United States v. Joseph Schesso ( 2013 )


Menu:
  •                      FOR PUBLICATION
    UNITED STATES COURT OF APPEALS
    FOR THE NINTH CIRCUIT
    UNITED STATES OF AMERICA,                      No. 11-30311
    Plaintiff-Appellant,
    D.C. No.
    v.                      3:11-cr-05285-RJB-1
    JOSEPH T. SCHESSO,
    Defendant-Appellee.                  OPINION
    Appeal from the United States District Court
    for the Western District of Washington
    Robert J. Bryan, Senior District Judge, Presiding
    Argued and Submitted
    June 6, 2013—Seattle, Washington
    Filed September 18, 2013
    Before: Ronald Lee Gilman,* M. Margaret McKeown,
    and Sandra S. Ikuta, Circuit Judges.
    Opinion by Judge McKeown
    *
    The Honorable Ronald Lee Gilman, Senior Circuit Judge for the U.S.
    Court of Appeals for the Sixth Circuit, sitting by designation.
    2                  UNITED STATES V. SCHESSO
    SUMMARY**
    Criminal Law
    The panel reversed the district court’s grant of a
    suppression motion in a case in which officers found 3,400
    electronic images and 632 electronic videos of commercial
    child pornography pursuant to a warrant authorizing an
    electronic search of all of the defendant’s computer
    equipment and digital storage devices.
    The panel held that because there was a fair probability
    that evidence of child pornography would be found on the
    defendant’s computer system, the underlying facts supported
    a finding of probable cause; that the warrant was not
    overbroad and did not raise the risks inherent in over-seizing
    that this court considered in United States v. Comprehensive
    Drug Testing, Inc., 
    621 F.3d 1162
     (9th Cir. 2010) (en banc)
    (per curiam); and that the absence of precautionary search
    protocols was not fatal here.
    COUNSEL
    Helen J. Brunner (argued), Assistant United States Attorney,
    Jenny A. Durkan, United States Attorney, Office of the
    United States Attorney, Seattle, Washington, for Plaintiff-
    Appellant.
    **
    This summary constitutes no part of the opinion of the court. It has
    been prepared by court staff for the convenience of the reader.
    UNITED STATES V. SCHESSO                      3
    Colin A. Feiman (argued), Assistant Federal Public Defender,
    Alan Zarky, Research & Writing Attorney, Federal Public
    Defender, Tacoma, Washington, for Defendant-Appellee.
    OPINION
    McKEOWN, Circuit Judge:
    Searches of electronic records pose unique challenges for
    “striking the right balance between the government’s interest
    in law enforcement and the right of individuals to be free
    from unreasonable searches and seizures.” United States v.
    Comprehensive Drug Testing, Inc. (“CDT III”), 
    621 F.3d 1162
    , 1177 (9th Cir. 2010) (en banc) (per curiam). This is a
    recurring theme in our decisions. See, e.g., United States v.
    Cotterman, 
    709 F.3d 952
    , 957 (9th Cir. 2013) (en banc)
    (highlighting “individual privacy interests in data on portable
    digital devices” as one basis for requiring the government to
    have reasonable suspicion for the forensic examination of a
    laptop). Because electronic devices could contain vast
    quantities of intermingled information, raising the risks
    inherent in over-seizing data, CDT III, 
    621 F.3d at 1177
    , law
    enforcement and judicial officers must be especially
    cognizant of privacy risks when drafting and executing search
    warrants for electronic evidence. We addressed this issue in
    CDT III, where we considered “the reality that over-seizing
    is an inherent part of the electronic search process,” and held
    that this “reality” called for judicial officers to exercise
    “greater vigilance” in protecting against the danger that the
    process of identifying seizable electronic evidence could
    become a vehicle for the government to gain access to a
    larger pool of data that it has no probable cause to collect. 
    Id.
    CDT III amended an earlier pending en banc decision that
    4               UNITED STATES V. SCHESSO
    was issued a year before in 2009. United States v.
    Comprehensive Drug Testing, Inc. (“CDT II”), 
    579 F.3d 989
    (9th Cir. 2009) (en banc) (revised and superseded by CDT
    III). Our case, involving a search conducted in June 2010,
    falls in the twilight zone between those two decisions.
    We now consider the implications of CDT III for Joseph
    Schesso, at whose residence law enforcement officers found
    3,400 electronic images and 632 electronic videos of
    commercial child pornography pursuant to a warrant
    authorizing an electronic search of all of Schesso’s computer
    equipment and digital storage devices. Because there was a
    fair probability that evidence of child pornography would be
    found on Schesso’s computer system, the underlying facts
    supported a finding of probable cause. The warrant was not
    overbroad and did not raise the risks inherent in over-seizing
    that we considered in CDT III. The absence of precautionary
    search protocols, suggested as guidance in the plurality’s
    concurring opinion in CDT III, was not fatal here. We
    therefore reverse the district court’s grant of the motion to
    suppress.
    BACKGROUND
    In the fall of 2008, German authorities conducted an
    investigation into the online distribution of child pornography
    over a decentralized peer-to-peer file-sharing network known
    as “eDonkey.” The network allows users to share files over
    the Internet by connecting directly to each other’s computers.
    The investigation revealed, and later examination confirmed,
    that during a four-hour period in October 2008, an 18-minute
    child pornography video was made available for download
    over eDonkey by someone using an Internet Protocol (“IP”)
    address—a unique, electronic numeric label linked to a
    UNITED STATES V. SCHESSO                     5
    specific device—located in the United States. German
    authorities advised Immigration and Customs Enforcement
    (“ICE”) of this evidence and ICE Special Agent Julie Peay
    determined that the IP address was assigned to Schesso at his
    Vancouver, Washington, residence.
    Detective Patrick Kennedy and Senior Digital Forensics
    Investigator Maggi Holbrook of the Vancouver Police
    Department assumed leadership of the investigation because
    the state had an independent interest in the crimes under
    investigation. Detective Kennedy, the case agent, prepared
    an affidavit supporting a warrant application to search
    Schesso’s residence and seize evidence of violations of
    Washington statutes prohibiting possession of and dealing in
    child pornography. The application described the storage
    capacity of computers, the use of the Internet to distribute
    child pornography, the operation of peer-to-peer networks,
    and the known characteristics of child pornography
    collectors, such as their tendency to conceal sexually explicit
    images of children from discovery and to retain them
    indefinitely. The application further explained that due to the
    volume of evidence, the vulnerability of digital data, and the
    technical equipment and expertise needed to search digital
    devices, it would be necessary to remove the devices from the
    residence and conduct analysis and recovery of data off-site
    in a controlled laboratory environment.
    A Washington state court judge approved the warrant in
    June 2010. The warrant noted that there was probable cause
    to search for evidence of dealing in and possession of child
    pornography, and authorized a search of Schesso’s residence
    for “[a]ny computer or electronic equipment or digital data
    storage devices that are capable of being used” for those
    violations. The warrant permitted seized items to be
    6               UNITED STATES V. SCHESSO
    transferred to the Vancouver Police Department Digital
    Evidence Cybercrime Unit or to any qualified law
    enforcement digital evidence processing lab for examination,
    analysis, and recovery of data. The warrant did not contain
    any protocols for sifting through the data or any provision for
    the return of non-evidentiary property.
    Officers from the Vancouver Police Department and ICE
    Agent Peay executed the warrant on the same day. The
    officers entered the residence when no one was home.
    Schesso and his wife arrived within an hour. Though not
    under arrest, Schesso consented to an interview after waiving
    his rights under Miranda v. Arizona, 
    384 U.S. 486
     (1966),
    and admitted to viewing child pornography on and off for
    several years as well as to using eDonkey and other peer-to-
    peer software to download child pornography. Schesso
    estimated he had between 100 and 500 videos and between
    500 and 1,000 images of child pornography, an estimate that
    he raised to 10,000 images at a follow-up interview the next
    day. Schesso’s wife also called Detective Kennedy on the
    evening of the search to inform him that she had learned that
    her niece had been touched sexually by Schesso about five
    years earlier.
    The first search of Schesso’s home resulted in the seizure
    of multiple pieces of electronic media and data storage
    devices pursuant to the terms of the warrant, including a
    custom-built computer tower and external storage devices
    such as camera memory cards. The forensic examination of
    these devices, conducted by Investigator Holbrook, revealed
    3,400 images and 632 videos of commercial child
    pornography, including the video that German authorities
    determined had been shared over eDonkey. Analysis of a
    camera memory card also uncovered six deleted sexually
    UNITED STATES V. SCHESSO                            7
    explicit images of a young girl, later identified as Schesso’s
    niece. Schesso’s wife identified the couch and blanket
    depicted in those images as items in her home, and a second
    state search warrant was obtained to seize the blanket and a
    fabric sample from the couch. Investigator Holbrook halted
    her computer examination before completion because
    sufficient evidence had been found for prosecution and other
    cases required her attention.
    The case was accepted for federal prosecution and
    Schesso was charged with production, distribution, receipt,
    and possession of child pornography in violation of 
    18 U.S.C. §§ 2251
     and 2252A.1 Schesso moved to suppress all
    evidence seized from his residence, as well as his inculpatory
    statements and the items seized during the execution of the
    second warrant, as fruits of the allegedly illegal first search.
    Schesso’s motion focused on the procedural safeguards under
    CDT III and the staleness of the warrant. Except as to the
    camera memory cards, he did not challenge probable cause.
    His motion acknowledged that “[t]he information in the
    application, if it had been timely, would have provided a basis
    for seizing Mr. Schesso’s personal computers and related
    storage devices.”
    The district court initially granted the suppression motion
    as to all evidence seized pursuant to the two searches, but not
    as to Schesso’s inculpatory statements. Schesso was
    unsuccessful in his arguments that the warrant was invalid
    due to staleness and that the government had acted in bad
    faith by seeking the warrant from a state judge rather than a
    federal judge. Nevertheless, the district court concluded that
    1
    Later, Schesso was also charged with child molestation in violation of
    Revised Code of Washington § 9A.33.083.
    8               UNITED STATES V. SCHESSO
    the affidavit failed to connect generalized statements about
    child pornography collectors to Schesso, thus rendering the
    warrant facially deficient and the good faith exception
    inapplicable.
    The district court later issued a supplemental
    memorandum opinion that granted the suppression motion as
    to all evidence seized during both searches and as to
    Schesso’s inculpatory statements. Although the oral ruling
    and earlier order expressed that the government did not
    engage in the type of “deliberate overreaching” that United
    States v. Tamura, 
    694 F.2d 591
     (9th Cir. 1982), and CDT III
    intended to prevent, the opinion emphasized that the warrant
    application failed to include any of the protocols for
    searching electronic records suggested by the concurring
    opinion in CDT III. The court rejected the good faith
    exception to the exclusionary rule on the ground that “the
    overturned warrant is so facially deficient that reliance on it
    is not reasonable.”
    The government now appeals the district court’s
    suppression ruling. Schesso’s trial is stayed pending this
    interlocutory appeal. We review de novo the district court’s
    grant of a motion to suppress and its application of the good
    faith exception to the exclusionary rule. United States v.
    Maddox, 
    614 F.3d 1046
    , 1048 (9th Cir. 2010); United States
    v. Crews, 
    502 F.3d 1130
    , 1135 (9th Cir. 2007). We review
    for clear error whether the state court judge issuing the
    warrant had a substantial basis for concluding that probable
    cause existed and give “great deference” to such a finding.
    United States v. Hay, 
    231 F.3d 630
    , 634 n.4 (9th Cir. 2000)
    (citation omitted).
    UNITED STATES V. SCHESSO                     9
    ANALYSIS
    I. VALIDITY OF THE SEARCH WARRANT
    A. PROBABLE CAUSE
    We disagree with the district court’s conclusion that the
    warrant was facially overbroad and thus not supported by
    probable cause. In a somewhat unusual posture, the defense
    essentially conceded probable cause for the seizure, arguing
    that “the overriding problem was not the initial seizure of Mr.
    Schesso’s devices, but the lack of any guidance or limits in
    the warrant for subsequently searching the intermingled data
    that was on them.” Our review of the record reveals that the
    facts cited in the affidavit, combined with reasonable
    inferences drawn from those facts, provided probable cause
    to search Schesso’s entire computer system and his digital
    storage devices for any evidence of possession of or dealing
    in child pornography.
    There is no question that there was probable cause to
    believe that Schesso possessed the particular child
    pornography video uploaded to eDonkey in October 2008.
    Given the circumstances of that upload and the information
    supplied in the warrant application, the state court judge
    permissibly drew the “reasonable inference” that there was
    probable cause to believe Schesso had other child
    pornography materials as well. Illinois v. Gates, 
    462 U.S. 213
    , 240 (1983).
    Schesso did not merely possess a commercial child
    pornography video, which might have resulted from a one-
    time accidental download or inadvertent receipt. Key to the
    probable cause analysis is the evidence that Schesso took the
    10                 UNITED STATES V. SCHESSO
    affirmative step of uploading and distributing the video on a
    network designed for sharing and trading.2 As the affidavit
    explained, peer-to-peer file sharing networks are “frequently
    used to trade digital files of child pornography,” “often
    provide enhanced capabilities to reward those who share files
    by providing reduced wait periods, higher user ratings, or
    other benefits,” and sometimes do not allow users to
    download files at all unless they also share files. It is hardly
    a leap to infer that Schesso either had other files to share or
    that he used the network to download files.
    The judge issuing the warrant thus made the “practical,
    common-sense decision” that “given all the circumstances set
    forth in the affidavit before him . . . there [was] a fair
    probability that contraband or evidence” of child pornography
    would be found on Schesso’s computer and other digital
    storage equipment. 
    Id. at 238
    . This determination is in line
    with our precedent. See, e.g., United States v. Gourde,
    
    440 F.3d 1065
    , 1069–71 (9th Cir. 2006) (en banc)
    (emphasizing that probable cause means “fair probability,”
    not certainty or even a preponderance of the evidence, and
    concluding that it was reasonable to infer that there was a fair
    probability that defendant “received or downloaded” child
    pornography images based on defendant’s paid subscription
    to a child pornography website); United States v. Kelley,
    
    482 F.3d 1047
    , 1053 (9th Cir. 2007) (concluding that it was
    reasonable to infer that defendant “was part of a network of
    2
    The district court confused the act of downloading a file with the act
    of uploading a file. In his oral ruling, he inaccurately stated that “[t]he
    only crimes described . . . in the affidavit are the possession and
    downloading of [one] particular file.” Not so. In fact, the scope of the
    warrant is specifically premised on Schesso’s uploading of the file, an act
    that connects him to the profile of a child pornography collector.
    UNITED STATES V. SCHESSO                        11
    persons interested in child pornography” and permissible to
    search defendant’s computer based on evidence that
    defendant had received nine emails with attachments
    “containing the same type of illicit child pornography” that
    was found on the computers of two individuals who collected
    or distributed child pornography); United States v. Lacy,
    
    119 F.3d 742
    , 745 (9th Cir. 1997) (implying that it was
    reasonable to infer that defendant had the characteristics of a
    “collector[] of child pornography” based on evidence in the
    affidavit that defendant had downloaded at least two
    computerized visual depictions of child pornography).
    Because there was a fair probability that the eDonkey
    video as well as other evidence of possession of and dealing
    in child pornography would be found on Schesso’s digital
    equipment, the warrant was not overbroad. The government
    was faced with the challenge of searching for digital data that
    was not limited to a specific, known file or set of files. The
    government had no way of knowing which or how many
    illicit files there might be or where they might be stored, or of
    describing the items to be seized in a more precise manner.
    United States v. Adjani, 
    452 F.3d 1140
    , 1447–48 (9th Cir.
    2006) (“Warrants which describe generic categories of items
    are not necessarily invalid if a more precise description of the
    items subject to seizure is not possible.”) (citation omitted).
    These factors, along with the detailed explanation of the need
    for off-site analysis and recovery, justify the seizure and
    subsequent off-premises search of Schesso’s entire computer
    system and associated digital storage devices.3
    3
    This process is not out of the ordinary. Federal Rule of Criminal
    Procedure 41(e)(2)(B) explicitly permits the seizure or copying of
    electronically stored information for later off-site review.
    12              UNITED STATES V. SCHESSO
    We have repeatedly found equally broad searches
    constitutional on similar or less evidence. See, e.g., United
    States v. Krupa, 
    658 F.3d 1174
    , 1178 (9th Cir. 2011) (holding
    valid a search of fifteen computers at a residence based on
    evidence of one contraband image and a report of child
    neglect); United States v. Brobst, 
    558 F.3d 982
    , 993–94 (9th
    Cir. 2009) (holding valid a warrant authorizing the search and
    seizure of photographs, computers, compact disks, floppy
    disks, hard drives, memory cards, printers, other portable
    digital devices, DVDs, and video tapes based on a witness’s
    observation of one illicit photograph in defendant’s home);
    Lacy, 
    119 F.3d at 746
     (9th Cir. 1997) (holding valid a warrant
    authorizing the “blanket seizure” of Lacy’s “entire computer
    system” because the government did not know where at least
    two illicit child pornography images were stored and “no
    more specific description of the computer equipment sought
    was possible”).
    We are not convinced by Schesso’s additional argument
    that there was no probable cause to seize the camera memory
    cards simply because Schesso was not suspected of producing
    child pornography. Camera memory cards have data storage
    functionality like any external digital storage device, and
    Schesso’s custom-built computer tower had a port connecting
    directly to camera memory cards, allowing him to read, write,
    or import data between devices. At the time of the search, a
    camera was connected to one of the computers. The officers
    reasonably concluded that the camera memory cards were
    covered by the warrant as “digital data storage devices . . .
    capable of being used to commit or further” the crimes of
    possession of and dealing in child pornography.
    Nor are we persuaded that the information supporting the
    warrant application was stale. Information underlying a
    UNITED STATES V. SCHESSO                    13
    warrant is not stale “if there is sufficient basis to believe,
    based on a continuing pattern or other good reasons, that the
    items to be seized are still on the premises.” Lacy, 
    119 F.3d at
    745–46 (internal quotation marks and citation omitted).
    Such good reasons existed here: Detective Kennedy’s
    affidavit explained that individuals who possess, distribute,
    or trade in child pornography “rarely, if ever, dispose of
    sexually explicit images of children” because these images
    are treated as “prized possessions.” In light of the “nature of
    the criminal activity and property sought” and the reasonable
    inference that Schesso fit the profile of a collector, the state
    court judge had ample reason to believe that the eDonkey
    video or other digital child pornography files would be
    present at Schesso’s residence a mere 20 months after the
    eDonkey incident. 
    Id. at 745
     (citation omitted); see also
    United States v. Allen, 
    625 F.3d 830
    , 842–43 (5th Cir. 2010)
    (holding that an 18-month delay between when defendant
    sent child pornography images through a peer-to-peer
    networking site and issuance of a search warrant did not
    render the information stale); United States v. Morales-
    Aldahondo, 
    524 F.3d 115
    , 117–19 (1st Cir. 2008) (concluding
    that the passage of over three years since the acquisition of
    information that defendant’s brother, who shared defendant’s
    residence, had purchased access to various child pornography
    websites, did not render that information stale).
    Given these circumstances and the details contained in the
    affidavit, the state court judge had a substantial basis for and
    did not commit clear error in determining that there was
    probable cause for the warrant. We defer to that judgment.
    14              UNITED STATES V. SCHESSO
    B. ABSENCE OF SEARCH PROTOCOL
    The question we consider next is whether the electronic
    data search guidelines laid out in the CDT cases affect the
    outcome here. After considering constitutional requirements,
    the temporal sequence of the cases, and the advisory nature
    of the guidelines, we conclude that the absence of these
    protocols in Schesso’s warrant neither violates the Fourth
    Amendment nor is inconsistent with CDT III or its
    predecessor case, Tamura. Schesso’s scenario did not
    implicate the real concern animating the court in CDT III and
    Tamura: preventing the government from overseizing data
    and then using the process of identifying and segregating
    seizable electronic data “to bring constitutionally protected
    data into . . . plain view.” CDT III, 
    621 F.3d at 1171
     (per
    curiam opinion).
    In Tamura, the government had probable cause to seize
    three categories of paper records. To avoid the time-
    consuming task of identifying those specific records on site,
    the government seized substantially more records for off-site
    examination, thus gaining access to materials it had no
    probable cause to collect. Tamura, 
    694 F.2d at
    594–95.
    Significantly, the seizure far exceeded the documents detailed
    in the warrant. Our analysis was blunt: “It is highly doubtful
    whether the wholesale seizure by the Government of
    documents not mentioned in the warrant comported with the
    requirements of the fourth amendment.” 
    Id. at 595
     (emphasis
    added). Although we declined to suppress the evidence at
    trial, we suggested procedural safeguards and monitoring by
    a magistrate when over-seizure is justified because
    documents subject to seizure “are so intermingled” that they
    cannot feasibly be identified and segregated on-site. 
    Id.
     at
    595–96.
    UNITED STATES V. SCHESSO                    15
    In CDT III, we reiterated the concerns expressed in
    Tamura in the context of electronic data. A short procedural
    history of CDT III is in order. During the time government
    agents were investigating Schesso, our court issued its
    original en banc decision, now known as CDT II, in a case
    involving steroid use by professional baseball players. The
    government had probable cause to seize the electronic drug
    testing records of ten baseball players from an independent
    company administering the drug testing program. CDT III,
    
    621 F.3d at 1166
    .           But the government requested
    authorization to seize considerably more data beyond that of
    the ten players for off-site segregation and examination. 
    Id. at 1168
    . The magistrate judge granted the request subject to
    the government’s following certain procedural safeguards
    “designed to ensure that data beyond the scope of the warrant
    would not fall into the hands of the investigating
    agents”—including that “law enforcement personnel trained
    in searching and seizing computer data,” rather than
    investigating case agents, conduct the initial review and
    segregation of data. 
    Id.
     at 1168–69.
    Once the electronic data was seized, however, the
    government ignored the required protocols. Alongside the
    computer specialist, the investigating case agent reviewed the
    drug testing results of hundreds of professional athletes for
    whom probable cause had not been shown, and used what he
    learned to obtain subsequent search warrants based on the
    government’s contention that the evidence was in “plain
    view.” 
    Id.
     at 1170–72. Referencing the district court’s
    binding order that the government intentionally disregarded
    the warrant’s procedural safeguards, we affirmed the district
    court’s grant of the motion to return the records of all but the
    ten identified baseball players who had been suspected of
    16                 UNITED STATES V. SCHESSO
    criminal activity.4 
    Id. at 1174
    . To avoid a reprise, CDT II
    laid out a number of procedural safeguards for future
    warrants as part of the majority opinion.5
    After CDT II, magistrate judges in the Western District of
    Washington took steps to implement the protocol, requiring
    the protocol for all warrants authorizing searches of
    electronically stored information. Because the government
    disagreed with this approach, ICE directed its agents not to
    agree to a waiver of plain view, for example, and adopted a
    practice of submitting its warrant applications to state judges
    rather than through the federal system.
    Approximately a year later, the en banc court issued a
    new, amended opinion. The search protocol was no longer
    part of the majority opinion, but instead was moved to a
    concurring opinion and thus was no longer binding circuit
    precedent. By its own terms, the concurring opinion proposes
    the protocols not as constitutional requirements but as
    “guidance,” which, when followed, “offers the government a
    safe harbor.” CDT III, 
    621 F.3d at 1178
     (Kozinski, C.J.,
    concurring). Notably, there is no clear-cut rule: “District and
    magistrate judges must exercise their independent judgment
    in every case, but heeding this guidance will significantly
    increase the likelihood that the searches and seizures of
    4
    We laid out three alternative reasons for affirming the district court’s
    grant of the motion to return. The other two reasons were preclusive
    effect and equitable considerations.
    5
    These prophylactic guidelines include waiver of reliance on the plain
    view doctrine, segregation and redaction of electronic data by specialized
    personnel or an independent third party, and disclosure of the actual risks
    of destruction of information. CDT II, 
    579 F.3d at 1006
    .
    UNITED STATES V. SCHESSO                            17
    electronic storage that they authorize will be deemed
    reasonable and lawful.” 
    Id.
    Schesso’s situation is unlike CDT III and Tamura in that
    the government properly executed the warrant, seizing only
    the devices covered by the warrant and for which it had
    shown probable cause. Based on the evidence that Schesso
    possessed and distributed a child pornography video on a
    peer-to-peer file-sharing network, law enforcement agents
    had probable cause to believe that Schesso was a child
    pornography collector and thus to search Schesso’s computer
    system for any evidence of possession of or dealing in child
    pornography. In other words, Schesso’s entire computer
    system and all his digital storage devices were suspect.
    Tellingly, the search did not involve an over-seizure of
    data that could expose sensitive information about other
    individuals not implicated in any criminal activity—a key
    concern in both the per curiam and concurring opinions of
    CDT III6—nor did it expose sensitive information about
    6
    “Electronic storage and transmission of data is no longer a peculiarity
    or a luxury of the very rich; it’s a way of life. Government intrusions into
    large private databases thus have the potential to expose exceedingly
    sensitive information about countless individuals not implicated in any
    criminal activity, who might not even know that the information about
    them has been seized and thus can do nothing to protect their privacy.”
    CDT III, 
    621 F.3d at 1177
     (per curiam opinion) (rejecting the argument
    that people can avoid the potential that government over-seizure of
    electronic data could expose their private information simply by not
    storing their data electronically). The CDT III concurrence recommended
    that “where the party subject to the warrant is not suspected of any crime,
    and where the privacy interests of numerous other parties who are not
    18                 UNITED STATES V. SCHESSO
    Schesso other than his possession of and dealing in child
    pornography. Indeed, inclusion of the search protocols
    recommended in the CDT III concurrence would have made
    little difference for Schesso. For example, the concurrence
    recommends that the government forswear reliance on the
    plain view doctrine, or have an independent third party
    segregate seizable from non-seizable data. 
    Id. at 1178
    . Here,
    officers never relied on the plain view doctrine; they had
    probable cause to search for child pornography, and that is
    precisely what they found. The seized electronic data was
    reviewed by Investigator Holbrook, a specialized computer
    expert, rather than Detective Kennedy, the case agent, and
    Schesso does not assert that Holbrook disclosed to Kennedy
    “any information other than that which [was] the target of the
    warrant.” 
    Id. at 1180
    . Additionally, unlike the concern
    articulated in the concurrence in CDT III, which stated that
    the affidavit created the false impression that the data would
    be lost if not seized at once,7 here the affidavit explained that
    individuals who possess, distribute, or trade in child
    pornography “go to great lengths to conceal and protect from
    discovery their collection of sexually explicit images of
    minors.”
    under suspicion of criminal wrongdoing are implicated by the search, the
    presumption should be that the segregation of the data will be conducted
    by an independent third party selected by the court.” 
    Id. at 1179
    (Kozinski, C.J., concurring).
    7
    According to the concurrence, the independent business that owned the
    data was not a criminal suspect and had agreed to keep the data intact, a
    representation the United States Attorney’s Office had accepted. 
    Id. at 1178
     (quoting the dissent in United States v. Comprehensive Drug
    Testing, 
    513 F.3d 1085
    , 1132 (9th Cir. 2008) (Thomas, J., dissenting),
    opinion revised and superseded by CDT III).
    UNITED STATES V. SCHESSO                            19
    Although we conclude that the exercise of “greater
    vigilance” did not require invoking the CDT III search
    protocols in Schesso’s case, judges may consider such
    protocols or a variation on those protocols as appropriate in
    electronic searches. We also note that Rule 41 of the Federal
    Rules of Criminal Procedure sets forth guidance for officers
    seeking electronically stored information.8 Ultimately, the
    proper balance between the government’s interest in law
    enforcement and the right of individuals to be free from
    unreasonable searches and seizures of electronic data must be
    determined on a case-by-case basis. The more scrupulous
    law enforcement agents and judicial officers are in applying
    for and issuing warrants, the less likely it is that those
    warrants will end up being scrutinized by the court of
    appeals.
    II. SUPPRESSION OF EVIDENCE
    Even if the warrant were deficient, the officers’ reliance
    on it was objectively reasonable and the “good faith”
    exception to the exclusionary rule applies. United States v.
    Leon, 
    468 U.S. 897
    , 922 (1984) (“[T]he marginal or
    nonexistent benefits produced by suppressing evidence
    8
    As amended, Rule 41 provides, among other procedures, that a warrant
    seeking electronically stored information “may authorize the seizure of
    electronic storage media or the seizure or copying of electronically stored
    information. Unless otherwise specified, the warrant authorizes a later
    review of the media or information consistent with the warrant.” Fed. R.
    Crim. P. 41(e)(2)(B). Upon executing the warrant, “[i]n a case involving
    the seizure of electronic storage media or the seizure or copying of
    electronically stored information, the inventory may be limited to
    describing the physical storage media that were seized or copied. The
    officer may retain a copy of the electronically stored information that was
    seized or copied.” Fed. R. Crim. P. 41(f)(1)(B).
    20               UNITED STATES V. SCHESSO
    obtained in objectively reasonable reliance on a subsequently
    invalidated search warrant cannot justify the substantial costs
    of exclusion.”). The state court judge was not misled by
    information in the affidavit, he did not wholly abandon his
    judicial role, and the affidavit certainly was not “so lacking
    in indicia of probable cause as to render official belief in its
    existence entirely unreasonable.” 
    Id. at 923
     (quoting Brown
    v. Illinois, 
    422 U.S. 590
    , 611 (1975) (Powell, J., concurring
    in part)).
    The rationale leading us to defer to the state court judge’s
    determination of probable cause applies with even greater
    force to the question whether the officers’ reliance on the
    warrant was objectively reasonable. The affidavit included
    sufficient evidence connecting Schesso to the profile of a
    child pornography collector to justify the officers’ reliance on
    the warrant. We have previously upheld comparably broad
    warrants based on similar evidence. See, e.g., Krupa,
    
    658 F.3d at 1178
    ; Brobst, 
    558 F.3d at
    993–94.
    Our analysis is not affected by the officers’ decision to
    seek a warrant from a Washington state court rather than the
    Western District of Washington. We recognize that the
    choice of forum was influenced by the Western District of
    Washington’s policy at the time of requiring the search
    protocols outlined in CDT II. But evidence should be
    suppressed “only if it can be said that the law enforcement
    officer had knowledge, or may properly be charged with
    knowledge, that the search was unconstitutional under the
    Fourth Amendment.” Herring v. United States, 
    555 U.S. 135
    ,
    143 (2009) (quoting Illinois v. Krull, 
    480 U.S. 340
    , 348–49
    (1987)). Because neither CDT II nor CDT III cast the search
    protocols in constitutional terms, state judicial officers cannot
    be faulted for not following protocols that were not binding
    UNITED STATES V. SCHESSO                          21
    on them, and law enforcement officers cannot be faulted for
    relying on a warrant that did not contain the non-binding
    protocols.9 Nothing prohibits the government from seeking
    a warrant from one forum over another where the government
    has the option to prosecute the case in state or federal court.
    The Fourth Amendment applies equally to state courts as to
    federal courts. The constitutionality of a warrant is not forum
    dependent.
    REVERSED.
    9
    It bears noting that neither Tamura nor CDT III resulted in the
    suppression of evidence despite the absence of precautionary procedures.
    We declined to suppress evidence in Tamura because although the search
    exceeded the scope of the warrant, the specific documents introduced at
    trial were within its scope. Tamura, 
    694 F.2d at 597
     (“Generally, the
    exclusionary rule does not require the suppression of evidence within the
    scope of a warrant simply because other items outside the scope of the
    warrant were unlawfully taken as well.”). CDT III did not concern a
    motion to suppress at all. Rather, compliance with Tamura was discussed
    in the context of a motion to return property under Federal Rule of
    Criminal Procedure 41(g), which is “broader than the exclusionary rule.”
    CDT III, 
    621 F.3d at 1173
     (per curiam opinion).