone — and a new section, entitled “Electronic Storage and Forensic Analysis” (hereinafter “Forensic Analysis section”). See Affidavit at 10-15. Although Attachment B provides a sufficiently particularized list of the data that the government will search for and seize, the Forensic Analysis section fails to provide this Court with the same level of detail as to the methodologies to be used to conduct the search. Specifically, the government fails to articulate how it will limit the possibility that data outside the scope of the warrant will be searched. For the reasons stated below, the government’s Application for a search and seizure warrant will, therefore, be denied.

I. Background

The government’s Application is part of its investigation of Daniel Milzman, a Georgetown University student suspected of creating ricin in his dorm room in violation of 18 U.S.C. § 175. 3 See Affidavit at 3-4. Pursuant to a search and seizure warrant issued by this Court on March 18, 2014, see In the Matter of the Search of the Premises Located at Georgetown University [REDACTED], Mag. Case No. 14-263 (sealed), the government seized the iPhone at issue. 4 In that warrant, the Court in-terlineated a requirement that a separate search and seizure warrant must be obtained to actually search the contents of the iPhone. See Id., Mag. Case No. 14-263 [# 4] at 5-6.

The government has now returned for that subsequent search and seizure warrant. Pursuant to a standard format used by the government, the Application contains an “Attachment A,” which describes the device to be searched, and Attachment B, which lists the specific data to be seized. See Affidavit at 13-15. Specifically, Attachment B says:

ATTACHMENT B

LIST OF ITEMS AUTHORIZED TO BE SEARCHED FOR AND SEIZED PURSUANT TO FEDERAL SEARCH WARRANT AT THE TARGET RESIDENCE

1. All records on the Device described in Attachment A that reference or relate to violations of Title 18, United States Code, Section 175 (development, production, stockpile, transfer, acquisition, retention, or possession of a biological agent, toxin, or delivery system) and involve DANIEL HARRY MILZMAN, including:
a. Records of or information about the Device’s Internet activity, including firewall logs, caches, browser history and cookies, . “bookmarked” or “favorite” web *162 pages, search terms that the user entered into any Internet search engine, and records of user-typed web addresses;
b. Records of activities relating to the operation and ownership of the Device, such as telephone incoming/outgoing call records, notes (however and wherever written, stored, or maintained), electronic books, diaries, and reference materials.
c. Records of address or identifying information for DANIEL HARRY MILZMAN and (however and wherever written, stored, or maintained) contact lists, user IDs, elDs (electronic ID numbers), and passwords.
d. Any digital images documenting, referencing, or related to the production, storage, or dissemination of biological agents, toxins, or delivery systems;
e. GPS data stored on the Device to include the Device’s location and search history;
f. Any records of activity indicative of purchases potentially related to materials used in the production and/or storage of biological agents, toxins, or delivery systems;
g. Evidence of user attribution showing who used or owned the Device during the time the violation described in this warrant is suspected of being committed, such as logs, phonebooks, saved user-names and passwords;
h. Any communications referencing or relating to the production or possession of ricin, to include text messages and e-mails;
2. Records evidencing the use of Internet Protocol addresses, including:
a. Records of specific Internet Protocol addresses used and accessed;
b. Records of Internet activity, including firewall logs, caches, browser history and cookies, “bookmarked” or “favorite” web pages, search terms that the user entered into any Internet search engine, and records of user-typed web addresses.
3. As used above, the terms “records” and “information” include all of the foregoing items of evidence in whatever form and by whatever means they may have been created or stored.
4. Contextual information necessary to understand the evidence described in this attachment.

Id. at 14-15.

For the first time in this Court’s experience, the government has also included a Forensic Analysis section. That section provides: 5

ELECTRONIC STORAGE AND FORENSIC ANALYSIS

23. .Based on my knowledge, training, and experience, I know that electronic devices can store information for long periods of time. Similarly, things that have been viewed via the Internet are typically stored for some period of time on the device. This information can sometimes be recovered with forensics tools.
24. Forensic evidence. As further described in Attachment B, this application seeks permission to locate not only electronically stored information that might serve as direct *163 evidence of the crimes described on the warrant, but also forensic evidence that establishes how the Device to be seized was used, the purpose of its use, who used it, and when. There is probable cause to believe that this forensic electronic evidence might be on this Device because:
a.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Okafor
District of Columbia, 2024
Richardson v. State
282 A.3d 98 (Court of Appeals of Maryland, 2022)
STATE OF TENNESSEE v. CHRISTOPHER MCLAWHORN
Court of Criminal Appeals of Tennessee, 2020

Cite This Page — Counsel Stack

Bluebook (online)
31 F. Supp. 3d 159, 2014 U.S. Dist. LEXIS 39703, Counsel Stack Legal Research, https://law.counselstack.com/opinion/in-re-the-search-of-apple-iphone-imei-013888003738427-dcd-2014.