Applying the independent component doctrine to the rule permitting
seizure of instrumentalities will, in most cases, not be difficult.
For example, if an individual engaging in wire fraud printed
out thousands of phony invoices on his home computer, it would
be reasonable to take the computer, monitor, keyboard, and printer.
If the individual electronically mailed these invoices to his
victims, it would also be appropriate to seize his external modem
(if the modem were internal it would, of course, be seized when
the agents took the computer itself). If, instead of using electronic
mail, he used a conventional fax machine, it would be reasonable
to seize the fax as it, too, would have played a significant role
in the commission of the offense.
Table of Contents - Main Federal Guidelines
Supplement - Instrumentalities defined
Supplement II - Instrumentalities defined
D. HARDWARE AS EVIDENCE OF AN OFFENSE
1. Authority for Seizing Evidence
In 1972, Federal Rule of Criminal Procedure 41(b) was amended
to authorize seizing "mere evidence" of a crime. In
relevant part, the Rule now states: "A warrant may be issued
under this rule to search for and seize any (1) property that
constitutes evidence of the commission of a criminal offense.
. . ."
Table of Contents - Main Federal Guidlines
2. Evidence Defined
A physical item is evidence if it will aid in apprehending
or convicting a person who has committed a crime. The evidence
seized need not be admissible at trial.
Courts will evaluate a seizure under this test according
to what a reasonable person would believe under the circumstances,
and law enforcement officers will not be judged after-the-fact
on how helpful the seized evidence actually was in apprehending
or convicting a suspect. See Andresen v. Maryland,
427 U.S. 463, 483 (1976)(holding that the "trained special
investigator reasonably could have believed" the seized evidence
could be used to show criminal intent); United States v. Truitt,
521 F.2d 1174, 1176-78 (6th Cir. 1975)(holding that a reasonably
cautious police officer could have believed under the circumstances
that a sawed-off shotgun, although legal if registered, was incriminating
evidence).
Of course, simply because an item is "evidence of a
crime" does not mean that other restrictions may not apply.
Law enforcement officials should be aware of other limits imposed
by the Constitution, statutes, and regulations upon the seizure
of evidence. See, e.g., Guidelines on Methods of
Obtaining Documentary Materials Held by Third Parties, 28 C.F.R.
§§ 59.1-.6 (governing the application for search warrants
for documentary evidence held by non-suspect third parties).
Although computers commonly contain evidence, sometimes they
are evidence. If an extortionist sent a letter to his
victim with unique print characteristics (e.g., the top half of
the letter "W" was missing), his daisy-wheel printer
would constitute evidence which could be seized.
Table of Contents -Main Federal Guidelines
E. TRANSPORTING HARDWARE FROM THE SCENE
Whether a computer is seized as contraband, an instrumentality,
or evidence, it is important to transport it properly. With some
simple computers, moving the equipment is a straightforward proposition.
But computer systems are becoming so increasingly complex and
diverse that it is harder than ever for technically untrained
agents to avoid mistakes. These Guidelines cannot possibly substitute
for the expertise that comes from special training courses in
seizing, searching, and preserving electronic evidence. Indeed,
the discussion that follows is meant only as introduction and
orientation to these issues, and not as a comprehensive guide
to all the technical contingencies which may arise during a search.
The team for a computer-related search should, if possible, include
at least one technically trained agent to act as a leader in these
areas. Clearly, as complex computer systems become increasingly
common, law enforcement agencies will need more trained agents
at almost every crime scene. In the meantime, the following discussion
may help prosecutors and investigators to anticipate the problems
which can confront them.
First, agents must protect the equipment from damage. Second,
to the extent they are transporting information storage devices
(e.g., hard drives, floppy disks), improper handling can cause
loss of data. Third, it may be impossible to make the system
work in the field office, laboratory, or courtroom if the seizing
agents did not carefully pack and move the computer system so
that it can be successfully reassembled later.
Before the search begins, the search leader should prepare
a detailed plan for documenting and preserving electronic evidence,
and should take time to carefully brief the entire search team
to protect both the identity and integrity of all the data. At
the scene, agents must remember to collect traditional types of
evidence (e.g., latent fingerprints off the keyboard) before touching
anything. They must remember, too, that computer data can be
destroyed by strong magnetic fields. (Low density magnetic media
is more susceptible to such interference than high density media.)
Last, some computer experts will not examine evidence if anyone
else has already tried to search or manipulate the data. Their
chain-of-custody and integrity-of-evidence procedures will not
allow them to examine the computer if its original crime-scene
seal has been broken.
The agents executing the actual search must take special
precautions when disassembling and packing computer equipment.
This careful approach protects not only the hardware items, but
also the integrity and accessibility of the data inside. Before
disconnecting any cables, it is helpful to videotape or photograph
the site (including the screen, if possible, and all wiring connections)
and prepare a wiring schematic. This will document the condition
of the equipment upon the agents' arrival and show how the system
was configured. Agents should disconnect all remote access to
the system (e.g., unplug the telephone cord, not the power cord,
from the modem) and disconnect network cables from the servers
so that no one can alter or erase information during the search.
Investigators need to accurately label each cable and the device
and port to which the cable connects before disconnecting anything.
It is a good idea to attach tags at every connection point on
every cable to record all relevant information. It is especially
important to label every vacant port as "vacant" so
that there is no confusion later. (If vacant ports are not labeled,
it is impossible for an expert to tell whether the unlabeled port
was in fact vacant, or whether an important label simply fell
off.) Once this is done, agents are ready to disassemble, tag
and inventory the equipment.
Investigators must determine which drives, disks, and other
magnetic media need to be protected. If a hard disk drive is
being moved, they must insure that the read/write heads are secured
to prevent damage. Some systems secure (park) the heads automatically
whenever the machine is not in use, but other systems may require
that a specific command be executed or that the heads be secured
mechanically. The manufacturer's operating manual should specify
the proper procedure for each system.
Agents should protect floppy disk drives according to manufacturer's
recommendations. Some suggest inserting a new diskette or piece
of cardboard in the drive slot; others do not. (As with hard
drives, each manufacturer's instructions may be found in the system
manual). Investi-gators must also label diskettes (either individually
or in groups), mark them as evidence and place them in non-plastic
evidence containers.
Agents must be conscious of static electricity buildup during
the execution of the warrant since static electricity can "zap"
a disk and damage data. So can degaussing equipment (an electronic
appliance that creates a strong magnetic field and can be used
to effectively erase a magnetic tape or disk). A well-known story
in law enforcement circles involves a hacker who allegedly magnetized
his metal door frame, thus creating a magnetic field that erased
magnetic media as agents carried it through the doorway. This
story has not been verified and, even if true, such an event is
unlikely to occur now because high density media is not easily
disrupted by magnetic fields. Nonetheless, a device to measure
magnetic fields (a compass or, even better, a gaussmeter) can
determine whether such fields exist and, as a general rule, agents
should avoid placing magnetic media near any strong magnetic field.
Magnetic fields may be created by telephones, radio transmitters,
and photocopiers. Additionally, although magnetic media has often
been taken through airport metal detectors and X-ray machines
without damage, it is wiser not to take magnetic media through
these devices. (It is the motor driving the conveyor belt on
the X-ray machine, not the fluoroscope itself, that creates the
magnetic field which causes the damage.)
Transporting agents should keep all hardware and software
in dust-free, climate-controlled environments. Computer-related
evidence is sensitive to heat and humidity and should not be stored
in the back seat or trunk of a car without special precautions.
Temperature extremes may render magnetically stored evidence
unreadable, and various types of contamination can damage electronic
equipment. A safe range for storing magnetic media is between
40°-90°F and 20%-80% humidity, free
of dust and tobacco smoke.
Supplement - Transporting hardware from the scene
Table of Contents - Main Federal Guidelines
Go to . . . CCIPS || Justice Home Page
Updated page April 29, 1999
usdoj-jmd/irm/css/imc