State v. Shaskus , 2016 Ohio 7942 ( 2016 )


Menu:
  • [Cite as State v. Shaskus, 2016-Ohio-7942.]
    IN THE COURT OF APPEALS OF OHIO
    TENTH APPELLATE DISTRICT
    State of Ohio,                                 :
    Plaintiff-Appellant,          :                No. 14AP-812
    (C.P.C. No. 13CR-4970)
    v.                                             :
    (REGULAR CALENDAR)
    James F. Shaskus,                              :
    Defendant-Appellee.           :
    D E C I S I O N
    Rendered on November 29, 2016
    On brief: Ron O'Brien, Prosecuting Attorney, and Seth L.
    Gilbert, for appellant. Argued: Seth L. Gilbert.
    On brief: Dennis C. Belli, for appellee. Argued: Dennis C.
    Belli.
    APPEAL from the Franklin County Court of Common Pleas
    BROWN, J.
    {¶ 1} This is an appeal by plaintiff-appellant, State of Ohio, from a judgment of
    the Franklin County Court of Common Pleas granting a motion to suppress filed by
    defendant-appellee, James F. Shaskus.
    {¶ 2} On September 18, 2013, a Franklin County Grand Jury returned an
    indictment charging appellee with five counts of pandering sexually oriented matter
    involving a minor, in violation of R.C. 2907.322. On April 18, 2014, appellee filed a
    motion to suppress physical evidence and statements. Specifically, appellee sought an
    order from the court suppressing "the email messages under the account of
    jack.flash75@yahoo.com which were obtained by a detective of the Franklin County
    Sheriff's Department Internet Crimes Against Children Task Force from Yahoo, Inc.
    pursuant to a search warrant issued on October 21, 2011." Appellee also sought to
    No. 14AP-812                                                                                 2
    suppress "the digital images, data, and emails stored on the hard drive of the Dell desktop
    computer which was seized by the same detective from [appellee's] residence pursuant to
    a search warrant issued on November 14, 2011." On May 23, 2014, the state filed a
    memorandum contra appellee's motion to suppress. (Def.['s] Mot. to Suppress at 1.)
    {¶ 3} On July 7, 2014, the trial court conducted a hearing on the motion to
    suppress. The state called as a witness David R. Hunt, formerly a detective with the
    Franklin County Sheriff's Department. During his employment with the sheriff's
    department, Detective Hunt's duties included performing investigations as part of the
    Franklin County Internet Crimes Against Children Task Force ("ICAC task force").
    {¶ 4} At the suppression hearing, Detective Hunt provided testimony regarding a
    2011 police investigation into a Craigslist advertisement soliciting sexual encounters with
    minors. Detective Hunt became involved in the investigation leading to the indictment
    against appellee as a result of "a spinoff of an investigation from another case" in which
    investigators "were looking at different Craigslist predators." (July 7, 2014 Tr. at 8-9.)
    {¶ 5} In April 2011, a police investigator with the Franklin County Sheriff's
    Department became aware of an online advertisement indicating that an individual
    "might be seeking to have sexual encounters with minors." (July 7, 2014 Tr. at 9.)
    Specifically, the advertisement read: "Up to 500 younger the more u get – m4w 38.
    Younger the better let me take u shopping lol send pic, stats, and number! To text u."
    (State's Ex. A at 2.)
    {¶ 6} Investigators opened an investigation and "started issuing subpoenas to
    various internet service providers, tracking the postings." (July 7, 2014 Tr. at 9.)
    According to Detective Hunt, Craigslist maintains the anonymity of posters, requiring
    investigators to "notify [Craigslist] with a subpoena requesting identification information"
    such as the internet protocol address ("IP address") used to post the advertisement.
    (July 7, 2014 Tr. at 10.)
    {¶ 7} On September 20, 2011, Detective Hunt observed the following online
    Craigslist advertisement:
    [T]rade young 4 young (Columbus) I have a really young lover
    looking to find another guy who has the same to share. Mine
    is 4ft5in, 70lbs blonde, very little hair and has only been with
    me. If u are interested send pics, stats of yours and if I like we
    No. 14AP-812                                                                                3
    might do some trading. Or I can give benefits to u. No
    questions asked. I'm clean [white] and safe.
    (State's Ex. B at 3.)
    {¶ 8} After contacting Craigslist for information, Detective Hunt determined that
    an individual named Virgil Pennington had placed the advertisement linked to the email
    address leevp3@gmail.com, and that Pennington had an email account through America
    Online. Detective Hunt sought and obtained a search warrant to review other emails
    generated in response to Craigslist advertisements posted through Pennington's Gmail
    address. Specifically, on October 4, 2011, a judge from the Franklin County Municipal
    Court approved a warrant to Google, Inc., in California, seeking "evidence of the
    commission of the criminal offense of Importuning," in violation of R.C. 2907.07, to wit:
    "any and all emails including read, unread, and sent since September 21, 2011 and all
    indicia, documents, and records showing ownership or rights of possession of the email
    account of Virgil Pennington." (State's Ex. A at 1.)
    {¶ 9} Detective Hunt obtained approximately 500 email communications sent in
    response to the poster of the Craigslist advertisement, including a reply by an individual
    who identified himself online as "Jack Flash." One of the emails from the Jack Flash
    email account, dated in September 2011, "included a photograph of a young, white
    female." The female "was fully clothed, standing in * * * a kitchen area * * * next to a
    birthday cake with the number '13' on it." (July 7, 2014 Tr. at 12.)
    {¶ 10} In an email exchange between Flash and Pennington on September 27,
    2011, Flash wrote to Pennington at the email address leevp3@gmail.com, stating: "id love
    if you shared yours with me but i might be able to get one for you to have as well tell me
    about yours." A response from leevp3@gmail.com stated: "U first. I gave mine stats now
    u. She has only been with me and does what * * * daddy tells her." Flash responded as
    follows: "mine is 4'9 and she weighs about 80lbs shes a very good girl and very
    accommodating do you have a pic of yours i could see? and where in columbus are you? id
    love to play." Pennington then wrote: "Yes pic for pic. and there will be any trading. I
    take urs out for a so called lunch and if all goes well Ill let u take mine out for lunch. I'm
    very protective of her. She is a good girl. So I also have to know u are clean and safe."
    Flash responded: "[P]lease send yours as well."
    No. 14AP-812                                                                                   4
    {¶ 11} Detective Hunt, out of concern "that there was a live victim" that he "needed
    to identify and locate," subpoenaed Yahoo!, Inc. ("Yahoo") to obtain the IP address
    information for Flash. (July 7, 2014 Tr. at 24.) The detective subsequently sought and
    obtained a warrant, issued by a municipal court judge on October 21, 2011, to search
    Yahoo for:
    [E]vidence of the commission of the criminal offenses of
    Compelling Prostitution, 2907.21 R.C., to wit: specifically, any
    and all emails including opened, unopened, sent, forwarded,
    deleted; any and all subscriber information including names,
    addresses, other email accounts; original IP address used and
    date the account was opened; any other information relating
    to the email account requested; and all indicia, documents,
    and records showing ownership or rights of possession of the
    email account of Jack Flash c/o Yahoo Inc.
    (State's Ex. B at 1.)
    {¶ 12} Approximately one week later, the detective received a CD from Yahoo
    containing "approximately 3,000 e-mails from the jack.flash75 account." (July 7, 2014 Tr.
    at 18.) The information included "some IP addresses as to when the account was opened,"
    and Detective Hunt was able to determine that the Flash account was through Time
    Warner Cable. (July 7, 2014 Tr. at 18.) The detective sent a subpoena to Time Warner
    Cable, issued on November 1, 2011, "for the subscriber information for that specific IP
    address." (July 7, 2014 Tr. at 20.) Time Warner Cable sent Detective Hunt information
    that the IP address was associated with an address on Hunter Avenue, Columbus.
    {¶ 13} During his review of emails, Detective Hunt found photographs of an
    individual he was later able to identify as appellee. The detective determined that a
    second individual associated with the Hunter Avenue address did not match photographs
    from the emails. Appellee's name eventually appeared in a public records search as an
    individual who also resided at the Hunter Avenue address. Based on the information
    obtained, the detective believed that appellee "was jack.flash75." (July 7, 2014 Tr. at 26.)
    {¶ 14} Detective Hunt testified that he initially reviewed the emails from the Flash
    account "that only had attachments, i.e., photographs." (July 7, 2014 Tr. at 24.) During
    his "review of the different attachments and the earlier e-mails," Detective Hunt "came
    across numerous images" of what he believed to be "child pornography." (July 7, 2014 Tr.
    at 26.)
    No. 14AP-812                                                                             5
    {¶ 15} Detective Hunt subsequently obtained a warrant to search appellee's
    residence on Hunter Avenue, Columbus, for evidence of pandering obscenity involving a
    minor, in violation of R.C. 2907.32, illegal use of a minor in nudity oriented material, in
    violation of R.C. 2907.323, disseminating matter harmful to juveniles, in violation of R.C.
    2907.31, and endangering children, in violation of R.C. 2919.22.          Detective Hunt
    identified state's exhibit C as the search warrant, dated November 14, 2011. At the time
    Detective Hunt and other officers arrived at the Hunter Avenue residence, appellee was at
    his workplace; Detective Hunt and another law enforcement officer went to appellee's
    place of employment and advised him of the nature of the warrant and "asked him if he
    would return home with us voluntarily or give us a key so that we could gain entry into the
    residence." (July 7, 2014 Tr. at 28.) Appellee accompanied the officers back to his
    residence.
    {¶ 16} During the search, police officers recovered a computer from appellee's
    residence. Detective Hunt testified that a forensic examination of the computer revealed
    "over 900 images" of child pornography. (July 7, 2014 Tr. at 28.)
    {¶ 17} Appellee testified on his own behalf during the hearing, and stated he was at
    work on the date the officers sought to execute the search warrant. Detectives arrived at
    his workplace and told him "[t]hey were getting ready to kick down the door if I would not
    go with them." (July 7, 2014 Tr. at 42.) Appellee testified that detectives informed him
    "they were looking for something in conjunction with another case. They were looking for
    a live person." (July 7, 2014 Tr. at 43.) One of the detectives "showed me the picture that
    I had shared * * * with Virgil Pennington and said do I know this person. I said no."
    (July 7, 2014 Tr. at 44.) Appellee acknowledged that the computers inside the house
    belonged to him.
    {¶ 18} On July 14, 2014, the trial court conducted another hearing on the motion
    to suppress. At the conclusion of the hearing, the court requested the parties to brief the
    "specific issue of should there have been a limit on the subpoena that went to Yahoo!
    initially." (July 14, 2014 Tr. at 17.)
    {¶ 19} On July 30, 2014, the trial court conducted a third hearing on the motion to
    suppress. During the hearing, the court stated on the record that it would grant the
    motion to suppress the email messages obtained from appellee's Yahoo account because
    "the search in this case was overbroad. It could have been narrow and should have been
    No. 14AP-812                                                                               6
    narrow and * * * based upon that overbreadth * * * it violated Mr. Shaskus' right to his
    Fourth Amendment search and seizure." (July 30, 2014 Tr. at 24-25.) By decision and
    entry filed October 9, 2014, the trial court granted the motion to suppress.
    {¶ 20} On appeal, the state sets forth the following assignment of error for this
    court's review:
    The Trial Court Committed Reversible Error in Sustaining
    Shaskus's Motion to Suppress.
    {¶ 21} Under its single assignment of error, the state argues the trial court erred in
    granting the motion to suppress based on the court's determination that the warrant was
    overbroad in its authorization to search "any and all" emails without regard to date. The
    state maintains the warrant was based on probable cause, and that it was not overbroad.
    {¶ 22} This court's review of a trial court's ruling on a motion to suppress "presents
    a mixed question of law and fact. When considering a motion to suppress, the trial court
    assumes the role of trier of fact and is therefore in the best position to resolve factual
    questions and evaluate the credibility of witnesses." State v. Burnside, 
    100 Ohio St. 3d 152
    , 2003-Ohio-5372, ¶ 8, citing State v. Mills, 
    62 Ohio St. 3d 357
    , 366 (1992). Thus, "an
    appellate court must accept the trial court's findings of fact if they are supported by
    competent, credible evidence." 
    Id., citing State
    v. Fanning, 
    1 Ohio St. 3d 19
    , 20 (1982).
    Further, "[a]ccepting these facts as true, the appellate court must then independently
    determine, without deference to the conclusion of the trial court, whether the facts satisfy
    the applicable legal standard." 
    Id., citing State
    v. McNamara, 
    124 Ohio App. 3d 706
    , 707
    (4th Dist.1997). If a reviewing court "determines that a warrant should not have been
    issued, it must then determine whether the good-faith exception applies, and that
    question is a question of law, subject to de novo review by the appellate court." State v.
    Castagnola, 
    145 Ohio St. 3d 1
    , 2015-Ohio-1565, ¶ 32.
    {¶ 23} As noted, appellee's motion to suppress sought the suppression of evidence
    obtained under two search warrants, including the warrant issued by the trial court on
    October 21, 2011, authorizing a search of the contents of appellee's Yahoo email account.
    The search warrant affidavit prepared by Detective Hunt in support of that warrant
    application stated in part:
    Affiant, Det. David R. Hunt * * * has been with the Franklin
    County Sheriff's Office for over 30 years retiring in September
    No. 14AP-812                                                                        7
    2011. For the past 19 years, affiant was assigned to the Special
    Investigations Unit conducting vice, narcotic, and internet
    crimes against children (ICAC) investigations.
    In late September 2011, the affiant began an investigation into
    an individual for the internet sexual exploitation of children.
    This individual was posting various online ads on Craigslist
    looking for "young" females for sex for which he would pay
    for.
    On Tuesday, September 20, 2011, one posting in the
    personals-casuals encounters was entitled:
    "trade young 4 young (Columbus) I have a really young lover
    looking to find another guy who has the same to share. Mine
    is 4ft5in, 70lbs blonde, very little hair and has only been with
    me. If u are interested send pics, stats of yours and if I like we
    might do some trading. Or I can give benefits to u. No
    questions asked. I'm clean whaite [sic] and safe."
    The affiant contacted the Franklin County Coroner's Office
    and provided the above noted height and weight to Chief
    Investigator Jack Sudimack who then plotted them on growth
    charts * * *. The height/weight provided on the posting would
    equate to a boy between the ages of 8-13 years old or a girl, 7-
    13 years old.
    It is the affiant's training and experience that the above noted
    ad is consistent with that of an online child sexual predator.
    On October 4, 2011, the affiant obtained a search warrant to
    obtain emails for the target of that investigation from Google
    based upon the above series of facts.
    On October 12, 2011, the affiant received the requested emails
    from Google for the target as well as subscriber information
    from AOL.com for the targets account. The affiant reviewed a
    total of 549 emails dating from 09/21/11 to 10/04/11. One of
    the replies to the target was on 9/27/11 @ 1:56 PM which was
    an email from jack.flash75@yahoo.com to the target
    expressing interest in sharing his 13 y.o. daughter with the
    subscriber. "Jack Flash" attached a photograph of a young
    white juvenile female standing next to a birthday cake with
    the number "13" on the cake. The affiant then sent a
    subpoena to Yahoo to identify jack.flash75@yahoo.com.
    No. 14AP-812                                                                             8
    "Jack Flash" and the target exchanged several follow-up
    emails between each other from 1:56 PM and 3:17 PM. One
    email from "Jack Flash" stated:
    "mine is 4'9 and she weighs about 80lbs. shes a very good girl
    and very accommodating. do you have a pic of yours I could
    see? and where in columbus are you? I'd love to play"
    This description matched that of the earlier noted photograph
    sent by "Jack Flash" to the target.
    The affiant has sent an email preservation letter to Yahoo for
    jack.flash75@yahoo.com to save any additional emails from
    this person including those to possibly other suspects. The
    investigation into the original target of this investigation is
    still on-going.
    (State's Ex. B at 2-3.)
    {¶ 24} Based on the facts set forth in the above affidavit, a municipal court judge
    approved a warrant allowing access to "the email account of Jack Flash c/o Yahoo Inc."
    for evidence of the commission of the criminal offense of "Compelling Prostitution,
    2907.21 R.C.," and authorizing the search of "any and all emails including opened,
    unopened, sent, forwarded, deleted; any and all subscriber information including names,
    addresses, other email accounts; original IP address used and date the account was
    opened; any other information relating to the email account requested." (State's Ex. B at
    1.)
    {¶ 25} The Supreme Court of Ohio has held that "[c]entral to the Fourth
    Amendment is the probable-cause requirement. While a probable-cause determination
    for an arrest warrant is similar in nature to that for a search warrant, a search-warrant
    inquiry is much more complex and presents special considerations." (Emphasis sic.)
    Castagnola at ¶ 34, citing 2 LaFave, Search and Seizure, Section 3.1(b) (5th Ed.2012). In
    order for a search warrant to issue, "the evidence must be sufficient for the magistrate to
    conclude that there is a fair probability that evidence of a crime will be found in a
    particular place.    The reviewing court then must ensure that the magistrate had a
    substantial basis for concluding that probable cause existed." 
    Id. at ¶
    35.
    {¶ 26} Further, "[i]n reviewing the sufficiency of probable cause in an affidavit
    submitted in support of a search warrant issued by a magistrate, neither a trial court nor
    No. 14AP-812                                                                            9
    an appellate court should substitute its judgment for that of the magistrate by conducting
    a de novo determination as to whether the affidavit contains sufficient probable cause
    upon which that court would issue the search warrant." State v. George, 
    45 Ohio St. 3d 325
    (1989), paragraph two of the syllabus. Rather, it is the duty of a reviewing court to
    simply "ensure that the magistrate had a substantial basis for concluding that probable
    cause existed." 
    Id. Thus, "[i]n
    conducting any after-the-fact scrutiny of an affidavit
    submitted in support of a search warrant, trial and appellate courts should accord great
    deference to the magistrate's determination of probable cause, and doubtful or marginal
    cases in this area should be resolved in favor of upholding the warrant." 
    Id. {¶ 27}
    In the instant case, with respect to facts relevant to the issue of probable
    cause, Detective Hunt averred in the affidavit cited above that members of the county's
    ICAC task force were investigating child exploitation on the internet; specifically, an
    individual had posted various online advertisements on Craigslist seeking " 'young'
    females for sex for which he would pay for." The poster placed a personal advertisement,
    dated September 20, 2011, seeking to "trade young 4 young." The poster stated he had a
    "really young lover," described as "4ft5in, 70lbs blond," and that he was "looking to find
    another guy who has the same to share." The investigating detective determined that the
    above description would "equate" to a girl between the ages of 7 and 13 years. Detective
    Hunt averred that, based on his training and experience, the advertisement at issue "is
    consistent with that of an online child sexual predator."
    {¶ 28} Detective Hunt further averred he had obtained a search warrant to obtain
    emails of the target of that investigation from Google. On October 12, 2011, the detective
    received from Google approximately 500 emails. One of the replies "was on 9/27/11 * * *
    which was an email from jack.flash75@yahoo.com to the target," in which the responder
    expressed interest in sharing his 13-year-old daughter with the subscriber.           The
    individual, identified as "Jack Flash," had attached a photograph of a "young white
    juvenile female standing next to a birthday cake with the number '13' on the cake."
    Detective Hunt noted that Flash and the "target" had exchanged several follow-up emails,
    in which Flash represented that "mine is 4'9 and she weights about 80lbs." Flash further
    stated in the email that "shes a very good girl and very accommodating," and Flash
    indicated he would "love to play."
    No. 14AP-812                                                                                 10
    {¶ 29} In reviewing the representations in the affidavit, and considering the totality
    of the circumstances, we find that the affidavit gave the magistrate grounds for
    determining there was a fair probability that the Yahoo account of Flash contained
    evidence of solicitation of a minor and/or minors for sexual activity. According deference
    to that determination, we conclude the magistrate had a substantial basis for finding
    probable cause to issue the warrant to search the email account at issue.
    {¶ 30} Such determination, however, does not end the inquiry into the legality of
    the search warrant. As noted, the focus of the trial court's analysis involved the issue of
    whether the warrant was overbroad. More specifically, during the suppression hearing,
    the court's primary inquiry was whether the absence of a temporal limitation rendered the
    warrant overbroad.
    {¶ 31} In addition to challenging whether an affidavit provides probable cause that
    evidence of a crime will be found, a criminal defendant can also challenge an affidavit on
    the basis that it is overbroad and/or not as particular as the Fourth Amendment requires.
    State v. Vu, 9th Dist. No. 11CA-0042-M, 2012-Ohio-746, ¶ 25 (In seeking to suppress
    evidence, a criminal defendant "may challenge the probable cause underlying the warrant,
    the particularity of the warrant itself, or both.").
    {¶ 32} In Castagnola, the Supreme Court recently considered "the application of
    the particularity requirement of the Fourth Amendment to the search of a computer." 
    Id. at ¶
    1. Specifically, the court discussed two issues arising in the context of the particularity
    requirement: (1) "whether the warrant provides sufficient information to 'guide and
    control' the judgment of the executing officer in what to seize," and (2) "whether the
    category as specified is too broad in that it includes items that should not be seized." 
    Id. at ¶
    79. The court further recognized, however, that "[a] search warrant that includes
    broad categories of items to be seized may nevertheless be valid when the description is
    ' " 'as specific as the circumstances and the nature of the activity under investigation
    permit.' " ' " 
    Id. at ¶
    80, quoting Guest v. Leis, 
    255 F.3d 325
    , 336 (6th Cir.2001), quoting
    United States v. Henson, 
    848 F.2d 1374
    , 1383 (6th Cir.1988), quoting United States v.
    Blum, 
    753 F.2d 999
    , 1001 (11th Cir.1985).
    {¶ 33} Under the facts of Castagnola, the defendant, Castagnola, admitted to a law
    enforcement official that he had damaged a prosecutor's vehicle after having looked up
    the address of the prosecutor on court records. A detective subsequently sought an arrest
    No. 14AP-812                                                                              11
    warrant for Castagnola, as well as a warrant to search his residence.         The affidavit
    requested a warrant to search the premises for records and documents, including those
    stored on computers and electronic recording devices, and further stated that any items
    found would be seized and used as evidence in prosecuting the crimes of "retaliation,
    criminal trespassing, criminal damaging, and possession of criminal tools." 
    Id. at ¶
    5. A
    warrant was issued, leading to the seizure of numerous items, including two computers. A
    forensic cyber-crimes analyst, employed by the Ohio Bureau of Criminal Investigation,
    examined the computers through the use of a forensic software program and found a
    screen filled with images that she thought might be child pornography. A detective then
    sought a second warrant to search the contents of the computers for evidence relating to
    child pornography. Castagnola was subsequently indicted for ten counts of pandering
    sexually oriented material.
    {¶ 34} Castagnola moved to suppress the evidence from the search, but the trial
    court denied the motion and the reviewing court affirmed. The Supreme Court accepted
    jurisdiction on two propositions of law, including the issue of whether a general
    exploratory search for evidence on a computer meets the particularity requirement of the
    Fourth Amendment.
    {¶ 35} The Supreme Court noted under the facts of the case that the detective
    believed Castagnola "had found [the prosecutor's] address online and that evidence of the
    online search would be useful in the prosecution of the alleged offenses." 
    Id. at ¶
    86. The
    detective testified at the suppression hearing that, in addition to a general Google or
    online white pages search for the prosecutor's name, he believed Castagnola may have
    searched a clerk of courts' website for information about the prosecutor because
    Castagnola mentioned in his conversation with a source that he discovered the prosecutor
    had received a parking ticket years earlier. The detective further testified that, "from his
    previous experience, he knew that an online search would create 'a cookie, which will tell
    you where [the persons who have used the computer] have been, what searches they have
    done, things of that nature.' " 
    Id. {¶ 36}
    The Supreme Court determined that the search warrant lacked particularity,
    and held that the above "details regarding the records or documents stored on the
    computer should have been included in the search warrant to guide and control the
    searcher and to sufficiently narrow the category of records or documents subject to
    No. 14AP-812                                                                               12
    seizure." 
    Id. at ¶
    87. The court held that "this degree of specificity was required, since the
    circumstances and the nature of the activity under investigation permitted the affiant to
    be this specific." 
    Id. {¶ 37}
    The Castagnola court also addressed the state's argument challenging "the
    notion that a search warrant must contain a restrictive protocol, methodology, or other
    strategy for conducting the search in order to satisfy the Fourth Amendment." 
    Id. at ¶
    88.
    The Supreme Court "agree[d] that the Fourth Amendment does not require a search
    warrant to specify restrictive search protocols," but further "recognize[d] that the Fourth
    Amendment does prohibit a 'sweeping comprehensive search of a computer's hard
    drive.' " 
    Id., quoting United
    States v. Walser, 
    275 F.3d 981
    , 986 (10th Cir.2001). The
    court thus held that "[t]he logical balance of these principles leads to the conclusion that
    officers must describe what they believe will be found on a computer with as much
    specificity as possible under the circumstances," thus enabling the searcher "to narrow his
    or her search to only the items to be seized." 
    Id. The court
    found this requirement
    "especially important when * * * the person conducting the search is not the affiant." 
    Id. {¶ 38}
    In general, the Warrants Clause of the Fourth Amendment "requires
    particularity and forbids overbreadth." United States v. Cioffi, 
    668 F. Supp. 2d 385
    , 390
    (E.D.N.Y.2009). As noted by one court, the term "overbreadth" is primarily used to refer
    to "authorizing seizures in excess of probable cause." United States v. Costin, D.C.Conn.
    No. 3:05-cr-38 (July 31, 2006). Some courts, however, use this term "more generally, to
    describe a lack of particularity." 
    Id. {¶ 39}
    The Supreme Court in Castagnola noted an overlap and interplay between
    "the probable-cause and particularity requirements." 
    Id. at ¶
    70. Federal courts have
    recognized that challenges to a warrant on the grounds they are overbroad and lack
    sufficient particularity, while "somewhat similar in focus," involve "two distinct legal
    issues: (1) whether the items listed as 'to be seized' in the warrant were overbroad because
    they lacked probable cause and (2) whether the warrant was sufficiently particularized on
    its face to provide the necessary guidelines for the search by the executing officers."
    United States v. Hernandez, S.D.N.Y. No. 09-CR-625 (Jan. 6, 2010), citing United States
    v. Cohan, 
    628 F. Supp. 2d 355
    , 359 (E.D.N.Y.2009) ("A warrant * * * can be
    unconstitutionally infirm in two conceptually distinct but related ways: either by seeking
    specific material as to which no probable cause exists, or by giving so vague a description
    No. 14AP-812                                                                            13
    of the material sought as to impose no meaningful boundaries."). See also In re Grand
    Jury Subpoenas, 
    926 F.2d 847
    , 856-57 (9th Cir.1991) (noting that particularity and
    breadth are two aspects of specificity, particularity being "the requirement that the
    warrant must clearly state what is sought," while breadth "deals with the requirement that
    the scope of the warrant be limited by the probable cause on which the warrant is based").
    {¶ 40} In the instant case, appellee argued in his motion to suppress before the
    trial court that the search warrant was overbroad because it "authorized the sheriff to
    seize 'any and all emails' in the jack.flash75@yahoo.com account," and because the
    warrant "did not limit the production of the emails to the particular time frame of the
    investigation of the September 20, 2011 Craigslist advertisement." (Appellee's Mot. to
    Suppress at 6.) As to the latter point, appellee argued that the detective exceeded the
    scope of the warrant by examining emails prior to September 2011, including a review of
    emails as far back as March 2009.
    {¶ 41} The trial court, in granting the motion to suppress, agreed with appellee's
    claim that the warrant was overbroad in that it permitted the search of emails in
    appellee's Yahoo account without any temporal limitations. The trial court noted that
    investigators had "requested information from Pennington that was very limited," while
    "the requested information from Jack Flash was very broad." (July 30, 2014 Tr. at 25.)
    The court found that Yahoo "could have complied with a narrow request." (July 30, 2014
    Tr. at 25.)
    {¶ 42} A number of federal courts have addressed claims that the use of "any and
    all" language in a warrant pertaining to the search of electronic data grants the searching
    officer too much discretion and converts the warrant into a general warrant. The Sixth
    Circuit approach involves "determining reasonableness on a case-by-case basis." United
    States v. Neuhard, E.D.Mich. No. 2:15-cr-20425 (Feb. 25, 2016). See also United States
    v. Richards, 
    659 F.3d 527
    , 538 (6th Cir.2011) (noting that "the majority of federal courts
    have eschewed the use of a specific search protocol and, instead, have employed the
    Fourth Amendment's bedrock principle of reasonableness on a case-by-case basis").
    {¶ 43} In this respect, federal courts have approved search warrants allowing
    access to the entire contents of an email account "in order to conduct a search for emails
    within the limited categories contained in the warrant." In re A Warrant for All Content
    & Other Information Associated with the Email Account xxxxxxx@Gmail.com
    No. 14AP-812                                                                            14
    Maintained at Premises Controlled by Google, Inc., 
    33 F. Supp. 3d 386
    , 394 (S.D.N.Y.
    2014) (hereafter "In re Gmail Warrant") (noting that "every case of which we are aware
    that has entertained a suppression motion relating to the search of an email account has
    upheld the Government's ability to obtain the entire contents of the email account to
    determine which particular emails come within the search warrant"). See also United
    States v. McDarrah, S.D.N.Y. No. 05-CR-1182 (July 17, 2006), aff'd 351 Fed.Appx. 558
    (2d Cir.2009) (upholding search warrant seeking "[a]ll stored electronic mail and other
    stored content" from AOL email account against overbreadth challenge); United States v.
    Upham, 
    168 F.3d 532
    , 535 (1st Cir.1999) (court finding, in case involving search of
    computer for images of child pornography on computer, that affidavit requesting "[a]ny
    and all" computer disks and disk drives "was about the narrowest definable search and
    seizure reasonably likely to obtain the images"); United States v. Deppish, 
    994 F. Supp. 2d 1211
    , 1215 (D.C.Kan.2014) (upholding warrant requiring "all contents" of Yahoo account
    for evidence of crimes of sexual exploitation of minors); Richards at 539 (upholding
    search of defendant's entire internet server and noting that, in "[a]pplying a
    reasonableness analysis on a case-by-case basis, the federal courts have rejected most
    particularity challenges to warrants authorizing seizure and search of entire personal or
    business computers").
    {¶ 44} Regarding search warrant challenges based on the lack of temporal
    limitations, the absence of a date limitation may render a warrant overbroad or
    insufficiently particular. See United States v. Ford, 
    184 F.3d 566
    , 576 (6th Cir.1999)
    ("Failure to limit broad descriptive terms by relevant dates, when such dates are available
    to the police, will render a warrant overbroad."). Federal courts, however, appear to
    generally agree that temporal restrictions are not mandatory. See United States v. DSD
    Shipping, A.S., S.D.Ala. No. 15-00102-CG-B (Sept. 2, 2015) ("Defendants cite no binding
    precedent to support the assertion that temporal restrictions are a mandatory
    requirement of a digital search. Rather, * * * courts consider the totality of the
    circumstances and in some cases, find that a temporal restriction is part of a series of
    factors considered rather than a threshold requirement."); United States v. Triumph
    Capital Group, 
    211 F.R.D. 31
    , 58 (D.C.Conn.2002) ("A temporal limitation in a warrant is
    not an absolute necessity, but is only one indicia of particularity," and therefore "the
    No. 14AP-812                                                                              15
    absence of a temporal limitation does not render the warrant a prohibited general
    warrant.").
    {¶ 45} Cases in which federal courts have upheld search warrants in the absence of
    temporal limitations typically look to the nature and circumstances of the criminal
    activity, as well as a consideration of whether the warrant was "already adequately
    particularized." United States v. Capote, N.D.Ga. No. 1:15-CR-00338-MHC-CMS (May 5,
    2016) ("Because the warrant in this case was already sufficiently particularized based on
    the subject matter limitation—i.e., evidence relating to the criminal activity under
    investigation—the lack of an additional time period limitation in the warrant does not
    render the search unconstitutional."); United States v. Ali El Khateeb, M.D.Fla. No. 8:14-
    cr-00185-T-23MAP (Aug. 4, 2015), quoting United States v. Smith, 
    918 F.2d 1501
    , 1507-
    08 (11th Cir.1990) (rejecting claim that warrant's failure to specify a date range rendered
    it fatally overbroad and defective for the seizure of any emails; rather, because the warrant
    "limits the seizure of electronic information to that connected with the possession, receipt,
    and distribution of controlled substances," such " 'nexus' satisfies the practical realities
    'that enable the searcher to ascertain and identify things authorized to be seized' ");
    United States v. Lee, N.D.Ga. No. 1:14-CR-00227-TCB-RGV (July 6, 2015) (rejecting
    argument that issuance of a search warrant requiring Google to disclose the contents of
    any electronic communications or files belonging to the relevant account did not satisfy
    Fourth Amendment's particularity requirement; investigative agents "had 'good reason
    not to include a temporal limitation in the warrants,' since they did not know, when they
    obtained the warrants, whether [an internet website] existed in some other form at the
    time the accounts were first opened in 2004").
    {¶ 46} Federal courts have rejected the necessity for temporal limitations in cases
    involving the search of computers for child pornography, noting the particular difficulties
    posed in such cases. See, e.g., Deppish at 1220 (finding that "[a] temporal limitation was
    not reasonable because child pornography collectors tend to hoard their pictures for long
    periods of time," and further noting "the dynamic nature of email accounts makes it more
    difficult to limit the scope of emails to particular dates"); United States v. Adams,
    D.C.Ver. No. 2:14-cr-79 (Aug. 25, 2015) (rejecting claim, in child pornography case, that
    warrant was overbroad because it did not constrain the search to a particular time frame,
    and distinguishing between cases involving business records and electronically stored
    No. 14AP-812                                                                              16
    child pornography; "there is often no way around the fact that many image files will have
    to be viewed to ensure that no relevant evidence has been missed").
    {¶ 47} Ohio courts have also considered the issue of temporal limitations in the
    context of the search of electronic devices. In State v. McCrory, 6th Dist. No. WD-09-
    074, 2011-Ohio-546, ¶ 38, the court noted the general rule adopted by federal courts that
    "[t]he absence of a temporal limitation will not automatically render the warrant a
    prohibited general warrant." Rather, "[a] temporal limitation in a warrant is merely one
    indicium of particularity." 
    Id. (Collecting federal
    authorities; citations omitted.)
    {¶ 48} Under the facts of McCrory, a detective investigated allegations by a woman
    that the appellant had sexually assaulted her at his residence after she responded to an
    advertisement on "craigslist.org for a topless maid." 
    Id. at ¶
    2. A municipal judge issued
    three search warrants based on facts in the detective's affidavit indicating that evidence of
    rape would be found on the appellant's home computers and peripheral devices. The
    appellant, who was subsequently charged with gross sexual imposition and pandering
    sexually oriented material involving a minor, filed a motion to suppress evidence seized
    from his home computer.
    {¶ 49} One of the warrants issued in that case authorized the police "to analyze the
    seized devices and 'recover any emails, documents, photos, or any other documentation
    pertaining to Craigslist.org, the victim from 08-6911, any phone calls, text messages
    received or made to the victim of 08-6911 * * * which is in violation of 2907.02 ORC
    Rape.' " 
    Id. at ¶
    9. The trial court denied the motion to suppress and, on appeal, the
    appellant raised a challenge that the warrants were insufficiently particular and overbroad
    because "they described the items to be seized in broad terms without imposing a
    temporal limitation." 
    Id. at ¶
    32. More specifically, the appellant argued that "a 'narrower
    description was available to the police, namely a limitation to the time between the
    [Craigslist] ad placement (June 14, 2008) and the complaint (June 28, 2008).' " 
    Id. at ¶
    33.
    {¶ 50} The reviewing court in McCrory rejected the appellant's argument, finding
    that the lack of temporal limitations did not render the warrants overbroad because the
    warrants "contained sufficient subject-matter limitations to satisfy the particularity
    requirement." 
    Id. at ¶
    34. The court noted that "[s]ubject-matter limitations sufficient to
    No. 14AP-812                                                                                17
    satisfy the particularity requirement include references to the crime or criminal activity at
    hand, specific persons, or specific types of materials." 
    Id. at ¶
    43.
    {¶ 51} In the present case, based on this court's review of the record and applicable
    law, we conclude that the warrant authorizing the search of appellee's Yahoo email
    account was not overbroad or insufficiently particular. We have previously determined
    that the magistrate had a substantial basis for finding probable cause to permit the search
    of the account for evidence of solicitation of a minor and/or minors for sexual activity.
    The warrant at issue specifically identified the email account to be searched and limited
    the scope of the search to evidence of a particular crime, i.e., "evidence of the commission
    of the criminal offense of Compelling Prostitution, [R.C.] 2907.21." See Deppish at 1220
    (while affidavit sought disclosure of entire Yahoo email account, it "limited seizure to
    instrumentalities and evidence tending to show and identify persons engaged in" a
    specific offense, i.e., "sexual exploitation of children in violation of 18 U.S.C. § 2252(a)").
    See also United States v. Tsarnaev, 
    53 F. Supp. 3d 450
    , 457 (D.C.Mass.2014) (the scope of
    the warrant was properly limited by "restricting the search to evidence of specified
    crimes"); State v. Enyart, 10th Dist. No. 08AP-184, 2010-Ohio-5623 ¶ 40 (search warrant
    not overbroad where it "named the items to be seized in reference to the crimes of
    voyeurism and pandering, thus limiting the search to items related to the offense").
    {¶ 52} The fact that the warrant in this case authorized the search of "any and all"
    emails in the account did not render it impermissibly overbroad or facially invalid. As
    noted, federal courts have in general upheld the government's ability to "obtain the entire
    contents" of an email account in order to determine "which particular emails come within
    the search warrant." In re Gmail Warrant at 394 (collecting cases; citations omitted.)
    See also United States v. Grimmett, 
    439 F.3d 1263
    , 1271 (10th Cir.2006) (warrant
    authorizing agents to search "any and all" computer equipment was not overbroad
    because it contained "sufficiently particularized language requiring a nexus with child
    pornography").
    {¶ 53} Nor do we find the lack of a temporal limitation to be dispositive under the
    circumstances. As cited above, courts have generally determined there is no blanket
    requirement that warrants have a date restriction. During the suppression hearing in this
    case, Detective Hunt testified that he was concerned there was "a live victim that was
    being molested in real time" (i.e., a minor being traded for sex) that he needed to identify
    No. 14AP-812                                                                              18
    and locate. (July 7, 2014 Tr. at 13.) As noted by the state, one of the emails from Flash,
    and identified in the affidavit, stated that the girl he was offering to trade for sex was "a
    very good girl and very accommodating," suggesting that Flash had traded the minor for
    sex in the past.    The detective also averred in the affidavit that he sent Yahoo a
    preservation letter to save additional emails from this individual, including those to
    "possibly other suspects," and that the investigation was "still on-going."
    {¶ 54} Thus, at the time of the affidavit, investigators knew that an individual using
    a Yahoo email account and the moniker "Jack Flash" had responded to an advertisement
    by a poster seeking to "trade young 4 young," and that Flash in turn had offered to trade a
    minor for sex; the ICAC task force, however, did not have information regarding the
    identity of Flash or the girl, and whether Flash had previously arranged through emails to
    trade the girl for sex. The state argues that, based on the information available at the
    time, including language in the emails suggesting Flash had traded an "accommodating"
    minor in the past, Detective Hunt had a valid reason not to include a temporal limitation.
    We agree and find it was reasonable for the magistrate reviewing the affidavit to conclude
    that emails in the Yahoo account predating the exchanges between Flash and Pennington
    might contain evidence relating to solicitation of a minor. See United States v. McDarrah,
    351 Fed.Appx. 558, 561 (2d Cir.2009) (rejecting claim that warrant to search entire
    contents of AOL account was overbroad as not limited to email messages between
    defendant and "Julie" or "David Smith"; magistrate "could have determined there was
    ample evidence that a crime was committed and strong indication that further evidence of
    criminal activity could be found in e-mails between McDarrah and people other than
    'Julie' and 'David Smith' "); Richards at 541 ("In light of the information known at the
    time the search warrant was issued," warrant authorizing search of entire server was not
    overbroad.); Lee (even though certain emails may have "predated the alleged onset" of
    criminal activity, such emails "might nevertheless prove relevant" in determining the
    identity of the defendants involved, and could be important for "authenticating the
    evidence and laying a proper foundation"). Based on the record presented, we conclude
    that the warrant in this case was " ' "as specific as the circumstances and the nature of the
    activity under investigation permit[ted]." ' " Castagnola at ¶ 80, quoting Leis at 336,
    quoting United States v. Henson, 
    848 F.2d 1374
    , 1383 (6th Cir.1988), quoting United
    States v. Blum, 
    753 F.2d 999
    , 1001 (11th Cir.1985).
    No. 14AP-812                                                                             19
    {¶ 55} Additionally, we note that Detective Hunt testified that he conducted the
    search of the email account employing a limiting methodology. Specifically, the detective
    performed a filtering procedure by restricting his review of the emails to those with
    attachments, hoping to discover the identity of the 13-year-old girl depicted in the
    photograph in the email sent by appellee. See, e.g., Deppish at 1220 (although warrant
    did not identify a particularized search strategy, agent employed such a strategy; "[h]e did
    not search or view the entirety of the emails in the YAHOO account," but, rather, he
    "performed a keyword, filtered search, to focus on those emails that would probably
    contain instrumentalities and evidence * * * tending to show and identify persons engaged
    in sexual exploitation of children"). See also Grimmett at 1270 (even though warrant
    authorized search of "any and all computer software," there was no evidence of
    "exploratory rummaging" as agent "testified that he specially searched for files with
    images," and thus "[n]o wholesale searching occurred here, despite the broad authority
    the warrant may have granted"). Similarly, the facts of this case do not suggest evidence
    of such "exploratory rummaging," nor does the record indicate the search method
    employed by the detective was unreasonable.
    {¶ 56} On review, we do not find that the search warrant at issue was
    impermissibly overbroad or that it was particularly insufficient. Accordingly, we conclude
    that the trial court erred in granting appellee's motion to suppress evidence with respect
    to the search of appellee's Yahoo email account.
    {¶ 57} Appellee has submitted, as supplemental authority, the Supreme Court's
    recent decision in Castagnola. We find, however, the facts of that case, as well as the
    particularity concerns addressed therein, are distinguishable and do not compel a
    determination that the search warrant at issue in this case was invalid.
    {¶ 58} In general, Castagnola stands for the proposition that "[t]he particularity
    demanded from a search warrant is contingent upon the government's knowledge and the
    particular circumstances of the case." State v. Knoefel, 11th Dist. No. 2014-L-088, 2015-
    Ohio-5207, ¶ 129, citing Castagnola at ¶ 80. As noted in our earlier discussion of
    Castagnola, the Supreme Court, in finding that the language of the search warrant did not
    "guide and control" the judgment of the forensic examiner, cited testimony by the
    examiner that "Castagnola's computer was brought in for a case involving 'menacing,
    threatening, and intimidation,' " and that the "analyst read the case synopsis and the
    No. 14AP-812                                                                                             20
    search-warrant affidavit and then looked at all the information on the hard drive 'looking
    for any evidence of intimidation of David * * * and anything associated with that.' " 
    Id. at ¶
    83. The court found "the determination on what to seize was within [the forensic
    examiner's] discretion." 
    Id. Further, the
    broad language of the warrant permitted the
    forensic examiner "to examine every record or document on Castagnola's computer in
    order to find any evidence of the alleged crimes." 
    Id. at ¶
    84. Noting testimony by the
    detective as to his knowledge of Castagnola's online activities in seeking information
    about the law director, as well as the detective's general knowledge about an online search
    creating a "cookie," the Supreme Court found "those details regarding the records or
    documents stored on the computer should have been included" in the search warrant to
    guide and control the searcher because "the circumstances and the nature of the activity
    under investigation permitted the affiant to be this specific." 
    Id. at ¶
    86, 87.
    {¶ 59} By contrast, the investigators in the present case did not possess that type of
    knowledge and information. Stated otherwise, under the facts of Castagnola, the police
    were "capable of providing greater particularity" based on the amount of knowledge they
    possessed regarding the object of the search. Knoefel at ¶ 129 (distinguishing the facts of
    Castagnola). Additionally, the concerns raised by the scope of the search conducted
    under the facts of Castagnola (permitting the forensic examiner "to examine every record
    or document on Castagnola's computer in order to find any evidence of the alleged
    crimes") are not present in the instant case. Castagnola at ¶ 84. As previously noted, the
    warrant at issue in this case authorized police to search for evidence related to a specific
    offense, and Detective Hunt limited his review of the emails to those with attachments,
    hoping to discover the identity of the 13-year-old girl described by appellee in the email he
    sent to Pennington.1
    1 We note that the facts of the instant case, in which the detective who submitted the affidavit was involved
    in the investigation and search, do not raise an additional concern noted by the Supreme Court in
    Castagnola regarding scenarios in which a mistaken search can occur where "the person conducting the
    search [i.e., the forensic analyst] is not the affiant." Castagnola at ¶ 88.
    No. 14AP-812                                                                                             21
    {¶ 60} Based on the foregoing, we conclude that the trial court erred in granting
    appellee's motion to suppress evidence seized from his Yahoo email account.2                            We
    therefore sustain the state's single assignment of error.
    {¶ 61} Accordingly, having sustained the state's assignment of error, the judgment
    of the Franklin County Court of Common Pleas is reversed, and this matter is remanded
    to that court for further proceedings in accordance with law, consistent with this decision.
    Judgment reversed and cause remanded.
    DORRIAN, P.J., concurs.
    BRUNNER, J., dissents.
    BRUNNER, J., dissenting.
    {¶ 62} I respectfully dissent from the decision of the majority. I would overrule the
    State's sole assignment of error and affirm the judgment of the trial court. I would hold
    that a search warrant based on a single suspicious e-mail conversation that purported to
    authorize the search of any and all e-mails regardless of sender, recipient, subject, date, or
    status (opened, unopened, deleted, sent, or forwarded) or duration of e-mail account was
    unconstitutionally overbroad. The executing officer (who was also the affiant for the
    search warrant) was not justified in relying on it. I would hold that the fruits of that
    search and other derivative searches traceable to such a warrant were properly excluded.
    {¶ 63} In considering whether a warrant is unconstitutionally overbroad, reviewing
    courts must conduct a de novo review. State v. Dingess, 10th Dist. No. 10AP-848, 2011-
    Ohio-5659, ¶ 32, citing State v. Enyart, 10th Dist. No. 08AP-184, 2010-Ohio-5623, ¶ 38;
    State v. Gritten, 11th Dist. No. 2004-P-0066, 2005-Ohio-2082, ¶ 11; United States v.
    Ford, 
    184 F.3d 566
    , 575 (6th Cir.1999).
    {¶ 64} The authority for finding a warrant overbroad finds its origins in the plain
    text of the Fourth Amendment.
    The right of the people to be secure in their persons, houses,
    papers, and effects, against unreasonable searches and
    seizures, shall not be violated, and no Warrants shall issue,
    but upon probable cause, supported by Oath or affirmation,
    2 The trial court did not reach the merits of appellee's constitutional challenge to the second warrant,
    authorizing the search of the Hunter Avenue residence. We leave it to the trial court to decide in the first
    instance, on remand, that issue.
    No. 14AP-812                                                                             22
    and particularly describing the place to be searched, and the
    persons or things to be seized.
    (Emphasis added.)      "It is familiar history that indiscriminate searches and seizures
    conducted under the authority of 'general warrants' were the immediate evils that
    motivated the framing and adoption of the Fourth Amendment." Payton v. New York,
    
    445 U.S. 573
    , 583 (1980); see also 
    id. at 583-85,
    fn. 21, quoting Stanford v. Texas, 
    379 U.S. 476
    , 481-82 (1965); Boyd v. United States, 
    116 U.S. 616
    , 625 (1886). "[S]earches
    deemed necessary should be as limited as possible. [T]he problem is not that of intrusion
    per se, but of a general, exploratory rummaging in a person's belongings." (Emphasis
    sic.) Coolidge v. New Hampshire, 
    403 U.S. 443
    , 467 (1971). This Court has observed, "
    '[t]o search for evidence of a crime there must "be a nexus * * * between the item to be
    seized and criminal behavior" as well as "cause to believe that the evidence sought will aid
    in a particular apprehension or conviction." ' " Dingess at ¶ 33, quoting Enyart at ¶ 32,
    quoting Warden, Maryland Penitentiary v. Hayden, 
    387 U.S. 294
    , 307 (1967).
    {¶ 65} The majority decision spends significant effort in discussing and
    distinguishing the recent Supreme Court of Ohio decision finding that a warrant that
    purported to authorize a search of a computer was insufficiently particular where it failed
    to limit the search within the computer to particular subjects and sought instead merely
    "[r]ecords and documents stored on the computer." State v. Castagnola, 
    145 Ohio St. 3d 1
    , 2015-Ohio-1565, ¶ 77. In reaching this finding, the Supreme Court explained:
    Courts addressing the particularity requirement of the Fourth
    Amendment are concerned with two issues. The first issue is
    whether the warrant provides sufficient information to "guide
    and control" the judgment of the executing officer in what to
    seize. United States v. Upham, 
    168 F.3d 532
    , 535 (1st
    Cir.1999). The second issue is whether the category as
    specified is too broad in that it includes items that should not
    be seized. See United States v. Kow, 
    58 F.3d 423
    , 427 (9th
    Cir.1995).
    A search warrant that includes broad categories of items to be
    seized may nevertheless be valid when the description is " ' "as
    specific as the circumstances and the nature of the activity
    under investigation permit." ' " Guest v. Leis, 
    255 F.3d 325
    ,
    336 (6th Cir.2001), quoting United States v. Henson, 
    848 F.2d 1374
    , 1383 (6th Cir.1988), quoting United States v.
    Blum, 
    753 F.2d 999
    , 1001 (11th Cir.1985). Warrants that fail to
    No. 14AP-812                                                                            23
    describe the items to be seized with as much specificity as the
    government's knowledge and the circumstances allow are
    "invalidated by their substantial failure to specify as nearly as
    possible the distinguishing characteristics of the goods to be
    seized." United States v. Fuccillo, 
    808 F.2d 173
    , 176 (1st Cir.).
    Because computers can store a large amount of information
    "there is a greater potential for the 'intermingling' of
    documents and a consequent invasion of privacy when police
    execute a search for evidence on a computer. * * * Officers
    must be clear as to what it is they are seeking on the computer
    and conduct the search in a way that avoids searching files of
    types not identified in the warrant." United States v. Walser,
    
    275 F.3d 981
    , 986 (10th Cir.2001). "[P]ractical accuracy
    rather than technical precision" is the operative consideration.
    United States v. Dorrough, 
    927 F.2d 498
    , 500 (10th Cir.1991).
    Castagnola at ¶ 79-81. The Supreme Court also explained the fact that the records "would
    be used to prosecute Castagnola for the crimes of retaliation, criminal trespassing,
    criminal damaging, and possession of criminal tools, added nothing to narrow the
    search." 
    Id. at ¶
    82. "As written," the Court concluded, "this search warrant failed to
    address both concerns that courts consider when determining whether a warrant satisfies
    the particularity requirement of the Fourth Amendment." 
    Id. {¶ 66}
    In judging the validity of a warrant we are limited to the information that
    was presented to the magistrate which, in cases without a hearing, confines our analysis to
    the four corners of the warrant affidavit. Castagnola at ¶ 39; State v. Bean, 13 Ohio
    App.3d 69, 71 (6th Dist.1983). Here the warrant affidavit set forth the facts known to the
    police that justified the suspicion that evidence of a crime might be found at Yahoo!, Inc.
    ("Yahoo") as follows:
    [The target of another investigation, on] Tuesday,
    September 20, 2011, [posted an advertisement on Craigslist:]
    "trade young 4 young (Columbus) I have a really young lover
    looking to find another guy who has the same to share. Mine
    is 4ft5in, 70lbs blonde, very little hair and has only been with
    me. If u are interested send pics, stats of yours and if I like we
    might do some trading. Or I can give benefits to u.No
    questions asked. I'm clean whaite and safe."
    ***
    No. 14AP-812                                                                            24
    One of the replies to the target was on 9/27/11 @ 1:56 PM
    which was an email from jackflash75@yahoo.com to the
    target expressing interest in sharing his 13 y.0. daughter with
    the [target]. "Jack Flash" attached a photograph of a young
    white juvenile female standing next to a birthday cake with
    the number "13" on the cake.
    "Jack Flash" and the target exchanged several follow-up
    emails between each other from 1:56 PM and 3:17 PM. One
    email from "Jack Flash" stated:
    "mine is 4'9 and she weighs about 80lbs. shes a very good girl
    and very accommodating. do you have a pic of yours i could
    see? and where in columbus are you? id love to play"
    This description matched that of the earlier noted photograph
    sent by "Jack Flash" to the target.
    (Sic passim.) (State's Ex. B at 2-3.) Based on this information, Detective Hunt sought and
    obtained a warrant to search Yahoo and seize, "any and all emails including opened,
    unopened, sent, forwarded, deleted [as to] the email account of Jack Flash," as well as
    information regarding "other email accounts." 
    Id. at 2.
          {¶ 67} Like computers, e-mail accounts "can store a large amount of information"
    and thus, as is true of computer searches, " 'there is a greater potential for the
    "intermingling" of documents and a consequent invasion of privacy when police' " seek to
    search through a person's e-mails. Castagnola at ¶ 81, quoting United States v. Walser,
    
    275 F.3d 981
    , 986 (10th Cir.2001). Consequently, "[o]fficers must be clear as to what it is
    they are seeking" and avoid seizing or searching "types [of e-mails] not identified in the
    warrant." 
    Id. Applying the
    reasoning set forth by Castagnola to this case, the warrant
    sought and obtained by Detective Hunt was insufficiently particular to satisfy
    constitutional requirements. The warrant affidavit presented evidence that "Jack Flash"
    had responded to an advertisement one afternoon in September 2011 that appeared to
    propose the exchange of juvenile children for sexual purposes. The affidavit presented no
    evidence to suggest that "Jack Flash" had followed through on the trade or that the would-
    be crime actually materialized past the planning stages, nor did it present any evidence
    No. 14AP-812                                                                                          25
    that "Jack Flash" had ever attempted such a trade before.3 "Jack Flash's" description of a
    girl as "very accommodating" implied that he had some experience with her willingness to
    engage in sexual behavior. (State's Ex. A at 6.) But the affidavit did not explain why
    evidence of "Jack Flash's" sexual activities with this girl would be contained in e-mails, let
    alone explain the need to seize every e-mail "opened, unopened, sent, forwarded, [or]
    deleted" from "Jack Flash's" e-mail account regardless of subject, sender, or recipient for
    the entire history of the account's existence or why information about "other email
    accounts" would be pertinent. (State's Ex. B at 2.)
    {¶ 68} In short, like the warrant in Castagnola, the warrant here does not "guide
    and control" the judgment of the executing officer in what to seize (because it essentially
    commands the officer to seize everything), and the category as specified is too broad in
    that it includes items that should not be seized (thousands of unrelated and irrelevant
    private communications). Castagnola at ¶ 79, citing United States v. Upham, 
    168 F.3d 532
    , 535 (1st Cir.1999); United States v. Kow, 
    58 F.3d 423
    , 427 (9th Cir.1995). This
    warrant, which purported to authorize the seizure of literally every e-mail to pass through
    the jack.flash75 account for the entire duration of the account's existence, irrespective of
    sender, recipient, or subject, was the quintessential "general, exploratory rummaging in a
    person's belongings." Coolidge at 467.
    {¶ 69} The State argues that the broad scope of the warrant was justified by the
    need to determine "whether, when, how often, and with whom 'Jack Flash' had offered up
    the girl for sex in the past, and any other children involved."                  (State's Brief at 9.)
    However, the concept that "Jack Flash" had ever "offered up [this] girl for sex in the past,
    and any other children," is post hoc speculation unsupported at its inception by an
    evidentiary basis. 
    Id. at 9.
    The affidavit contains no factual information that "Jack Flash"
    had used e-mail to offer this girl or any other children for sex before, and the affiant did
    not offer an opinion based on a factual reason to suspect that he had. (State's Ex. B at 2.)
    {¶ 70} Warrants issue upon probable cause, and the basis for probable cause is
    fact, not speculation. Miller v. Sanilac Cty., 
    606 F.3d 240
    , 248 (6th Cir.2010), quoting
    Henry v. United States, 
    361 U.S. 98
    , 102 (1959) (defining probable cause as "when 'the
    facts and circumstances * * * warrant a prudent [person] in believing that an offense has
    3   Shaskus apparently did not actually have a daughter and stated he had no idea who the girl was in the
    No. 14AP-812                                                                             26
    been committed.' "). The speculation that the State proposes to indulge is little different
    from arguing that there is probable cause to search the house of a suspected burglar for
    the loot of other, different burglaries on the theory that if a burglar has committed one
    burglary, he must have committed others.
    {¶ 71} The reasons supporting probable cause must be contained in the warrant
    affidavit. It is not sufficient to offer them for the first time (such as in a suppression
    hearing or an appellate brief) long after the warrant has been executed. Castagnola at
    ¶ 39; Bean at 71. Only by post hoc speculation could one conclude from the warrant
    affidavit that "Jack Flash's" e-mails (other than e-mails related by time, senders, or
    subjects, to the conversation that justified the search warrant) would show evidence of
    other crimes. (State's Ex. B at 2-3.)
    {¶ 72} The State argues that the warrant was justified by the need to determine the
    identity of the girl in the photograph and the need to determine "Jack Flash's" identity. I
    acknowledge that it was important to the investigation to attempt to discern the identity
    of "Jack Flash" and his purported "daughter." However, "Jack Flash's" identity (and the
    identity of his "daughter") could have been readily ascertained by requesting records from
    Yahoo regarding the IP address and identity of the owner of the e-mail account. In fact, in
    addition to the request for "all emails," the warrant specifically sought exactly those
    records from Yahoo. It was through "Jack Flash's" IP address, not his e-mails, that the
    residence was located. Courts have discouraged the practice of using the search for
    background investigative facts as a justification for searches beyond the scope of probable
    cause. Ford at 576; United States v. Srivastava, 
    476 F. Supp. 2d 509
    , 514 (D.Md.2007).
    {¶ 73} Even assuming the validity of the State's basis for a warrant authorizing a
    broader search of the e-mails, the scope of the warrant was still too broad. In United
    States v. Abboud, 
    438 F.3d 554
    , 575-76 (6th Cir.2006), the United States Sixth Circuit
    Court of Appeals found a warrant was overbroad where it sought records from a six-year
    time span when the facts in the affidavit only evidenced a check-kiting scheme spanning
    three months. 
    Id. (ultimately finding
    the error was harmless). The Sixth Circuit has
    moreover explained, "[f]ailure to limit broad descriptive terms by relevant dates, when
    such dates are available to the police, will render a warrant overbroad." Ford at 576.
    picture with the cake and "13" candle. (State's Ex. A at 7.)
    No. 14AP-812                                                                              27
    {¶ 74} In this case the evidence for the search warrant consisted of one
    conversation related to a Craigslist advertisement between two persons on the afternoon
    of September 27, 2011. Yet, the warrant authorized the search and seizure of "all emails"
    regardless of date, subject, sender, or recipient, "opened, unopened, sent, forwarded, [or]
    deleted," and it even authorized the collection of records relating to "other email
    accounts." (State's Ex. B at 2.) Depending on the age of the jack.flash75 account, the
    warrant could have authorized the seizure of decades of e-mail. The record does not
    reflect how old the jack.flash75@yahoo.com address was, but it is undisputed that "well
    over 3,000 emails" were seized. (State's Ex. C at 5.) In the "well over 3,000 emails" the
    police found just one culpable conversation involving child pornography in March 2009—
    two and one-half years before the Craigslist conversation that purported to justify the
    search. 
    Id. {¶ 75}
    The majority notes that the officer somewhat limited his examination of the
    e-mails by examining only those that had attachments. (Majority decision at ¶ 14.) The
    majority also states that, "federal courts have approved search warrants allowing access to
    the entire contents of an email account 'in order to conduct a search for emails within
    the limited categories contained in the warrant.' " (Emphasis added.) (Majority decision
    at ¶ 43, quoting In re A Warrant for All Content & Other Info. Associated with the Email
    Account xxxxxxx@Gmail.com Maintained at Premises Controlled by Google, Inc., 
    33 F. Supp. 3d 386
    , 394 (S.D.N.Y.2014)).         However, I would respectfully view those
    observations as a whole as a proverbial red herring, because Shaskus' case does not
    involve a large volume of e-mails that were copied and then reviewed according to
    limitations set forth in a warrant, but rather, a large volume of e-mails seized with no such
    limitations in the warrant.
    {¶ 76} I acknowledge that in the context of electronic records, the police may
    sometimes end up with a copy of an account because perhaps a third-party custodian (like
    Yahoo) will not wish to search through the e-mail account itself in order to identify
    materials implicated by a limited warrant even though authorized to do so. But regardless
    of whether Yahoo or any other similarly situated custodian makes a copy of the entire
    account, makes a copy of part of the account, or invites the police on-site to inspect
    material in its data center, in order to be constitutionally valid, the warrant must still
    direct the police as to what material to search and seize as evidence. The mere fact that
    No. 14AP-812                                                                               28
    the nature of electronic records dictates that they reside with a third party and that it is
    sometimes more practical to search a copy in the police station rather than search the
    original at the data center, does not mean that the warrant authorizing and limiting the
    search is relieved of the particularity requirements of the Fourth Amendment. As the
    Sixth Circuit Court of Appeals in Ford, put it, "[f]ailure to limit broad descriptive terms by
    relevant dates, when such dates are available to the police, will render a warrant
    overbroad." 
    Id. at 576.
    In other words, where, as here, the police know what time-frame
    is involved, they cannot constitutionally ignore the limits of probable cause and instead
    seek and act on a warrant with unlimited broad descriptive terms. Because if a warrant is
    based on probable cause as to a limited time frame but authorizes unlimited search and
    seizure, it is overbroad.
    {¶ 77} The evidence seized (e-mails and attachments) during the search of Yahoo
    was appropriately suppressed. See United States v. Wong Sun, 
    371 U.S. 471
    , 487-88
    (1963). The trial court was also justified in suppressing the evidence found on Shaskus'
    computer during the search of his residence. The warrant to search Shaskus' residence
    authorized a search of "a computerized information system" to discover "evidence of the
    commission of the criminal offenses of Pandering Obscenity Involving a Minor, 2907.32
    R.C.; Illegal Use of a Minor in Nudity Oriented Material, 2907.323 R.C.; Disseminating
    Matter Harmful to Juveniles, 2907.31 R.C.; [and] Endangering Children, 2991.22 R.C. "
    (State's Ex. C at 1.)
    {¶ 78} The motivator for the search of Shaskus' house and computer was finding
    child pornography, extended from the original suspicion that Shaskus had a daughter
    whom he was attempting to trade for sex. The pornography found on Shaskus' computer
    was "fruit of the poisonous tree." It was found during a search of computer equipment
    and supported by the child pornography evidence obtained in the unconstitutionally
    overbroad search of Yahoo. 
    Id. at 487-88.
    As the Supreme Court of Ohio held:
    The exclusionary rule reaches not only primary evidence
    obtained as a direct result of an illegal search or seizure, but
    also evidence later discovered and found to be derivative of an
    illegality, or "fruit of the poisonous tree." Nardone v. United
    States (1939), 
    308 U.S. 338
    , 
    60 S. Ct. 266
    , 
    84 L. Ed. 307
    . The
    reason for the rule is the concern that if derivative evidence
    were not suppressed, police would have an incentive to violate
    constitutional rights in order to secure admissible derivative
    No. 14AP-812                                                                              29
    evidence even though the primary evidence secured as a result
    of the constitutional violation would be inadmissible. See
    Katz, Ohio Arrest, Search and Seizure (3 Ed.1992), Section
    2.07. Justice Frankfurter explained in Nardone, "To forbid
    the direct use of methods thus characterized but to put no
    curb on their full indirect use would only invite the very
    methods deemed 'inconsistent with ethical standards and
    destructive of personal liberty.'" 
    Nardone, supra, at 340
    , 60
    S.Ct. at 
    267, 84 L. Ed. at 311
    .
    State v. Carter, 
    69 Ohio St. 3d 57
    , 67 (1994).
    {¶ 79} The majority decision does not reach the State's good-faith argument,
    because it reverses the trial court's decision. That argument should be addressed, because
    of its tendency to be used incorrectly to excuse an unconstitutional search and seizure in
    violation of the Fourth Amendment. The State argues that the police relied in good faith
    on warrants to search both Yahoo and Shaskus' home and computer. That is, the State
    contends that an exception to the exclusionary rule arises because the officers relied in
    good faith on the warrants, and the evidence therefore should not have been excluded.
    Id.; United States v. Leon, 
    468 U.S. 897
    (1984).
    {¶ 80} However, the "good faith" exception to the exclusionary rule set forth in
    Leon does not operate where "a warrant [is] so facially deficient -- i.e., in failing to
    particularize the place to be searched or the things to be seized -- that the executing
    officers cannot reasonably presume it to be valid." 
    Id. at 923;
    see also, e.g., Gritten at
    ¶ 20. Here, the Yahoo warrant purported to authorize the seizure of "any and all emails"
    for the entire account history irrespective of sender, recipient, or subject and whether the
    e-mails were "opened, unopened, sent, forwarded, [or] deleted," and it even extended to
    the collection of records relating to "other email accounts." (State's Ex. B at 2.) Absent
    evidence of pervasive, continuous, and long-standing use of this and other e-mail
    accounts for criminal activity, this warrant was facially overbroad; it was so much so that
    Detective Hunt (who was the affiant and thus knew that the evidence justifying the
    warrant consisted of a single suspicious conversation on a single afternoon between just
    two persons) could not have reasonably presumed it to be valid.
    {¶ 81} With respect to the warrant to search Shaskus' computer and home, the
    Supreme Court has held, "[t]he good-faith exception does not apply where a search
    warrant is issued on the basis of evidence obtained as a result of an illegal search." Carter
    No. 14AP-812                                                                            30
    at 68. Were the rule otherwise, an officer could violate the United States Constitution to
    obtain incriminating evidence, "launder" that evidence by presenting it to a magistrate in
    order to obtain a warrant for a further search, and then rely on the good faith of officers
    executing the warrant to avoid the exclusion of incriminating evidence found pursuant to
    the warrant search. See Nardone v. United States, 
    308 U.S. 338
    , 340-41 (1939); see also,
    e.g., Murray v. United States, 
    487 U.S. 533
    , 540 (1988); Carter at 67.
    {¶ 82} For the reasons set forth in this dissent, I would overrule the State's sole
    assignment of error and affirm the judgment of the trial court.
    _____________________
    

Document Info

Docket Number: 14AP-812

Citation Numbers: 2016 Ohio 7942

Judges: Brown

Filed Date: 11/29/2016

Precedential Status: Precedential

Modified Date: 4/17/2021

Authorities (27)

Nardone v. United States , 60 S. Ct. 266 ( 1939 )

steven-guest-denise-b-kelley-nelda-sturgill-deborah-cummings-randy-bowling , 255 F.3d 325 ( 2001 )

United States v. Srivastava , 476 F. Supp. 2d 509 ( 2007 )

United States v. Andrew Jackson Smith, Isaac Hicks, Samuel ... , 115 A.L.R. Fed. 721 ( 1990 )

Payton v. New York , 100 S. Ct. 1371 ( 1980 )

United States v. Wesley Allen Dorrough , 927 F.2d 498 ( 1991 )

Warden, Maryland Penitentiary v. Hayden , 87 S. Ct. 1642 ( 1967 )

Boyd v. United States , 6 S. Ct. 524 ( 1886 )

Murray v. United States , 108 S. Ct. 2529 ( 1988 )

Coolidge v. New Hampshire , 91 S. Ct. 2022 ( 1971 )

United States v. Grimmett , 439 F.3d 1263 ( 2006 )

United States v. Edward William Blum, A/K/A Edward William ... , 753 F.2d 999 ( 1985 )

United States v. Russell Lane Walser , 275 F.3d 981 ( 2001 )

United States v. Leon , 104 S. Ct. 3405 ( 1984 )

United States v. Cohan , 628 F. Supp. 2d 355 ( 2009 )

United States v. Upham , 168 F.3d 532 ( 1999 )

United States v. Cioffi , 668 F. Supp. 2d 385 ( 2009 )

United States v. Richards , 659 F.3d 527 ( 2011 )

United States v. Stephen Kow Helen Kim Noi Soo and Hong Tho ... , 58 F.3d 423 ( 1995 )

Stanford v. Texas , 85 S. Ct. 506 ( 1965 )

View All Authorities »