BERMAN_GALLEYPROOFS 9/26/2018 10:01 AM
2018] THE MAGISTRATES’ REVOLT 65
search is created equal and not every warrant must include search protocols to
comply with the Fourth Amendment,” the inclusion of a search protocol helps
the court determine if the “search and seizure requested will be governed by
sufficient boundaries.”
72
Despite their good-faith effort to solve an acknowledged tension in Fourth
Amendment doctrine, magistrate judges’ so-called revolt has not been
universally embraced. Indeed, their demands for detailed search protocols were
often overruled,
73
and no court has held that such protocols are required.
74
At
the same time, some courts have expressed support for the idea of including ex
ante search limits in warrants.
75
Judge Kozinski, meanwhile, was the lone voice
going beyond endorsement to enumerate a set of proposed rules for judges to
include in warrants to search electronic data.
76
Commentators, like courts, have
split on the issue.
77
72
Cellular Tels., 2014 WL 7793690, at *7.
73
See, e.g., Stored at Premises, 13 F. Supp. 3d 157, 159–60 (D.D.C. 2014) (vacating a magistrate judge’s
opinion requiring the government to submit to ex ante limits).
74
E.g., United States v. Russian, 848 F.3d 1239, 1245 (10th Cir. 2017) (requiring only that warrants for
computer searches include some limiting principle (quoting United States v. Christie, 717 F.3d 1156, 1165 (10th
Cir. 2013)); United States v. Galpin, 720 F.3d 436, 451 (2d Cir. 2013) (“[W]e do not impose any rigid
requirements [that warrants include specific search protocols] at this juncture.”); Stored at Premises, 13 F. Supp.
3d at 157; see also Kerr, Ex Ante Regulation, supra note 21, at 1277–81.
75
E.g., United States v. Cartier, 543 F.3d 442, 447–48 (8th Cir. 2008) (“[T]here may be times that a
search methodology or strategy may be useful or necessary.”); United States v. Hill, 459 F.3d 966, 978 (9th Cir.
2006) (noting that the absence of search protocols is not “fatal” to a warrant, but that the court “look[s] favorably
upon” their inclusion); United States v. Garcia-Alvarez, No. 14-cr-0621 JM, 2015 WL 777411, at *5 (S.D. Cal.
Feb. 24, 2015) (observing that “it may have been better if the warrant had included a search protocol that
minimized unnecessary intrusion”); In re Appeal of Application for Search Warrant, 71 A.3d 1158, 1170 (Vt.
2012) (holding that ex ante limits on warrant executions are not required, but are “sometimes acceptable
mechanisms for ensuring the particularity of a search”).
76
United States. v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1178–80 (9th Cir. 2010)
(Kozinski, J., concurring) (stating that judges issuing such warrants should “insist that the government forswear
reliance on the plain view doctrine,” so that just because investigators come across data on a computer while
executing a valid warrant, that data cannot itself be seized; “the magistrate judge should order that the seizable
and non-seizable data be separated by an independent third party under the supervision of the court,” such as a
computer specialist; the methods the government uses to search for responsive information “must be designed
to uncover only the information for which it has probable cause, and only that information may be examined by
the case agents,” and to the extent there remains a risk that agents involved in the investigation might examine
or retain “any data other than that for which probable cause is shown,” the warrant should include “a protocol
for preventing” that from happening; absent judicial authorization to the contrary, the government must destroy
or return non-responsive data).
77
Compare, e.g., Kerr, Ex Ante Regulation, supra note 21, at 1246 (arguing that ex ante warrant
restrictions are “unauthorized and unwise”), with, e.g., Ohm, supra note 18, at 11–12 (arguing that ex ante
warrant restrictions are necessary to prevent government overreaching), and Kerr, Ex Ante Regulation, supra
note 21, at 1245 n.14 (listing articles that, contrary to his view, favor restrictions).