{"id":544771,"date":"2010-04-27T13:13:08","date_gmt":"2010-04-27T17:13:08","guid":{"rendered":"10207 at http:\/\/www.eff.org"},"modified":"2010-04-27T13:13:08","modified_gmt":"2010-04-27T17:13:08","slug":"overreacting-dissecting-the-gizmodo-warrant","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/544771","title":{"rendered":"OverREACTing: Dissecting the Gizmodo Warrant"},"content":{"rendered":"<p>Federal and California law both protect reporters against police searches aimed at uncovering confidential sources or seizing other information developed during newsgathering activities.  Yet on Friday, agents with the <a href=http:\/\/www.reacttf.org\/>Rapid Enforcement Allied Computer Team<\/a> (REACT) executed a search warrant at Gizmodo editor Jason Chen\u2019s home, searching for evidence related to Gizmodo&#8217;s <a href=\"http:\/\/gizmodo.com\/5520471\/the-tale-of-apples-next-iphone\">scoop<\/a> on what appears to be a pre-release version of Apple&#8217;s next iPhone model.  The <a href=http:\/\/gizmodo.com\/5524843\/police-seize-jason-chens-computers>warrant<\/a> does not reveal whether Chen himself is considered a criminal suspect, or what alleged crime the police are investigating, but Chen was not arrested.  All of his computers and hard drives (among other materials) were seized for further search and analysis.  <\/p>\n<p>Under California and federal law, this warrant should never have issued.  First, California Penal Code Section <a href=http:\/\/law.onecle.com\/california\/penal\/1524.html>1524(g)<\/a> provides that &#8220;[n]o warrant shall issue for any item or items described in Section 1070 of the Evidence Code.&#8221;  <a href=\"http:\/\/law.onecle.com\/california\/evidence\/1070.html\">Section 1070<\/a> is California&#8217;s reporter&#8217;s shield provision (which has since been elevated to <a href=http:\/\/law.onecle.com\/california\/constitution\/article_1\/2.html>Article I, \u00a7 2(b)<\/a> of the California Constitution).  The items covered by the reporter&#8217;s shield protections include unpublished information, such as &#8220;all notes, outtakes, photographs, tapes or other data of whatever sort,&#8221; if that information was &#8220;obtained or prepared in gathering, receiving or processing of information for communication to the public.&#8221;  The <a href=\"http:\/\/gizmodo.com\/5524843\/police-seize-jason-chens-computers\">warrant<\/a> explicitly authorizes the seizure of such protected materials and information, including the photographs and video taken of the iPhone prototype, as well as research regarding the Apple employee who purportedly lost the phone.  This fact alone should have stopped this warrant in its tracks. <\/p>\n<p>Second, the warrant likely violates the Privacy Protection Act (or PPA, <a href=http:\/\/www.law.cornell.edu\/uscode\/42\/2000aa.html>42 USC \u00a7 2000aa<\/a> et al.). Congress passed the PPA to ensure special protection for journalists by prohibiting government search and seizure of both &#8220;documentary material&#8221; (explicitly including photos and video) and &#8220;work product material,&#8221; material which is or has been used &#8220;in anticipation of communicating such materials to the public.&#8221;  <a href=http:\/\/www.law.cornell.edu\/uscode\/42\/usc_sec_42_00002000--aa007-.html>42 USC \u00a7 2000aa-7(a)<\/a> and <a href=http:\/\/www.law.cornell.edu\/uscode\/42\/usc_sec_42_00002000--aa007-.html>(b)<\/a>.  The PPA includes an exception for searches targeting criminal suspects (which Chen may or may not be), but that exception does not apply &#8220;if the offense to which the materials relate consists of the receipt, possession, communication, or withholding of such materials or the information contained therein.&#8221;  <a href=http:\/\/www.law.cornell.edu\/uscode\/42\/2000aa.html>42 USC \u00a7 2000aa(a)(1)<\/a>.  Violations of the PPA could render the law enforcement agencies or the individual officers who searched Chen&#8217;s house liable for damages no less than $1,000.<\/p>\n<p>The purpose of the PPA and state shield law is to prevent police from rummaging through sensitive information contained in a reporter&#8217;s notes and communications.  This search warrant is particularly worrisome on this point because it is so plainly overbroad.  An officer seeking a search warrant must demonstrate to the issuing judge both probable cause that a crime was committed <i>and<\/i> that there is a reasonable basis to conclude that the materials sought and searched are relevant to that crime.  The warrant issued in the Chen case was remarkably broad, seeking &#8220;all records and data located and\/or stored on any computers, hard drives, or memory storage devices, located at the listed location.&#8221;  That a computer or hard drive may be <i>capable<\/i> of storing information relevant to the case is not enough.  Unless the warrant application provided a factual basis to tie Chen&#8217;s computer (and &#8220;digital cameras,&#8221; &#8220;display screens,&#8221; &#8220;mice,&#8221; &#8220;cassette tapes,&#8221; &#8220;CD-ROM disks,&#8221; etc.), any information obtained from them <a href=\"http:\/\/fourthamendment.com\/blog\/index.php?blog=1&amp;title=ca9_search_for_evidence_of_drug_sales_th&amp;more=1&amp;c=1&amp;tb=1&amp;pb=1\">could be thrown out<\/a>. Furthermore, the Ninth Circuit Court of Appeals (the federal appellate court for California and the surrounding states) in its 2009 opinion in <a href=http:\/\/scholar.google.com\/scholar_case?case=8907117514642542201&amp;>United States v. Comprehensive Drug Testing Inc.<\/a>, 579 F.3d 989 (9th Cir. 2009), identified a series of guildelines meant to ensure that even otherwise lawful warrants authorizing the search and seizure of computers do not give officers too much access to private data that might be intermingled with evidence of a crime.  This warrant does not appear to comply with those guidelines. <\/p>\n<p>The police appear to have gone too far.  The REACT team, &#8220;a partnership of 17 local, state, and federal agencies&#8221; with a &#8220;close working partnership with the high tech industry,&#8221; seems to have leapt eagerly to Apple&#8217;s aid before it looked at the law.  Putting the presumed interests of an important local company before the rights guaranteed by law is an obvious occupational hazard for a police force charged with paying particular attention to the interests of high tech businesses.  Now that First Amendment lawyers, reporters, and others have highlighted the potential legal improprieties of this search, the task force should freeze their investigation, return Chen&#8217;s property, and reconsider whether going after journalists for trying to break news about one of the Valley&#8217;s most secretive (and profitable) companies is a good expenditure of taxpayer dollars.  <\/p>\n<p>[Colorado Law Professor Paul Ohm has <a href=\"http:\/\/www.freedom-to-tinker.com\/blog\/paul\/gizmodo-warrant-searching-journalists-terabyte-age\">more on this issue<\/a> at Freedom to Tinker, in particular looking at the effect of <i>Comprehensive Drug Testing<\/i> on this search.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal and California law both protect reporters against police searches aimed at uncovering confidential sources or seizing other information developed during newsgathering activities. Yet on Friday, agents with the Rapid Enforcement Allied Computer Team (REACT) executed a search warrant at Gizmodo editor Jason Chen\u2019s home, searching for evidence related to Gizmodo&#8217;s scoop on what appears [&hellip;]<\/p>\n","protected":false},"author":180,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-544771","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/544771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/180"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=544771"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/544771\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=544771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=544771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=544771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}