United States v. Ganias , 755 F.3d 125 ( 2014 )


Menu:
  • 12-240-cr
    United States v. Ganias
    UNITED STATES COURT OF APPEALS
    FOR THE SECOND CIRCUIT
    August Term 2012
    (Argued: April 11, 2013        Decided: June 17, 2014)
    Docket No. 12-240-cr
    UNITED STATES OF AMERICA,
    Appellee,
    v.
    STAVROS M. GANIAS,
    Defendant-Appellant.
    Before:
    HALL and CHIN, Circuit Judges,
    and RESTANI, Judge.*
    Appeal from a judgment of the United States District Court for the
    District of Connecticut convicting defendant-appellant, following a jury trial, of
    *
    The Honorable Jane A. Restani, of the United States Court of International
    Trade, sitting by designation.
    tax evasion. Defendant-appellant appeals on the grounds that: (1) the district
    court (Thompson, J.) erred in denying his motion to suppress his personal
    computer records, which had been retained by the Government for more than
    two-and-a-half years after it copied his computer hard drives pursuant to a
    search warrant calling for the seizure of his clients' business records; and (2) the
    district court (Burns, J.) abused its discretion in failing to order a new trial where
    a juror posted comments about the trial on his Facebook page and became
    Facebook friends with another juror during the trial. We find no abuse of
    discretion as to the second issue, but we conclude, however, that defendant-
    appellant's Fourth Amendment rights were violated by the unauthorized
    retention of his personal files. Accordingly, we vacate the judgment and remand
    for further proceedings.
    VACATED and REMANDED.
    Judge Hall concurs in part and dissents in part in a separate opinion.
    SARALA V. NAGALA, Assistant United States Attorney
    (Anastasia E. King and Sandra S. Glover, Assistant
    United States Attorneys, on the brief), for David B.
    Fein, United States Attorney for the District of
    Connecticut, New Haven, Connecticut, for
    Appellee.
    -2-
    STANLEY A. TWARDY, JR. (Daniel E. Wenner, on the brief),
    Day Pitney LLP, Stamford, Connecticut, for
    Defendant-Appellant.
    CHIN, Circuit Judge:
    In this case, defendant-appellant Stavros M. Ganias appeals from a
    judgment convicting him, following a jury trial, of tax evasion. He challenges the
    conviction on the grounds that his Fourth Amendment rights were violated when
    the Government copied three of his computer hard drives pursuant to a search
    warrant and then retained files beyond the scope of the warrant for more than
    two-and-a-half years. He also contends that his right to a fair trial was violated
    when, during the trial, a juror posted comments about the case on his Facebook
    page and "friended" another juror. We reject the second argument but hold that
    the Government's retention of the computer records was unreasonable.
    Accordingly, we vacate the conviction and remand for further proceedings.
    -3-
    STATEMENT OF THE CASE
    A.    The Facts1
    In the 1980s, after working for the Internal Revenue Service ("IRS")
    for some fourteen years, Ganias started his own accounting business in
    Wallingford, Connecticut. He provided tax and accounting services to
    individuals and small businesses. In 1998, he began providing services to James
    McCarthy and two of McCarthy's businesses, American Boiler and Industrial
    Property Management ("IPM"). IPM had been hired by the Army to provide
    maintenance and security at a vacant Army facility in Stratford, Connecticut.
    In August 2003, the Criminal Investigative Command of the Army
    received a tip from a confidential source that individuals affiliated with IPM were
    engaging in improper conduct, including stealing copper wire and other items
    from the Army facility and billing the Army for work that IPM employees
    performed for American Boiler. The source alleged that evidence of the
    wrongdoing could be found at the offices of American Boiler and IPM, as well as
    1
    The facts relevant to the issues on appeal are largely undisputed and are
    drawn from the testimony at the hearing on Ganias's motion to suppress, the decision of
    the district court (Thompson, J.) denying the suppression motion, and the transcript of
    the trial.
    -4-
    at the offices of "Steve Gainis [sic]," who "perform[ed] accounting work for IPM
    and American Boiler."2
    Based on this information, the Army commenced an investigation.
    Army investigators obtained several search warrants, including one to search the
    offices of Ganias's accounting business. The warrant, issued by the United States
    District Court for the District of Connecticut and dated November 17, 2003,
    authorized the seizure from Ganias's offices of:
    All books, records, documents, materials, computer
    hardware and software and computer associated data
    relating to the business, financial and accounting
    operations of [IPM] and American Boiler . . . .
    The warrant was executed two days later. Army computer
    specialists accompanied investigators to Ganias's offices and helped gather the
    electronic evidence. The agents did not seize Ganias's computers; instead, the
    computer specialists made identical copies, or forensic mirror images, of the hard
    drives of all three of Ganias's computers. As a consequence, the investigators
    copied every file on all three computers -- including files beyond the scope of the
    warrant, such as files containing Ganias's personal financial records. Ganias was
    2
    The record reflects that Ganias, whose first name is Stavros, was often
    referred to as "Steve."
    -5-
    present as the investigators collected the evidence, and he expressed concern
    about the scope of the seizure. In response, one agent "assured" Ganias that the
    Army was only looking for files "related to American Boiler and IPM."
    Everything else, the agent explained, "would be purged once they completed
    their search" for relevant files.
    Back in their offices, the Army computer specialist copied the data
    taken from Ganias's computers (as well as data obtained from the searches of the
    offices of IPM and American Boiler) onto "two sets of 19 DVDs," which were
    "maintained as evidence." Some eight months later, the Army Criminal
    Investigation Lab finally began to review the files.
    In the meantime, while reviewing the paper documents retrieved
    from Ganias's offices, the Army discovered suspicious payments made by IPM to
    an unregistered business, which was allegedly owned by an individual who had
    not reported any income from that business. Based on this evidence, in May
    2004, the Army invited the IRS to "join the investigation" of IPM and American
    Boiler and gave copies of the imaged hard drives to the IRS so that it could
    conduct its own review and analysis. The Army and the IRS proceeded,
    separately, to search the imaged hard drives for files that appeared to be within
    the scope of the warrant and to extract them for further review.
    -6-
    By December 2004, some thirteen months after the seizure, the Army
    and IRS investigators had isolated and extracted the computer files that were
    relevant to IPM and American Boiler and thus covered by the search warrant.
    The investigators were aware that, because of the constraints of the warrant, they
    were not permitted to review any other computer records. Indeed, the
    investigators were careful, at least until later, to review only data covered by the
    November 2003 warrant.
    They did not, however, purge or delete the non-responsive files. To
    the contrary, the investigators retained the files because they "viewed the data as
    the government's property, not Mr. Ganias's property." Their view was that
    while items seized from an owner will be returned after an investigation closes,
    all of the electronic data here were evidence that were to be protected and
    preserved. As one agent testified, "[W]e would not routinely go into DVDs to
    delete data, as we're altering the original data that was seized. And you never
    know what data you may need in the future. . . . I don't normally go into
    electronic data and start deleting evidence off of DVDs stored in my evidence
    room." The computer specialists were never asked to delete (or even to try to
    delete) those files that did not relate to IPM or American Boiler.
    -7-
    In late 2004, IRS investigators discovered accounting irregularities
    regarding transactions between IPM and American Boiler in the paper
    documents taken from Ganias's office. After subpoenaing and reviewing the
    relevant bank records in 2005, they began to suspect that Ganias was not
    properly reporting American Boiler's income. Accordingly, on July 28, 2005,
    some twenty months after the seizure of his computer files, the Government
    officially expanded its investigation to include possible tax violations by Ganias.
    Further investigation in 2005 and early 2006 indicated that Ganias had been
    improperly reporting income for both of his clients, leading the Government to
    suspect that he also might have been underreporting his own income.
    At that point, the IRS case agent wanted to review Ganias's personal
    financial records and she knew, from her review of the seized computer records,
    that they were among the files in the DVDs copied from Ganias's hard drives.
    The case agent was aware, however, that Ganias's personal financial records
    were beyond the scope of the November 2003 warrant, and consequently she did
    not believe that she could review the non-responsive files, even though they were
    already in the Government's possession.
    -8-
    In February 2006, the Government asked Ganias and his counsel for
    permission to access certain of his personal files that were contained in the
    materials seized in November 2003. Ganias did not respond, and thus, on April
    24, 2006, the Government obtained another warrant to search the preserved
    images of Ganias's personal financial records taken in 2003. At that point, the
    images had been in the Government's possession for almost two-and-a-half
    years. Because Ganias had altered the original files shortly after the Army
    executed the 2003 warrant, the evidence obtained in 2006 would not have existed
    but for the Government's retention of those images.
    B.    Procedural History
    1.     The Indictment
    In October 2008, a grand jury indicted Ganias and McCarthy for
    conspiracy and tax evasion. The grand jury returned a superseding indictment in
    December 2009, containing certain counts relating to McCarthy's taxes and two
    counts relating to Ganias's personal taxes. The latter two counts were asserted
    only against Ganias. The case was assigned to Chief Judge Alvin W. Thompson.
    2.     The Motion to Suppress
    In February 2010, Ganias moved to suppress the computer files that
    are the subject of this appeal. In April 2010, the district court (Thompson, J.) held
    -9-
    a two-day hearing and, on April 14, 2010, it denied the motion, with an indication
    that a written decision would follow. On June 24, 2011, the district court filed its
    written decision explaining the denial of Ganias's motion to suppress. See United
    States v. Ganias, No. 3:08 Cr. 224, 
    2011 WL 2532396
    (D. Conn. June 24, 2011).
    3.     The Trial
    In April 2010, the case was transferred to Judge Ellen Bree Burns for
    trial. In May 2010, the district court severed the two counts against Ganias for tax
    evasion with respect to his personal taxes from the other charges.3
    Trial commenced on March 8, 2011, with jury selection, and
    testimony was scheduled to begin on March 10, 2011. At 9:34 p.m. on March 9,
    the evening before the start of the evidence, one of the jurors, Juror X, posted a
    comment on his Facebook page: "Jury duty 2morrow. I may get 2 hang
    someone...can't wait."
    Juror X's posting prompted responses from some of his online
    "friends," including: "gettem while the're young !!!...lol" and "let's not be to hasty.
    Torcher first, then hang! Lol." During the trial, Juror X continued to post
    comments about his jury service, including:
    3
    All the other counts were later dismissed.
    -10-
    March 10 at 3:34 pm:
    Shit just told this case could last 2 weeks..
    Jury duty sucks!
    March 15 at 1:41 pm:
    Your honor I object! This is way too
    boring.. somebody get me outta here.
    March 17 at 2:07 pm:
    Guiness for lunch break. Jury duty ok
    today.
    During the second week of trial, Juror X became Facebook friends
    with another one of the jurors.
    On April 1, 2011, the jury convicted Ganias on both counts. Later
    that evening, at 9:49 pm, Juror X posted another comment on his Facebook page:
    "GUILTY:)." He later elaborated:
    I spent the whole month of March in court. I do believe
    justice prevailed! It was no cake walk getting to the
    end! I am glad it is over and I have a new experience
    under my belt!
    4.    The Motion for a New Trial
    On August 17, 2011, Ganias moved for a new trial based on alleged
    juror misconduct. On August 30, 2011, the district court (Burns, J.) held an
    -11-
    evidentiary hearing and took testimony from Juror X. The district court denied
    the motion (as well as a request for the further taking of evidence) in a decision
    filed on October 5, 2011. See United States v. Ganias, No. 3:08 Cr. 224, 
    2011 WL 4738684
    (D. Conn. Oct. 5, 2011).
    At the post-trial evidentiary hearing, Juror X explained that he
    posted the comment on his Facebook page about "hang[ing] someone" as "a joke,
    all friend stuff," and that he was "[j]ust joking, joking around." At first he could
    not recall whether he had any conversations with the other juror, with whom he
    became Facebook friends during the trial, outside the court. He later clarified,
    however, that he did not have any conversations with the other juror during the
    course of the trial, prior to deliberations, about the subject matter of the case. He
    also testified that he in fact considered the case fairly and impartially. The
    district court accepted Juror X's testimony, found that he was credible, and
    concluded that he had participated in the deliberations impartially and in
    good faith.
    5.      Sentencing
    On January 5, 2012, the district court (Burns, J.) sentenced Ganias
    principally to twenty-four months' imprisonment. This appeal followed. Ganias
    was released pending appeal.
    -12-
    DISCUSSION
    Ganias raises two issues on appeal: first, he contends that his Fourth
    Amendment rights were violated when the Government seized his personal
    computer records and then retained them for more than two-and-a-half years;
    and, second, he contends that he was entitled to a new trial because of the jury's
    improper use of social media.
    As to the Fourth Amendment issue, we review the district court's
    findings of fact for clear error, viewing the evidence in the light most favorable to
    the Government, and its conclusions of law de novo. United States v. Ramos, 
    685 F.3d 120
    , 128 (2d Cir.), cert. denied, 
    133 S. Ct. 567
    (2012). As to the issue of the
    district court's denial of Ganias's motion for a new trial for alleged juror
    misconduct, we review for abuse of discretion. United States v. Farhane, 
    634 F.3d 127
    , 168 (2d Cir.), cert. denied, 
    132 S. Ct. 833
    (2011).
    Although we vacate Ganias's conviction on the Fourth Amendment
    grounds, we address his juror misconduct claim because the increasing
    popularity of social media warrants consideration of this question. We address
    the juror misconduct question first, as it presents less difficult legal issues, and
    we then turn to the Fourth Amendment question.
    -13-
    A.     Juror's Improper Use of Social Media
    1.     Applicable Law
    Defendants have the right to a trial "by an impartial jury." U.S.
    Const. amend. VI. That right is not violated, however, merely because a juror
    places himself in a "potentially compromising situation." United States v. Aiello,
    
    771 F.2d 621
    , 629 (2d Cir. 1985), abrogated on other grounds by Rutledge v. United
    States, 
    517 U.S. 292
    (1996); see also Smith v. Phillips, 
    455 U.S. 209
    , 217 (1982) ("[I]t is
    virtually impossible to shield jurors from every contact or influence that might
    theoretically affect their vote."). A new trial will be granted only if "the juror's
    ability to perform her duty impartially has been adversely affected," 
    Aiello, 771 F.2d at 629
    , and the defendant has been "substantially prejudiced" as a result,
    United States v. Fumo, 
    655 F.3d 288
    , 305 (3d Cir. 2011). Although courts are
    understandably reluctant to invade the sanctity of the jury's deliberations, the
    trial judge should inquire into a juror's partiality where there are reasonable
    grounds to believe the defendant may have been prejudiced. United States v.
    Schwarz, 
    283 F.3d 76
    , 97 (2d Cir. 2002); United States v. Sun Myung Moon, 
    718 F.2d 1210
    , 1234 (2d Cir. 1983). That inquiry should end, however, as soon as it
    becomes apparent that those reasonable grounds no longer exist. See Sun Myung
    
    Moon, 718 F.2d at 1234
    .
    -14-
    B.     Application
    A juror who "friends" his fellow jurors on Facebook, or who posts
    comments about the trial on Facebook, may, in certain circumstances, threaten a
    defendant's Sixth Amendment right to an impartial jury.4 Those circumstances,
    however, are not present here. The district court inquired into the matter and
    credited Juror X's testimony that he deliberated impartially and in good faith.
    The district judge's credibility determination was not clearly erroneous, and thus
    she did not abuse her discretion in denying the motion for a new trial.
    This case demonstrates, however, that vigilance on the part of trial
    judges is warranted to address the risks associated with jurors' use of social
    media. The Third Circuit has endorsed the use of jury instructions like those
    proposed by the Judicial Conference Committee on Court Administration and
    Case Management. See 
    Fumo, 655 F.3d at 304-05
    . We do so as well.
    4
    See, e.g., 
    Fumo, 655 F.3d at 331
    (Nygaard, J., concurring) ("The availability
    of the Internet and the abiding presence of social networking now dwarf the previously
    held concern that a juror may be exposed to a newspaper article or television
    program."); United States v. Juror Number One, 
    866 F. Supp. 2d 442
    , 451 (E.D. Pa. 2011)
    ("[T]he extensive use of social networking sites, such as Twitter and Facebook, have
    exponentially increased the risk of prejudicial communication amongst jurors and
    opportunities to exercise persuasion and influence upon jurors."). See generally Amy. J.
    St. Eve & Michael A. Zuckerman, Ensuring an Impartial Jury in the Age of Social Media, 11
    Duke L. & Tech. Rev. 1 (2012).
    -15-
    The Committee proposes that, before trial, the district judge give an
    instruction that includes the following:
    I know that many of you use cell phones,
    Blackberries, the internet and other tools of
    technology. You also must not talk to anyone
    about this case or use these tools to communicate
    electronically with anyone about the case. This
    includes your family and friends. You may not
    communicate with anyone about the case on your
    cell phone, through e-mail, Blackberry, iPhone,
    text messaging, or on Twitter, through any blog
    or website, through any internet chat room, or by
    way of any other social networking websites,
    including Facebook, My Space, LinkedIn, and
    YouTube.5
    The Committee also recommends giving a similar instruction at the close of
    the case:
    During your deliberations, you must not
    communicate with or provide any information to
    anyone by any means about this case. You may
    not use any electronic device or media, such as a
    telephone, cell phone, smart phone, iPhone,
    Blackberry or computer; the internet, or any
    internet service, or any text or instant messaging
    service; or any internet chat room, blog, or
    website, such as Facebook, My Space, LinkedIn,
    5
    Judicial Conference Comm. on Court Admin. & Case Mgmt., Proposed
    Model Jury Instructions: The Use of Electronic Technology to Conduct Research on or
    Communicate about a Case (December 2009), available at www.uscourts.gov/uscourts/
    News/2010/docs/DIR10-018-Attachment.pdf.
    -16-
    YouTube or Twitter, to communicate to anyone
    any information about this case or to conduct any
    research about this case until I accept your
    verdict.6
    Here, while the district court gave an appropriate instruction at the
    start of the jury's deliberations, it does not appear that it did so earlier. As
    demonstrated by this case, instructions at the beginning of deliberations may not
    be enough. We think it would be wise for trial judges to give the Committee's
    proposed instructions both at the start of trial and as deliberations begin, and to
    issue similar reminders throughout the trial before dismissing the jury each day.
    While situations like the one in this case will not always require a new trial, it is
    the better practice for trial judges to be proactive in warning jurors about the
    risks attending their use of social media.
    B.    The Seizure and Retention of Ganias's Computer Records
    1.     Applicable Law
    The Fourth Amendment protects the rights of individuals "to be
    secure in their persons, houses, papers, and effects, against unreasonable
    searches and seizures." U.S. Const. amend. IV; see, e.g., United States v. Ramirez,
    
    523 U.S. 65
    , 71 (1998). A search occurs when the Government acquires
    6
    
    Id. -17- information
    by either "physically intruding on persons, houses, papers, or
    effects," or otherwise invading an area in which the individual has a reasonable
    expectation of privacy. See Florida v. Jardines, 
    133 S. Ct. 1409
    , 1414 (2013) (internal
    quotation mark omitted); see also Katz v. United States, 
    389 U.S. 347
    , 360-61 (1967)
    (Harlan, J., concurring). A seizure occurs when the Government interferes in
    some meaningful way with the individual's possession of property. United States
    v. Jones, 
    132 S. Ct. 945
    , 951 n.5 (2012). Subject to limited exceptions,7 a search or
    seizure conducted without a warrant is presumptively unreasonable. See Kyllo v.
    United States, 
    533 U.S. 27
    , 31 (2001).
    We must construe the Fourth Amendment "in [] light of what was
    deemed an unreasonable search and seizure when it was adopted, and in a
    manner which will conserve public interests as well as the interests and rights of
    individual citizens." 
    Kyllo, 533 U.S. at 40
    . Applying 18th Century notions about
    searches and seizures to modern technology, however, is easier said than done,
    as we are asked to measure Government actions taken in the "computer age"
    against Fourth Amendment frameworks crafted long before this technology
    7
    In this case, the Government has conceded that it needed a warrant to search the
    non-responsive computer files in its possession and has not argued that any exceptions apply.
    -18-
    existed.8 As we do so, we must keep in mind that "the ultimate touchstone of the
    Fourth Amendment is reasonableness." Missouri v. McNeely, 
    133 S. Ct. 1552
    , 1569
    (2013) (Roberts, C.J., concurring in part and dissenting in part) (internal quotation
    marks omitted). Because the degree of privacy secured to citizens by the Fourth
    Amendment has been impacted by the advance of technology, the challenge is to
    adapt traditional Fourth Amendment concepts to the Government's modern,
    more sophisticated investigative tools.
    "The chief evil that prompted the framing and adoption of the
    Fourth Amendment was the 'indiscriminate searches and seizures' conducted by
    the British 'under the authority of general warrants.'" United States v. Galpin, 
    720 F.3d 436
    , 445 (2d Cir. 2013) (quoting Payton v. New York, 
    445 U.S. 573
    , 583 (1980))
    (internal quotation marks omitted). General warrants were ones "not grounded
    upon a sworn oath of a specific infraction by a particular individual, and thus not
    8
    See generally United States v. Jones, 
    132 S. Ct. 945
    (2012) (considering whether
    placing GPS tracking unit on vehicle constitutes search); 
    Kyllo, 533 U.S. at 27
    (determining
    whether use of thermal imaging constitutes search); United States v. Aguiar, 
    737 F.3d 251
    (2d
    Cir. 2013) (determining whether warrantless placement of GPS tracking unit on vehicle fell
    within good-faith exception to exclusionary rule); United States v. Galpin, 
    720 F.3d 436
    (2d Cir.
    2013) (analyzing whether warrant to search computer satisfies particularity requirement); Orin
    S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531 (2005); James Saylor, Note,
    Computers as Castles: Preventing the Plain View Doctrine from Becoming a Vehicle for Overbroad
    Digital Searches, 79 Fordham L. Rev. 2809 (2011); Marc Palumbo, Note, How Safe Is Your Data?:
    Conceptualizing Hard Drives Under the Fourth Amendment, 36 Fordham Urb. L.J. 977 (2009).
    -19-
    limited in scope and application." Maryland v. King, 
    133 S. Ct. 1958
    , 1980 (2013).
    The British Crown had long used these questionable instruments to enter a
    political opponent's home and seize all his books and papers, hoping to find
    among them evidence of criminal activity. See Stanford v. Texas, 
    379 U.S. 476
    , 482-
    83 (1965). The Framers abhorred this practice, believing that "papers are often
    the dearest property a man can have" and that permitting the Government to
    "sweep away all papers whatsoever," without any legal justification, "would
    destroy all the comforts of society." Entick v. Carrington, 95 Eng. Rep. 807, 817-18
    (C.P. 1765).9
    The Fourth Amendment guards against this practice by providing
    that a warrant will issue only if: (1) the Government establishes probable cause
    to believe the search will uncover evidence of a specific crime; and (2) the
    warrant states with particularity the areas to be searched and the items to be
    seized. 
    Galpin, 720 F.3d at 445
    . The latter requirement, in particular, "makes
    general searches . . . impossible" because it "prevents the seizure of one thing
    9
    The Supreme Court has explained that Entick was "undoubtedly familiar to
    every American statesman at the time the Constitution was adopted, and considered to be the
    true and ultimate expression of constitutional law with regard to search and seizure." 
    Jones, 132 S. Ct. at 949
    (internal quotation marks omitted).
    -20-
    under a warrant describing another." 
    Id. at 446
    (quoting Marron v. United States,
    
    275 U.S. 192
    , 196 (1927)) (internal quotation marks omitted). This restricts the
    Government's ability to remove all of an individual's papers for later examination
    because it is generally unconstitutional to seize any item not described in the
    warrant. See Horton v. California, 
    496 U.S. 128
    , 140 (1990); United States v. Tamura,
    
    694 F.2d 591
    , 595 (9th Cir. 1982). Certain exceptions have been made in those
    "comparatively rare instances where documents [we]re so intermingled that they
    [could not] feasibly be sorted on site." 
    Tamura, 694 F.2d at 595-96
    . But in those
    cases, the off-site review had to be monitored by a neutral magistrate and non-
    responsive documents were to be returned after the relevant items were
    identified. 
    Id. at 596-97.
    These Fourth Amendment protections apply to modern computer
    files. Like 18th Century "papers," computer files may contain intimate details
    regarding an individual's thoughts, beliefs, and lifestyle, and they should be
    similarly guarded against unwarranted Government intrusion. If anything, even
    greater protection is warranted. See, e.g., 
    Galpin, 720 F.3d at 446
    ("[A]dvances in
    technology and the centrality of computers in the lives of average people have
    rendered the computer hard drive akin to a residence in terms of the scope and
    -21-
    quantity of private information it may contain."); United States v. Otero, 
    563 F.3d 1127
    , 1132 (10th Cir. 2009) ("The modern development of the personal computer
    and its ability to store and intermingle a huge array of one's personal papers in a
    single place increases law enforcement's ability to conduct a wide-ranging search
    into a person's private affairs . . . ."); Orin S. Kerr, Searches and Seizures in a Digital
    World, 119 Harv. L. Rev. 531, 569 (2005) (explaining that computers have become
    the equivalent of "postal services, playgrounds, jukeboxes, dating services, movie
    theaters, daily planners, shopping malls, personal secretaries, virtual diaries,
    and more").
    Not surprisingly, the ability of computers to store massive volumes
    of information presents logistical problems in the execution of search warrants. It
    is "comparatively" commonplace for files on a computer hard drive to be "so
    intermingled that they cannot feasibly be sorted on site." 
    Tamura, 694 F.2d at 595
    .
    As evidenced by this case, forensic analysis of electronic data may take months to
    complete. It would be impractical for agents to occupy an individual's home or
    office, or seize an individual's computer, for such long periods of time. It is now
    also unnecessary. Today, advancements in technology enable the Government to
    create a mirror image of an individual's hard drive, which can be searched as if it
    -22-
    were the actual hard drive but without interfering with the individual's use of his
    home, computer, or files.
    In light of the significant burdens on-site review would place on
    both the individual and the Government, the creation of mirror images for off-
    site review is constitutionally permissible in most instances, even if wholesale
    removal of tangible papers would not be. Indeed, the 2009 amendments to the
    Federal Rules of Criminal Procedure, which added Rule 41(e)(2)(B), clearly
    contemplated off-site review of computer hard drives in certain circumstances.10
    Although Rule 41(e)(2)(B) was not in effect in 2003, when the warrant was
    executed with respect to Ganias's computers, case law both before and after the
    rule's adoption has recognized that off-site review of seized electronic files may
    10
    Rule 41(e)(2)(B) provides:
    Warrant Seeking Electronically Stored Information.
    A warrant under Rule 41(e)(2)(A) may authorize the
    seizure of electronic storage media or the seizure or
    copying of electronically stored information. Unless
    otherwise specified, the warrant authorizes a later
    review of the media or information consistent with
    the warrant. The time for executing the warrant in
    Rule 41(e)(2)(A) and (f)(1)(A) refers to the seizure or
    on-site copying of the media or information, and not
    to any later off-site copying or review.
    Fed. R. Crim. P. 41(e)(2)(B).
    -23-
    be necessary and reasonable. See, e.g., United States v. Schesso, 
    730 F.3d 1040
    , 1046
    (9th Cir. 2013); United States v. Evers, 
    669 F.3d 645
    , 652 (6th Cir. 2012); United
    States v. Hill, 
    459 F.3d 966
    , 976-77 (9th Cir. 2006); United States v. Upham, 
    168 F.3d 532
    , 535 (1st Cir. 1999).
    The off-site review of these mirror images, however, is still subject to
    the rule of reasonableness. See, e.g., 
    Ramirez, 523 U.S. at 71
    ("The general
    touchstone of reasonableness which governs Fourth Amendment analysis
    governs the method of execution of the warrant." (citation omitted)). The
    advisory committee's notes to the 2009 amendment of the Federal Rules of
    Criminal Procedure shed some light on what is "reasonable" in this context.
    Specifically, the committee rejected "a presumptive national or uniform time
    period within which any subsequent off-site copying or review of the media or
    electronically stored information would take place." Fed. R. Crim. P. 41(e)(2)(B)
    advisory committee's notes to the 2009 Amendments. The committee noted that
    several variables -- storage capacity of media, difficulties created by encryption
    or electronic booby traps, and computer-lab workload -- influence the duration of
    a forensic analysis and counsel against a "one size fits all" time period. 
    Id. In combination,
    these factors might justify an off-site review lasting for a significant
    -24-
    period of time. They do not, however, provide an "independent basis" for
    retaining any electronic data "other than [those] specified in the warrant." United
    States v. Comprehensive Drug Testing, Inc., 
    621 F.3d 1162
    , 1171 (9th Cir. 2010)
    (en banc).
    Even where a search or seizure violates the Fourth Amendment, the
    Government is not automatically precluded from using the unlawfully obtained
    evidence in a criminal prosecution. United States v. Julius, 
    610 F.3d 60
    , 66 (2d Cir.
    2010). "To trigger the exclusionary rule, police conduct must be sufficiently
    deliberate that exclusion can meaningfully deter it, and sufficiently culpable that
    such deterrence is worth the price paid by the justice system." Herring v. United
    States, 
    555 U.S. 135
    , 144 (2009). Suppression is required "only when [agents]
    (1) . . . effect a widespread seizure of items that were not within the scope of the
    warrant, and (2) do not act in good faith." United States v. Shi Yan Liu, 
    239 F.3d 138
    , 140 (2d Cir. 2000) (internal quotation marks and citations omitted).
    The Government effects a "widespread seizure of items" beyond the
    scope of the warrant when the Government' s search "resemble[s] a general
    search." 
    Id. at 140-41.
    Government agents act in good faith when they perform
    "searches conducted in objectively reasonable reliance on binding appellate
    -25-
    precedent." Davis v. United States, 
    131 S. Ct. 2419
    , 2423-24 (2011). When
    Government agents act on "good-faith reliance [o]n the law at the time of the
    search," the exclusionary rule will not apply. United States v. Aguiar, 
    737 F.3d 251
    ,
    259 (2d Cir. 2013). "The burden is on the government to demonstrate the
    objective reasonableness of the officers' good faith reliance." United States v.
    Voustianiouk, 
    685 F.3d 206
    , 215 (2d Cir. 2012) (internal quotation marks omitted).
    Furthermore, evidence will be suppressed only where the benefits of
    deterring the Government's unlawful actions appreciably outweigh the costs of
    suppressing the evidence -- "a high obstacle for those urging . . . application" of
    the rule. 
    Herring, 555 U.S. at 141
    ; see Pennsylvania Bd. of Prob. & Parole v. Scott, 
    524 U.S. 357
    , 364-65 (1998) (citing United States v. Payner, 
    447 U.S. 727
    , 734 (1980)).
    "The principal cost of applying the [exclusionary] rule is, of course, letting guilty
    and possibly dangerous defendants go free -- something that 'offends basic
    concepts of the criminal justice system.'" 
    Herring, 555 U.S. at 141
    (quoting United
    States v. Leon, 
    468 U.S. 897
    , 908 (1984)).
    2.     Analysis
    This case presents a host of challenging issues, but we need not
    address them all. The parties agree that the personal financial records at issue in
    -26-
    this appeal were not covered by the 2003 warrant, and that they had been
    segregated from the responsive files by December 2004, before the Government
    began to suspect that Ganias was personally involved in any criminal activity.
    Furthermore, on appeal, Ganias does not directly challenge the Government's
    practice of making mirror images of computer hard drives when searching for
    electronic data, but rather challenges the reasonableness of its off-site review.
    Accordingly, we need not address whether: (1) the description of the computer
    files to be seized in the 2003 warrant was stated with sufficient particularity, see,
    e.g., 
    Galpin, 720 F.3d at 449-50
    ; (2) the 2003 warrant authorized the Government to
    make a mirror image of the entire hard drive so it could search for relevant files
    off-site; or (3) the resulting off-site sorting process was unreasonably long.
    Instead, we consider a more limited question: whether the Fourth
    Amendment permits officials executing a warrant for the seizure of particular
    data on a computer to seize and indefinitely retain every file on that computer for
    use in future criminal investigations. We hold that it does not.
    If the 2003 warrant authorized the Government to retain all the data
    on Ganias's computers on the off-chance the information would become relevant
    to a subsequent criminal investigation, it would be the equivalent of a general
    -27-
    warrant. The Government's retention of copies of Ganias's personal computer
    records for two-and-a-half years deprived him of exclusive control over those
    files for an unreasonable amount of time. This combination of circumstances
    enabled the Government to possess indefinitely personal records of Ganias that
    were beyond the scope of the warrant while it looked for other evidence to give it
    probable cause to search the files. This was a meaningful interference with
    Ganias's possessory rights in those files and constituted a seizure within the
    meaning of the Fourth Amendment. See United States v. Place, 
    462 U.S. 696
    , 708
    (1983) (detaining a traveler's luggage while awaiting the arrival of a drug-sniffing
    dog constituted a seizure); see also Soldal v. Cook Cnty., 
    506 U.S. 56
    , 62-64, 68 (1992)
    (explaining that a seizure occurs when one's property rights are violated, even if
    the property is never searched and the owner's privacy was never violated);
    Loretto v. Teleprompter Manhattan CATV Corp., 
    458 U.S. 419
    , 435 (1982) ("The
    power to exclude has traditionally been considered one of the most treasured
    strands in an owner's bundle of property rights.").
    We conclude that the unauthorized seizure and retention of these
    documents was unreasonable. The Government had no warrant authorizing the
    seizure of Ganias's personal records in 2003. By December 2004, these documents
    -28-
    had been separated from those relevant to the investigation of American Boiler
    and IPM. Nevertheless, the Government continued to retain them for another
    year-and-a-half until it finally developed probable cause to search and seize them
    in 2006. Without some independent basis for its retention of those documents in
    the interim, the Government clearly violated Ganias's Fourth Amendment rights
    by retaining the files for a prolonged period of time and then using them in a
    future criminal investigation.
    The Government offers several arguments to justify its actions, but
    none provides any legal authorization for its continued and prolonged
    possession of the non-responsive files. First, it argues that it must be allowed to
    make the mirror image copies as a matter of practical necessity and, according to
    the Government's investigators, those mirror images were "the government's
    property." As explained above, practical considerations may well justify a
    reasonable accommodation in the manner of executing a search warrant, such as
    making mirror images of hard drives and permitting off-site review, but these
    considerations do not justify the indefinite retention of non-responsive
    documents. See Comprehensive Drug Testing, 
    Inc., 621 F.3d at 1171
    . Without a
    warrant authorizing seizure of Ganias's personal financial records, the copies of
    -29-
    those documents could not become ipso facto "the government's property"
    without running afoul of the Fourth Amendment.
    Second, the Government asserts that by obtaining the 2006 search
    warrant, it cured any defect in its search of the wrongfully retained files. But this
    argument "reduces the Fourth Amendment to a form of words." Silverthorne
    Lumber Co. v. United States, 
    251 U.S. 385
    , 392 (1920). In Silverthorne, the
    Government, "without a shadow of authority[,] went to the office of [the
    defendants'] company and made a clean sweep of all the books, papers and
    documents found there." 
    Id. at 390.
    The originals were eventually returned
    because they were unlawfully seized, but the prosecutor had made
    "[p]hotographs and copies of material papers" and used these to indict the
    defendants and obtain a subpoena for the original documents. 
    Id. at 391.
    Justice
    Holmes succinctly summarized the Government's argument supporting the
    constitutionality of its actions as follows:
    [A]lthough of course its seizure was an outrage
    which the Government now regrets, it may study
    the papers before it returns them, copy them, and
    then may use the knowledge that it has gained to
    call upon the owners in a more regular form to
    produce them; that the protection of the
    Constitution covers the physical possession but
    -30-
    not any advantages that the Government can gain
    over the object of its pursuit by doing the
    forbidden act.
    
    Id. Unsurprisingly, the
    Supreme Court rejected that argument: "The essence of a
    provision forbidding the acquisition of evidence in a certain way is that not
    merely evidence so acquired shall not be used before the Court but that it shall
    not be used at all" unless some exception applies.11 
    Id. at 392.
    The same rationale
    applies here. If the Government could seize and retain non-responsive electronic
    records indefinitely, so it could search them whenever it later developed
    probable cause, every warrant to search for particular electronic data would
    become, in essence, a general warrant.
    Third, the Government argues that it must be permitted to search the
    11
    The Supreme Court has abrogated Silverthorne's broad proposition that
    wrongfully acquired evidence may "not be used at all." See United States v. Havens, 
    446 U.S. 620
    , 624-25 (1980) (noting that this evidence may be used for purposes of
    impeachment); see also Murray v. United States, 
    487 U.S. 533
    , 537 (1988) (explaining that
    the "independent source" doctrine allows the admission of "evidence initially discovered
    during, or as a consequence of, an unlawful search, but later obtained independently
    from activities untainted by the initial illegality"); Nix v. Williams, 
    467 U.S. 431
    , 444
    (1984) (explaining that "inevitable discovery" doctrine permits the admission of
    unlawfully obtained evidence if "th[at] information ultimately or inevitably would have
    been discovered by lawful means"). The Government does not rely on any of these
    exceptions here. Indeed, it concedes that if it "had not preserved that data from the
    November 2003 seizure, it would have been lost forever." Appellee's Br. at 33. We do
    not hold that the Government has waived its right to use the evidence in question for
    impeachment purposes.
    -31-
    mirror images in its possession because the evidence no longer existed on
    Ganias's computers. But the ends, however, do not justify the means. The loss of
    the personal records is irrelevant in this case because the Government concedes
    that it never considered performing a new search of Ganias's computers and did
    not know that the files no longer existed when it searched the mirror images in
    its possession. And even if it were relevant, the Fourth Amendment clearly
    embodies a judgment that some evidence of criminal activity may be lost for the
    sake of protecting property and privacy rights. See, e.g., United States v. Calandra,
    
    414 U.S. 338
    , 361 (1974) ("The judges who developed the exclusionary rule were
    well aware that it embodied a judgment that it is better for some guilty persons to
    go free than for the [Government] to behave in forbidden fashion.").
    Fourth, the Government contends that returning or destroying the
    non-responsive files is "entirely impractical" because doing so would
    compromise the remaining data that was responsive to the warrant, making it
    impossible to authenticate or use it in a criminal prosecution. Appellee Br. at 34.
    We are not convinced that there is no other way to preserve the evidentiary chain
    of custody. But even if we assumed it were necessary to maintain a complete
    copy of the hard drive solely to authenticate evidence responsive to the original
    -32-
    warrant, that does not provide a basis for using the mirror image for any
    other purpose.
    Finally, the Government argues that Ganias's failure to bring a
    motion for the return of property, pursuant to Federal Rule of Criminal
    Procedure 41(g), precludes him from seeking suppression now. Although the
    district court accepted this argument, we find no authority for concluding that a
    Rule 41(g) motion is a prerequisite to a motion to suppress. See Fed. R. Crim. P.
    41(g) ( "A person aggrieved . . . may move for the property's return." (emphasis
    added)); Fed. R. Crim. P. 41(h) ("A defendant may move to suppress
    evidence . . . ." (emphasis added)). Imposing such a prerequisite makes little
    sense in this context, where Ganias still had the original computer files and did
    not need the Government's copies to be returned to him. Moreover, we fail to see
    what purpose a Rule 41(g) motion would have served, given the Government's
    position that non-responsive files in its possession could not feasibly have been
    returned or purged anyway.
    Because the Government has demonstrated no legal basis for
    retaining the non-responsive documents, its retention and subsequent search of
    those documents were unconstitutional. The Fourth Amendment was intended
    -33-
    to prevent the Government from entering individuals' homes and
    indiscriminately seizing all their papers in the hopes of discovering evidence
    about previously unknown crimes. See Entick, 95 Eng. Rep. at 817-18; see also
    
    Jones, 132 S. Ct. at 949
    . Yet this is exactly what the Government claims it may do
    when it executes a warrant calling for the seizure of particular electronic data
    relevant to a different crime. Perhaps the "wholesale removal" of intermingled
    computer records is permissible where off-site sorting is necessary and
    reasonable, 
    Tamura, 694 F.2d at 595
    -97, but this accommodation does not
    somehow authorize the Government to retain all non-responsive documents
    indefinitely, for possible use in future criminal investigations. See Comprehensive
    Drug 
    Testing, 621 F.3d at 1171
    .
    We turn now to the application of the exclusionary rule. As
    discussed above, suppression is required when (1) there is a widespread seizure
    of items not covered by the warrant and (2) agents do not act in good faith.
    United States v. Shi Yan Liu, 
    239 F.3d 138
    , 141 (2d Cir. 2000). There must also be a
    weighing of (3) the benefits of deterrence against (4) the costs of suppression.
    Herring v. United States, 
    555 U.S. 135
    , 141 (2009).
    First, as we set forth above, the Government effected a widespread
    seizure of files beyond the scope of the warrant -- conduct that resembled an
    -34-
    impermissible general search. Shi Yan 
    Liu, 239 F.3d at 141
    . For almost two-and-
    a-half years, the Government retained records that were beyond the scope of the
    2003 warrant, in violation of Ganias's Fourth Amendment rights.
    Second, the agents here did not act in good faith. Government
    agents act in good faith when they conduct searches in objectively reasonable
    reliance on binding appellate precedent. Davis v. United States, 
    131 S. Ct. 2419
    ,
    2423-24 (2011). It is the Government's burden -- not Ganias's -- to demonstrate
    the objective reasonableness of the officers' good faith reliance. United States v.
    Voustianiouk, 
    685 F.3d 206
    , 215 (2d Cir. 2012). We are not persuaded that the
    agents in this case reasonably concluded that the 2003 warrant authorized their
    search of Ganias's personal records and their retention for more than two years.
    The agents acknowledged, at least initially, that the Government was obliged to
    "purge[]" the non-responsive data after they completed their search for relevant
    files. The record also makes clear that Government investigators "viewed the
    data as the government's property" and intentionally retained Ganias's records
    for future use. This clearly was not reasonable, and the agents could not have
    had a good-faith basis to believe the law permitted them to keep the non-
    responsive files indefinitely.
    -35-
    Third, the benefits of deterrence in this case are great. With the
    Government's use of forensic mirror images becoming increasingly common,
    deterring its unconstitutional handling of non-responsive data has grown in
    importance. The substantial deterrence value in this case is clear when compared
    to 
    Davis, 131 S. Ct. at 2419
    . In Davis, there was no deterrence value because the
    police officers conducted their search in compliance with appellate precedent at
    the time. While Davis's appeal was pending in the Eleventh Circuit, the Supreme
    Court overruled that precedent. There was no cause to deter unlawful
    Government conduct because the conduct was lawful when it occurred. That is
    not the situation here. In this case, the Government's handling of Ganias's
    personal records violated precedent at the time of the search, and relevant Fourth
    Amendment law has not fundamentally changed since.
    Finally, the costs of suppression are minimal here. This is not a case
    where a dangerous defendant is being set free. See Herring v. United States, 
    555 U.S. 135
    , 144 (2009) ("The principal cost of applying the [exclusionary] rule is, of
    course, letting [a] guilty and possibly dangerous defendant[] go free."). Even
    assuming Ganias committed tax evasion -- a serious matter -- this case does not
    involve drugs, guns, or contraband. Nor is this a case where police officers
    -36-
    happened upon guns or drugs or other evidence they otherwise could not have
    found. Rather, early on, the evidence here was readily obtainable by subpoena or
    search warrant. Moreover, when guns or drugs are suppressed, that evidence is
    usually irreplaceable. The records here, however, conceivably are available
    elsewhere as hard copies or can be reconstructed from other records. As made
    clear by the Government's behavior, the costs of suppression that the
    Government has asserted are outweighed by the benefits of deterring
    future misconduct.
    Accordingly, we reverse the denial of the motion to suppress and
    vacate the judgment of conviction.
    CONCLUSION
    We conclude that the Government violated Ganias's Fourth
    Amendment rights by seizing and indefinitely retaining non-responsive
    computer records, and then searching them when it later developed probable
    cause. Accordingly, Ganias's personal records, seized in the execution of the
    November 2003 warrant and retained for two-and-a-half years, should have been
    suppressed. For the reasons stated above, we REVERSE the district court's denial
    of the motion to suppress, VACATE the judgment of conviction, and REMAND
    for further proceedings not inconsistent with this opinion.
    -37-
    PETER W. HALL, Circuit Judge, concurring in part and dissenting in part:
    While I concur with my two colleagues that holding onto non‐
    responsive documents for an extended period of time without some independent
    basis for retention represents an unreasonable seizure for purposes of the Fourth
    Amendment, I respectfully dissent from that portion of the opinion which holds
    that in this case the evidence should be suppressed.
    The exclusionary rule is a ʺdeterrent sanctionʺ created by the
    Supreme Court to ʺbar[ ] the prosecution from introducing evidence obtained by
    way of a Fourth Amendment violation.ʺ  Davis v. United States, 564 U.S. 1‐‐‐, 131
    S. Ct. 2419, 2423 (2011).  The Supreme Court has cautioned, however, that
    ʺexclusion [should be] ʹour last resort, not our first impulse.ʹʺ  Herring v. United
    States, 555 U.S. 135, 140 (2009) (quoting Hudson v. Michigan, 547 U.S. 586, 591
    (2006)).  This is so because the rule is ʺʹnot a personal constitutional right,ʹ nor is
    it designed to ʹredress the injuryʹ occasioned by an unconstitutional search[,] . . .
    [its] sole purpose . . . is to deter future Fourth Amendment violations.ʺ  Davis, 131
    S. Ct. at 2426 (citations omitted).  The rule specifically deters ʺdeliberate, reckless,
    or grossly negligent conduct, or in some circumstances recurring or systemic
    negligence.ʺ  Herring, 555 U.S. at 144.  ʺTo trigger the exclusionary rule, police
    ‐1‐
    conduct must be sufficiently deliberate that exclusion can meaningfully deter it,
    and sufficiently culpable that such deterrence is worth the price paid by the
    justice system.ʺ  Id.  In general, ʺsearches conducted in objectively reasonable
    reliance on binding appellate precedent are not subject to the exclusionary rule
    . . . . [as] the harsh sanction of exclusion ʹshould not be applied to deter
    objectively reasonable law enforcement activity.ʹʺ  Davis, 131 S. Ct. at 2423‐24,
    2429 (citation omitted).
    In this case, I cannot agree with the majorityʹs determination that the
    Government acted in bad faith.  The documents were seized pursuant to a
    warrant and the non‐responsive documents were culled and segregated.  While
    testimony reveals that the Government mistakenly considered the mirror images
    it created of the non‐responsive documents as its own property, there was little
    caselaw either at the time of the search or in the following years to indicate that
    the Government could not hold onto the non‐responsive material in the way it
    did.  Where caselaw existed, the Government complied with the guidelines for
    the seizure and offsite search of large amounts of documents.  See United States v.
    Tamura, 694 F.2d 591, 595‐96 (9th Cir. 1982) (noting that ʺ[i]n the comparatively
    rare instances where documents are so intermingled that they cannot feasibly be
    ‐2‐
    sorted on site,ʺ the Government may seize items outside the scope of the warrant
    under certain conditions).  What is more, the Government scrupulously avoided
    reviewing files that it was not entitled to review before obtaining the 2006 search
    warrant.
    With respect to the balancing between deterrence and the cost of
    suppression, because the Governmentʹs actions did not violate established
    precedent at the time of the search, I do not perceive a need for deterrence.  ʺ[A]ll
    that exclusion would deter in this case is conscientious police work.ʺ  Davis, 131
    S. Ct. at 2429.  Additionally, as Ganias himself stated, the evidence to be
    suppressed in this case would not have existed but for the Governmentʹs
    retention of the non‐responsive materials.  The evidence to be suppressed is thus,
    contrary to the majorityʹs conclusion, of the same irreplaceable nature as guns or
    drugs.  Moreover, in light of the serious and nefarious effects of money fraud
    crimes on society, see, e.g., United States v. Madoff, No. 09 Crim. 213(DC), 2009 WL
    3347945 (S.D.N.Y. Oct. 13, 2009), I am loathe to conclude that guns, drugs and/or
    contraband are the only indicia of a dangerous defendant.  Accordingly, while I
    agree that the Government violated the defendantʹs Fourth Amendment rights to
    be free from an unreasonable seizure because it held for a prolonged period of
    ‐3‐
    time mirror images of computer‐generated records that were not responsive to
    the 2003 search warrant without returning them (or destroying them), I see no
    reason to suppress the evidence derived therefrom under the circumstances
    presented.
    ‐4‐