Table of Contents - Main Federal Guidelines
Supplement - Drafting a warrent
to seize hardware
B. DRAFTING A WARRANT TO SEIZE INFORMATION
Upon the request of a federal law enforcement officer or an attorney for the government, a search warrant authorized by this rule may be issued (1) by a federal magistrate, or a state court of record within the federal district, for a search of property or for a person within the district and (2) by a federal magistrate for a search of property or for a person either within or outside the district if the property or person is within the district when the warrant is sought but might move outside the district before the warrant is executed.
Table of Contents - Main Federal Guidelines
a. General Rule: Obtain a Second Warrant
b. Handling Multiple Sites within the Same District
Table of Contents - Main Federal Guidelines
c. Handling Multiple Sites in Different Districts
Table of Contents - Main Federal Guidelines
Supplement - Handling Multiple Sites in Different Districts
d. Information at an Unknown Site
Table of Contents - Main Federal Guidelines
e. Information/Devices Which Have Been Moved
Table of Contents - Main Federal Guidelines
The subpoena at issue here is not framed in terms of specified categories of information. Rather, it demands specified information storage devices . . . . Implicit in [an earlier case] is a determination that subpoenas properly are interpreted as seeking categories of paper documents, not categories of filing cabinets. Because it is easier in the computer age to separate relevant from irrelevant documents, [the] ontological choice between filing cabinets and paper documents has even greater force when applied to the modern analogues of these earlier methods of storing information.
Table of Contents - Main Federal Guidelines
Supplement - Describing Items to be Seized
Supplement II - Describing Items to be Seized
Table of Contents - Main Federal Guidelines
a. In General
Table of Contents - Main Federal Guidelines
b. In Computer-Related Cases
[10] In this example, the storage of information in an out-of-district server was fortuitous; i.e., a product of the network architecture. In fact, hackers may deliberately store their information remotely. This allows them to recover after their personal computers fail (essentially by creating off-site backup copies). Additionally, if agents seize a hacker's personal computer, no evidence will be found, and the hacker can still copy or destroy the remotely stored data by accessing it from another computer. [Back]
[11] "Upload" means to transfer data from a user's system to a remote computer system. Webster's, supra. Of course, only a copy is transferred, and the original remains on the user's machine. It may be significant to search for the uploaded data even if the original has been seized. For example, the user may have altered the original. [Back]
[12] Of course, the fact that this occurs does not mean the evidence cannot be salvaged. Experts can often recover data which has been deleted or overwritten. [Back]
Go to . . . Table of Contents - Main Federal Guidelines