State of Minnesota v. Kristi Dannette Mcneilly

Minnesota Supreme Court
State of Minnesota v. Kristi Dannette Mcneilly, 6 N.W.3d 161 (Minn. 2024)

State of Minnesota v. Kristi Dannette Mcneilly

Opinion

                                   STATE OF MINNESOTA

                                    IN SUPREME COURT

                                        A22-0468


Court of Appeals                                                            Thissen, J.
                                                     Concurring, Anderson, Thissen, JJ.
                                                           Took no part, Procaccini, J.
State of Minnesota,

                      Respondent,

vs.                                                                   Filed: May 8, 2024
                                                               Office of Appellate Courts
Kristi Dannette Mcneilly,

                      Appellant.

                              ________________________


Keith Ellison, Attorney General, Saint Paul, Minnesota; and

Mary F. Moriarty, Hennepin County Attorney, Adam E. Petras, Assistant County Attorney,
Minneapolis, Minnesota, for respondent.

Robert D. Richman, St. Louis Park, Minnesota, for appellant.

Paul Sellers, Minnesota Legal Defense, Minneapolis, Minnesota; and

Jill Brisbois, The JAB Firm, Minneapolis, Minnesota, for amicus curiae Minnesota
Association of Criminal Defense Lawyers.

Cathryn Middlebrook, Chief Appellate Public Defender, William Ward, Minnesota State
Public Defender, Saint Paul, Minnesota, for amicus curiae Minnesota Board of Public
Defense.

Edward R. Shaw, Edward R. Shaw, P.A., Brainerd, Minnesota, for amicus curiae National
Association of Criminal Defense Lawyers.




                                           1
Scott M. Flaherty, Taft Stettinius & Hollister LLP, Minneapolis, Minnesota, for amicus
curiae Tony Webster.

                              ________________________

SYLLABUS

       1.     Search warrants authorizing seizure and search of electronic devices were

sufficiently particular under the Fourth Amendment to the United States Constitution and

Article I, Section 10, of the Minnesota Constitution.

       2.     The guilty verdict in this case was surely unattributable to the evidence

obtained from the search of a law office and so we need not decide whether the warrants

to search that law office were executed in an unreasonable manner because any error in the

evidence’s admission was harmless beyond a reasonable doubt.

       3.     When searching the law office of an attorney who is suspected of a crime,

specific procedures to safeguard privileged materials are required under the supervisory

powers of the Minnesota Supreme Court.

       Affirmed.

OPINION

THISSEN, Justice.

       An attorney, Kristi McNeilly, was convicted of theft by swindle. During the

investigation that led to her conviction, law enforcement executed two warrants—the first

to search her law office (the “office warrant”) and the second to search the electronic

devices seized from her office (the “device warrant”). McNeilly argues that the office

warrant was not sufficiently particular under the Fourth Amendment to the United States



                                             2
Constitution and Article I, Section 10, of the Minnesota Constitution because it allegedly

authorized an unlimited search of her electronic devices. She also argues that the device

warrant was not sufficiently particular. Finally, she argues that both warrants were

executed in an unreasonable manner under the Fourth Amendment and Article I,

Section 10, because insufficient procedural measures were taken to safeguard privileged

attorney-client communications and attorney work product.

       For the reasons discussed below, we hold that the warrants were sufficiently

particular. We further conclude that even if we determined that the search warrants were

executed in an unreasonable manner in violation of the Fourth Amendment or Article I,

Section 10, McNeilly is not entitled to a new trial because, under our governing standard,

the jury’s verdict was surely unattributable to the district court’s decision not to suppress

evidence obtained in the search. Consequently, the alleged constitutional error here was

harmless beyond a reasonable doubt. Thus, we do not decide whether the searches of

McNeilly’s office and electronic devices were executed in an unreasonable manner under

the Fourth Amendment or Article 1, Section 10.          But given our concern about the

constitutional and other implications of allowing the police to gain access to privileged

attorney-client communications and work-product materials, we use our supervisory

powers to establish prospective procedural safeguards for searching the law office of an

attorney who is suspected of a crime. We affirm McNeilly’s conviction.

                                          FACTS

       Attorney Kristi McNeilly swindled a client, M.W., out of $15,000. In May of 2018,

M.W. owned a townhouse in Minnetonka where he lived with J.S. (his then-boyfriend) and


                                             3
two renters. On May 1, 2018, a detective from the Minnetonka Police Department (the

“Minnetonka detective”), working with the Southwest Hennepin Drug Task Force,

executed a search warrant at the townhouse. 1 During the search, police found a vial of

suspected drugs in M.W.’s safe, marijuana in J.S.’s possession, and methamphetamine in

the possession of one of the renters. J.S. received a citation, the renter was arrested for

methamphetamine possession, and although M.W. was not charged, the vial of suspected

drugs was sent by law enforcement to a lab for testing.

       At the time of the townhouse search, McNeilly was representing M.W. in a

landlord-tenant dispute. M.W. and J.S. met with McNeilly to discuss the existing and

potential criminal charges. At the meeting, McNeilly informed M.W. that she had spoken

to someone at the prosecutor’s office who indicated that they were building a significant

case against him. M.W. signed a retainer agreement with McNeilly and paid her $20,000

as required by the agreement. J.S. signed a separate, flat-fee retainer agreement and M.W.

also paid that retainer fee.

       The Minnetonka detective visited the home of M.W. in early July 2018. Following

McNeilly’s advice, M.W. did not reveal what the substance in the seized vial was. Several

months later, on October 29, 2018, McNeilly represented J.S. at a hearing regarding the

marijuana possession; J.S. paid a $200 ticket for a paraphernalia citation. By November 5,

2018—more than 6 months after M.W.’s home was searched—M.W. had not been charged

with an offense.



1
       The validity of this warrant is not at issue in this case.

                                               4
       McNeilly Proposes that M.W. Make Payment in Return for Leniency

       M.W. and J.S. testified that, on November 5, 2018, McNeilly communicated with

M.W., stating that it was urgent that they speak. McNeilly claimed that the Minnetonka

detective and the prosecutor had asked to meet with her, which she suggested was a bad

sign. A few hours later, McNeilly arrived at M.W.’s house and told M.W. and J.S. that she

had been invited into the “back room,” where esteemed attorneys had the privilege to meet

with authorities to make deals for clients that would not involve any charges. She described

this as a big step in her career that meant she had “made it.”

       According to M.W. and J.S., McNeilly claimed that a federal bug had been planted

in M.W.’s house by a renter and subsequently removed by the Minnetonka detective when

he spoke with M.W. in July. McNeilly claimed that M.W. faced 15–20 years in federal

prison, but he could avoid charges if he paid $35,000 to the police union and acted as a

confidential informant. McNeilly showed M.W. a copy of a confidential informant form.

When M.W. said he did not want to be an informant, McNeilly offered him a second

option: pay $50,000 to the police union and no service as a confidential informant would

be necessary. M.W. would pay McNeilly and she would deliver the money to the union.

       M.W. agreed to the $50,000 option and indicated that he could pay $15,000 that day

and the remainder in the next few months. McNeilly said she would have to check with

the Minnetonka detective. She went to the garage—ostensibly to make a phone call—and

emerged 5–10 minutes later claiming that he had agreed to the deal but that she would be

on the hook for the remaining $35,000 if M.W. failed to pay. She also said that the money

had to be transmitted to the union by 6 p.m. that same day. McNeilly drove M.W. to the


                                             5
bank and stood behind him while he got a $15,000 cashier’s check. She instructed him to

write on the memo line “legal fees.” M.W. handed McNeilly the cashier’s check, which

she immediately deposited into her account. M.W. testified that within a few days, he

began to question this arrangement.

        McNeilly claims that M.W. and J.S. fabricated this version of events. At trial, she

maintained that the $15,000 was payment for legal services.

        M.W. contacted Robert Paule, a criminal defense attorney. M.W. retained Paule on

his drug case and Paule reached out to the authorities regarding the bribery allegations.

Paule advised M.W. to request a refund from McNeilly, ask for receipts, and request his

file.

        M.W. emailed McNeilly three times asking for a refund of the $15,000. McNeilly

refused his request each time. Notably, in response to M.W.’s first request, McNeilly sent

M.W. a text stating, “Yes, I got your email. It was paid as directed. So how can I get a

refund? This is a serious issue.” After the third email, McNeilly responded, “I’m not sure

what game you are playing or what you are doing, but I am done playing this. Please stop

contacting me.” M.W. provided these emails to law enforcement (they were not obtained

in the subsequent search of McNeilly’s office).

        M.W. was charged in January 2019 and ultimately convicted of fifth-degree drug

possession. Because of his clean record—and contrary to McNeilly’s claims of a massive

federal case being built against him—he was offered diversion and no jail time, and upon

completion of the diversion process, his felony conviction was expunged.




                                             6
       The Police Investigate McNeilly

       The Minnetonka Police Department referred the investigation to the Burnsville

Police Department to avoid conflicts during what initially appeared to be a bribery

investigation. The Minnetonka detective was placed on administrative leave but was

reinstated less than a week later when the department determined that he was not involved

in a bribery scheme. Burnsville police interviewed M.W., J.S., and the Minnetonka

detective. They also reviewed the detective’s phone records and found no calls between

him and McNeilly.

       Burnsville police obtained a warrant for McNeilly’s bank records; the records

showed a $15,000 check from M.W. was deposited but there were no subsequent transfers

or withdrawals of $15,000. 2 McNeilly spent the money on normal personal expenses.

Police also reviewed McNeilly’s phone records.               The records showed multiple

communications with M.W. on November 5, 2018, but no calls between the Minnetonka

detective and McNeilly at any time. There was no evidence that the Hennepin County

Attorney’s Office was engaged in a bribery scheme.

       M.W. attempted to get his file from McNeilly by sending a certified letter to the

office where he had first met her. The letter was returned because by that point, McNeilly

was working from her home office in Woodbury, Minnesota. Paule also tried to get a copy

of the file by sending letters to two other office addresses listed for McNeilly online—one

in Saint Paul, the other in Minneapolis—but these letters were returned as well. M.W. did



2
       The validity of this warrant is not at issue in this case.

                                               7
not receive his file from McNeilly and no money was returned to him. M.W. provided to

police text and email communications with McNeilly.

        The Search of McNeilly’s Office

        After M.W. and Paule were unable to obtain M.W.’s file, police sought and obtained

a search warrant for McNeilly’s home law office. The office warrant authorized a search

of McNeilly’s home for “Documents showing occupancy”; “Digital pictures prior to and

during the search”; “Computers such as laptops, desktops, and or [sic] towers”; “Electronic

devices which could contain or access files held remotely”; “Mobile phone associated with

[McNeilly’s phone number]”; “Confidential Informant form”; “Any files, invoices, or

Documents associated with representation of M.W. and J.S.”; and “Retainer agreement for

M.W.”

        Although the affidavit submitted in support of the warrant application indicated that

the police would not “do an initial preview” of any computers and would obtain a separate

warrant to search those devices, that restriction was not included in the office warrant.

        On February 27, 2019, at about 11 a.m., eight or nine officers executed the office

warrant. McNeilly was not home during the search. Officers were instructed to seek only

information related to M.W. and J.S.; items not pertaining to those clients were to be set

aside because they were not supposed to “document anyone’s name or retain[] that

information.” They reviewed invoices and retainer agreements of various clients “to

determine whether or not they pertained to” M.W. or J.S. Police seized M.W.’s physical

file and various electronic devices including thumb drives, a desktop computer, and a

laptop. As is standard practice, police left a notice which included a list of items seized.


                                              8
       The Search of McNeilly’s Electronic Devices

       On March 5, 2019, police applied for and obtained a second search warrant—the

device warrant—authorizing a search of the electronic devices police had seized. The

device warrant was not limited to a specific suspected crime or time frame, but the warrant

was limited to searching for the following specific items: “Files related to communications,

calendar events, invoices, retainer agreements, casefiles, and documents pertaining to

M.W. and J.S.”; “Calendar events, communications, or documents showing contact with

[the Minnetonka detective]”; “Confidential Informant form”; and “Any files or notes

associated with representation of M.W. and J.S.”

       The warrant application requested that the Dakota County Electronic Crimes Task

Force (the “Task Force”) be authorized to search the devices. The Task Force is organized

under the Dakota County Sheriff’s Office and includes personnel from various police

departments, including one detective from the Burnsville Police Department.             The

Burnsville Police Department sends all of its computer forensic work to the Task Force.

       The application also proposed that files be provided to Burnsville police only after

the Task Force reviewed the files and determined which ones were “important to this

investigation.” The warrant did not include any such limitation. Rather, the second warrant

included what appears to be boilerplate language authorizing a variety of persons to search




                                             9
the seized devices, including “peace officers of the State of Minnesota, and any other

authorized person”—categories that would include the Burnsville police. 3

      A civilian forensic examiner who works for the Task Force reviewed the files for

relevancy. The examiner was not an attorney. She was given a starting list of search terms

including the full names of M.W., J.S., and the Minnetonka detective, as well as the term

“CI form.” Burnsville police did not obtain an explicit waiver of attorney-client privilege

from M.W. or J.S. No additional steps were taken to filter out privileged information.

      In conducting the search, the examiner started with search terms that yielded results

allowing her to view the words directly surrounding the term. She then looked at the file

name to determine whether the file related to the investigation. If the PDF’s file name

included a client name other than M.W. or J.S., the examiner did not open the file. She

manually opened some PDF documents because those files were not otherwise searchable.

She immediately closed the document if it was unrelated to the investigation.

      The examiner found and provided to the Burnsville Police Department a number of

documents which she deemed relevant. No comprehensive log of the documents searched

by the examiner or the documents provided to the Burnsville Police Department is in the

record. The record does show that the documents provided included documents pertaining

to M.W.’s housing court matter, search warrant returns pertaining to the Minnetonka


3
       The device warrant did not describe a search process at all. It merely listed the
devices to be searched, where those devices were located, the items the police were
seeking, and the persons authorized to conduct the search. It stated that probable cause
existed for the search and concluded that the authorized people “are hereby commanded to
enter and search between the hours of 7 a.m. and 8 p.m., to search the above-described
devices(s) for the described property and thing(s) . . . .”

                                            10
detective, QuickBooks entries in M.W.’s name, invoices associated with M.W., an

electronic folder in M.W.’s name, a document downloaded on November 5, 2018, with the

heading “Texas Alcoholic Beverage Commission Confidential Informant-Agreement of

Understanding,” and a second document—created on November 5, 2018—that was

identical except for a modified heading which stated, “Southwest Hennepin Drug Task

Force Confidential Informant-Agreement of Understanding.”

       Court Proceedings

       On March 5, 2019, the same day Burnsville police applied for and obtained the

device warrant, McNeilly initiated a civil suit and then brought a motion requesting a

district court order returning her client files and seeking “relief from the search of [her]

office and seizure of perhaps a thousand client files.” In re K.M., 
940 N.W.2d 164
, 168

(Minn. 2020) (internal quotation marks omitted) (quoting McNeilly’s motion in the case).

Following an ex parte hearing pursuant to 
Minn. Stat. § 626.04
(a) (2022), the court denied

McNeilly’s motion, holding that “the seized property is being held in good faith as potential

evidence in a matter that is uncharged at this time.” K.M., 940 N.W.2d at 169 (internal

quotation marks omitted (quoting district court order). On March 13, 2019, McNeilly filed

a petition for a writ of prohibition in the Minnesota Court of Appeals. On March 26, 2019,

the court of appeals denied relief. K.M. v. Burnsville Police Dep’t, No. A19-0414, Order

at 4 (Minn. App. filed Mar. 26, 2019).




                                             11
       On June 10, 2019, McNeilly was charged with theft by swindle in violation of

Minnesota Statutes section 609.52, subdivision 2(a)(4) (2022). 4        It is this criminal

proceeding that is before us on appeal.

       Meanwhile, in the ongoing civil case, McNeilly filed a petition for review of the

denial by the court of appeals of the writ of prohibition. We granted the petition but

ultimately denied relief. Our decision was limited to holding that, under 
Minn. Stat. § 626.04
(a), the State did not need to return McNeilly’s client files and we stated that the

State should have provided McNeilly copies of those files. K.M., 940 N.W.2d at 169, 172.

With respect to the constitutional claims, we noted the “many concerns” raised by

“searches of offices of attorneys targeted in criminal investigations,” but held that the

limited factual record presented by the expedited proceeding was not the appropriate

occasion to announce guidelines for how such searches are conducted consistent with the

Minnesota and United States Constitutions. Id. at 171. We emphasized that our decision

was without prejudice to raising those issues in the pending criminal case. Id. at 172.

       With the civil case resolved, McNeilly moved—in this criminal proceeding—to

suppress the evidence gained from the searches. The district court held an evidentiary

hearing on that motion, denied relief, and concluded that the search of McNeilly’s client

files were not unreasonable because the police used “a significant amount of care.”




4
       The statute provides that “[w]hoever does any of the following commits theft . . .
(4) by swindling, whether by artifice, trick, device, or any other means, obtains property or
services from another person.” 
Minn. Stat. § 609.52
, subd. 2(a)(4).

                                             12
       The Trial and Appeal

       McNeilly’s case was tried and documents seized in the searches of her law office

and computers were introduced by the State at trial, specifically:

    • A retainer agreement dated May 15, 2018, for M.W.’s drug matter.

    • Invoices for payments from M.W. to McNeilly.

    • The Fake Confidential Informant Agreement.

    • A Texas Confidential Informant Agreement.

       Much of the evidence used at trial, however, was not obtained from the searches of

McNeilly’s office and computer. The evidence unrelated to the office and computer

searches included bank records, phone records, text messages and emails between

McNeilly and M.W., as well as testimony from M.W., J.S., Paule, and several members of

law enforcement.     McNeilly has never identified any privileged communications or

work-product material that were introduced into evidence. 5

       McNeilly was convicted and sentenced to 366 days in prison, with a 3-year stay of

the sentence. She appealed her conviction, and the court of appeals affirmed. State v.

Mcneilly, No. A22-0468, 
2022 WL 17747792
, at *4 (Minn. App. Dec. 19, 2022).

       We granted McNeilly’s petition for review.

                                       ANALYSIS

       On appeal, McNeilly asserts that both the office warrant and the device warrant were

insufficiently particular. She also claims that the execution of the search warrants was


5
      McNeilly does not assert that the confidential informant forms are privileged or
work product.

                                            13
constitutionally unreasonable because the police did not adequately safeguard the

attorney-client and work-product privileges. We address these arguments in turn. We also

establish, under our supervisory powers, required procedures to safeguard privileged

materials in future searches of law offices of attorneys suspected of a crime.

                                             I.

                                             A.

       We review a district court’s ruling on the constitutionality of a search or seizure de

novo. State v. Anderson, 
733 N.W.2d 128, 136
 (Minn. 2007). The United States and

Minnesota Constitutions protect the right of the people to be free from “unreasonable

searches and seizures” of their “persons, papers, and effects” by the government. U.S.

Const. amends. IV, XIV; Minn. Const. art. I, § 10; see Mapp v. Ohio, 
367 U.S. 643
, 655–

56 (1961) (incorporating the Fourth Amendment and the consequences for violating it into

the Due Process Clause of the Fourteenth Amendment).

       There is no question here that the police searched McNeilly’s home office and her

electronic devices. See State v. Edstrom, 
916 N.W.2d 512, 517
 (Minn. 2018) (noting that

a search occurs when the government “physically intrudes onto a constitutionally protected

area” or “intrudes upon a person’s reasonable expectation of privacy”). A search is

presumptively unreasonable unless it is conducted under a valid warrant or a specific

exception to the warrant requirement applies. State v. Othoudt, 
482 N.W.2d 218
, 221–222

(Minn. 1992). It is undisputed in this case that the searches occurred pursuant to warrants

and that no warrant exception applies. Therefore, the search is valid only if the warrants




                                             14
themselves complied with the requirements of the Fourth Amendment and Article I,

Section 10.

       A warrant must be supported by probable cause and be sufficiently particular. State

v. Bradford, 
618 N.W.2d 782, 795
 (Minn. 2000). McNeilly does not dispute that probable

cause existed to support the issuance of the warrants. But she argues that the warrants were

not particular enough to satisfy the United States and Minnesota Constitutions. The

identical Particularity Clause in each constitution requires that a search warrant

“particularly describ[e] the place to be searched, and the person or things to be seized.”

U.S. Const. amend. IV; Minn. Const. art. I, § 10.        “This requirement prohibits law

enforcement from engaging in general or exploratory searches,” Bradford, 
618 N.W.2d at 795
, and from engaging in “general, exploratory rummaging in a person’s belongings.”

Coolidge v. New Hampshire, 
403 U.S. 443, 467
 (1971). The particularity requirement also

“prevents the seizure of one thing under a warrant describing another. As to what is to be

taken, nothing is left to the discretion of the officer executing the warrant.” Marron v.

United States, 
275 U.S. 192, 196
 (1927).

       We have observed that the description of items in a warrant must only be “as specific

as the circumstances and the nature of the activity under investigation permit.” State v.

Hannuksela, 
452 N.W.2d 668, 674
 (Minn. 1990) (internal quotation marks omitted)

(quoting United States v. Santarelli, 
778 F.2d 609, 614
 (11th Cir. 1985)). “[W]hen

determining whether a clause in a search warrant is sufficiently particular, the

circumstances of the case must be considered, as well as the nature of the crime under

investigation and whether a more precise description is possible under the circumstances.”


                                            15
State v. Miller, 
666 N.W.2d 703, 713
 (Minn. 2003). If a warrant is not sufficiently

particular, the general remedy is the suppression of the evidence seized under the warrant.

United States v. Calandra, 
414 U.S. 338, 347
 (1974). But under the severance doctrine, if

some parts of a warrant are not particular enough and others are particular enough,

“insufficient portions of the warrant are stricken and any evidence seized pursuant thereto

is suppressed, but the remainder of the warrant is still valid.” Hannuksela, 
452 N.W.2d at 673
.

       The Supreme Court has recognized that “[t]he Fourth Amendment by its terms

requires particularity in the warrant, not in the supporting documents.” Groh v. Ramirez,

540 U.S. 551, 557
 (2004) (emphasis added). In other words, courts look solely at the face

of the warrant in determining whether it was sufficiently particular—i.e., contained

sufficient limitations. 6

                                            B.

       McNeilly argues that the office warrant was insufficiently particular because it

authorized a general search of her electronic devices without regard to relevance or

privilege. The first warrant states that police sought to search McNeilly’s home “for the

following described property and things”: “Documents showing occupancy”; “Digital

pictures prior to and during the search”; “Computers such as laptops, desktops, and or


6
        A court may “construe a warrant with reference to a supporting application or
affidavit if the warrant uses appropriate words of incorporation, and if the supporting
document accompanies the warrant.” Groh, 540 U.S. at 557–58; see also State v. Fawcett,
884 N.W.2d 380, 387
 (Minn. 2016). This exception does not apply here. Neither warrant
expressly incorporated the warrant application and no supporting document was attached
to either warrant.

                                            16
towers”; “Electronic devices which could contain or access files held remotely”; “Mobile

phone associated with [McNeilly’s phone number]”; “Confidential Informant form”; “Any

files, invoices, or Documents associated with representation of M.W. and J.S.”; and

“Retainer agreement for M.W.”

       The final page of the warrant provides that designated law enforcement officers

were authorized “to search the above-described premises, for the described property and

thing(s), and to seize and keep said property and thing(s) in custody until dealt with

according to law.” In other words, the office warrant expressly authorized seizure of

computers and electronic devices, but it did not explicitly authorize a search of them.

       The office warrant, in McNeilly’s view, authorized not just physical seizure of the

electronic devices, but also an unlimited search of those devices. According to McNeilly,

this breadth would result in an insufficiently particular warrant because the warrant did not

place any restrictions on a potential search of her devices.

       The State tacitly agrees that a warrant for seizure of a computer allows a search of

the entire contents of the computer. The State insists, however, that the breadth of the

warrant did not violate the Particularity Clauses of the U.S. and Minnesota Constitutions

because, in his affidavit supporting the warrant, the officer who applied for the office

warrant swore under penalty of perjury that he would seek additional warrants to search

the electronic devices. According to the State, had he searched the devices without

obtaining a second warrant, he would have been guilty of perjury, permanently damaged

his reputation, faced civil damages, and risked his entire investigation. Thus, in the State’s

view, any Fourth Amendment concerns were alleviated.


                                             17
       The State’s argument is not well founded. In Franks v. Delaware, the United States

Supreme Court considered “the alternative sanctions of a perjury prosecution,

administrative discipline, contempt, or a civil suit” and concluded that these “are not likely

to fill the gap” if the exclusionary rule is unavailable. 
438 U.S. 154, 169
 (1978). In other

words, the State cannot overcome the argument that a warrant is not sufficiently particular

by claiming that other constraints deter the police from carrying out the search in an

overbroad manner.

       McNeilly’s argument is also without support. Functionally, her argument is based

on three premises: (i) a search—even if reasonable—that is conducted pursuant to an

insufficiently particular warrant violates the Fourth Amendment; (ii) the office warrant

authorized a search of McNeilly’s computer; and (iii) the office warrant placed no

restrictions on the search of the computer (and hence, was insufficiently particular). As

explained below, her argument fails on the third premise.

       The first premise is correct: “a search conducted pursuant to a warrant that fails to

conform to the particularity requirement of the Fourth Amendment is unconstitutional.”

Groh, 
540 U.S. at 559
 (internal quotation marks omitted) (quoting Massachusetts v.

Sheppard, 
468 U.S. 981
, 988 n.5 (1984)). In other words, even if the State’s search were

reasonable, if the warrant was not sufficiently particular, there is still a Fourth Amendment

violation and evidence obtained during the search should generally be suppressed.

       We have never considered the second premise—whether a search of a computer is

authorized when the computer is listed as an item to be seized pursuant to a warrant. We

are persuaded, however, by the sound reasoning of other courts that have held that such a


                                             18
search is authorized by the warrant. The majority of federal courts that have addressed the

issue—and the Minnesota Court of Appeals—have held that a search of a computer is

authorized when it is listed as an item to be seized pursuant to a warrant. See United States

v. Grimmett, 
439 F.3d 1263, 1269
 (10th Cir. 2006) (collecting cases from the First, Sixth,

Ninth, and Tenth Circuits that hold that it is unnecessary to obtain a second warrant to

search a seized computer); United States v. Gregoire, 
638 F.3d 962, 967
 (8th Cir. 2011)

(“A search warrant which specifically authorized the seizure of a computer and a search

for financial records clearly contemplates at least a limited search of the computer’s

contents.”); Gregerson v. Hennepin County, No. A14-0487, 
2014 WL 4957978
, at *4

(Minn. App. Oct. 6, 2014); State v. Taylor, No. A17-0912, 
2018 WL 1462324
, at *3 (Minn.

App. Mar. 26, 2018). We therefore conclude that the second premise is correct.

       But the third premise is incorrect. Although the office warrant listed computers as

one of the items to be seized and thus authorized a search of the computer (the second

premise), it did not authorize a wholesale or limitless search. Rather, the rule we adopt is

that a warrant that authorizes seizure of a computer allows for a search of that computer,

but only for the items otherwise listed in the warrant that reasonably may be found on the

computer. This approach makes sense because the warrant requirement ensures that there

is probable cause to believe that listed items are connected to the crime and that those items

will be found on the computer. 7




7
        As we discuss below, a search limited to the categories in either of the warrants is
sufficiently particular to satisfy the Fourth Amendment and Article I, Section 10.

                                             19
       This rule is consistent with a well-reasoned decision of the court of appeals:

Gregerson, 
2014 WL 4957978
, at *6. Gregerson had previously sued two companies and

their principal shareholder for copyright infringement, malicious prosecution, and similar

claims. Id. at *1. Later, law enforcement opened a criminal investigation into the

companies and principal shareholder based on two suspected crimes unrelated to the

litigation with Gregerson. Id. Two search warrants were issued. The first warrant was

based on probable cause to believe that a building was being used as an unlicensed massage

parlor; this warrant authorized a search for massage therapy equipment, advertising

materials related to massage therapy, and “computers and peripherals used to place online

advertising, produce advertising materials or schedule client appointments.” Id. The

second search warrant was issued based on probable cause to believe that the subject of the

warrant had engaged in theft by swindle in the sale of a fake diamond; this warrant

authorized a search for financial and other records relating to diamonds and “computers

and peripherals used to maintain financial transaction records of the diamond sale or used

in the production of fictitious . . . papers.” Id.

       Gregerson sought information on his adversaries, so he demanded—under the

Minnesota Government Data Practices Act, Minn. Stat. ch. 13 (2012)—that the police turn

over information on the seized computers unrelated to the two criminal investigations. Id.

at *2. The police refused to provide Gregerson with the information, and the district court

rejected Gregerson’s claim that the police were required to turn over the information. Id.

at *2–3.




                                               20
       The court of appeals affirmed. Id. at *6. It reasoned that the seizure of the computer

under a warrant terminated the owner’s expectation of privacy in the information contained

on the computer but only to the extent the information otherwise fell within the scope of

the warrant. The two warrants did not authorize the police to search for any “other data

contained on the hard drives and not identified in the warrant.” Id. at *4. Because the

information Gregerson sought was not related to documents or information relevant to

operation of an unlicensed massage parlor or the theft by swindle, any further search by

the police of the computers would constitute an unconstitutional search. Id. We agree with

this reasoning: a warrant to seize a computer also authorizes a limited search of that

computer for items included in the warrant that are likely to be found on the computer.

       McNeilly—who needs the scope of the office warrant to be construed broadly in

order to argue it is not constitutionally particularized—cites two federal decisions in

support of her argument that a warrant authorizing the seizure of a computer also authorizes

a search of all electronic contents: Gregoire, 
638 F.3d 962
 and United States v. Upham,

168 F.3d 532
 (1st Cir. 1999). In fact, both cases support the rule we adopt today.

       In Gregoire, the defendant was stealing sporting goods from his employer and

selling the goods on eBay. 638 F.3d at 965–66. During the investigation, law enforcement

obtained a warrant to seize “financial records” and “all computers on the property.” Id. at

967. The court concluded that a search of the computer “for records related to eBay sales

was contemplated and therefore permitted by the warrant.” Id. at 968 (emphasis added).

In other words, the court concluded that a search warrant that “specifically authorized the




                                             21
seizure of a computer” as well as items likely to be found on that computer “clearly

contemplates . . . a limited search of the computer’s contents.” Gregoire, 
638 F.3d at 967
.

       Likewise, in Upham, the court noted that the warrant authorized seizure of

computers as well as “[a]ny and all visual depictions, in any format or media, of minors

engaging in sexually explicit conduct.” 
168 F.3d at 534
. The court noted that “the seizure

and subsequent off-premises search of the computer . . . was about the narrowest definable

search and seizure reasonably likely to obtain the images.” 
Id. at 535
. In other words, a

seized computer may be searched for other items listed in the warrant, provided those items

might reasonably be found within the computer’s digital contents. See Fed. R. Crim. P.

41(e)(2)(B) (stating that a warrant that authorizes “seizure of electronic storage media”

also, “[u]nless otherwise specified . . . authorizes a later review of the media or information

consistent with the warrant.” (emphasis added)).

       Applying these principles here, the office warrant did not authorize an unlimited

search of McNeilly’s devices. Rather, the scope of the search of the computer authorized

by the office warrant was limited to the items identified in the warrant that could be found

on a computer: confidential informant forms; files, invoices, or documents associated with

McNeilly’s representation of M.W. and J.S; and retainer agreements for M.W. 8 McNeilly

does not otherwise claim the items listed on the office warrant are insufficiently particular.

Accordingly, we conclude that the office warrant was sufficiently particular.




8
       Moreover, the scope of the ultimate search of McNeilly’s electronic devices was
limited to the items specified in the second warrant.

                                              22
                                             C.

       McNeilly also charges that the device warrant was insufficiently particular. We

start with the language of the warrant. It authorized a search of McNeilly’s devices for

“Files related to communications, calendar events, invoices, retainer agreements, and

documents pertaining to MW and JS”; “Calendar events, communications or docs showing

contact with [the Minnetonka detective]”; “Confidential Informant form”; and “Any files

or notes associated with representation of M.W. and J.S.” In addition to certain named

members of law enforcement, the warrant authorized the following persons to search the

electronic devices: “Dakota County Electronics Crimes Unit [personnel], peace officers of

the State of Minnesota, and any other authorized person.”

       McNeilly offers five reasons why the device warrant was insufficiently particular.

According to McNeilly, the warrant was constitutionally invalid because it (i) failed to

specify procedures to protect privileged attorney-client communications and work-product

materials; (ii) failed to limit the search to a time period after the search of M.W.’s home on

May 1, 2018; (iii) failed to limit the search to documents related to the crime (i.e.,

McNeilly’s theft by swindle); (iv) authorized seizure of contacts with the Minnetonka

detective even if those contacts did not pertain to M.W. and J.S.; and (v) authorized seizure

of all documents pertaining to a confidential informant form without restrictions on date or

client. We address each of these reasons in turn.

                                              i.

       McNeilly argues that the device warrant was insufficiently particular because it

failed to list procedures to safeguard privileged attorney-client communications and


                                             23
work-product materials. McNeilly asks us to adopt a rule that every search warrant must

expressly state that the police are required to take steps to screen out communications

protected by the attorney-client privilege as well as attorney work product—even when the

warrant involves a search of the law office of a lawyer who is suspected of a crime. We

decline to adopt such a rule.

       As we discuss in greater detail below, we are cognizant of the special circumstances

surrounding the search of an attorney’s office, particularly where, as here, the attorney

represents criminal defendants. See O’Connor v. Johnson, 
287 N.W.2d 400, 404
 (Minn.

1979) (noting that “[a] criminal defendant’s constitutional right to counsel . . . must . . . be

weighed in determining the reasonableness of a search warrant” and that “we must take

care to protect . . . the rights of all clients of the attorney whose office is being searched”).

But McNeilly did not cite a single case invalidating a search as insufficiently particular

because the warrant itself did not specify privilege-protection measures. Moreover, the

particularity requirement is not the optimal tool to protect privileged attorney-client

communications and work-product materials in a law office search. Requiring rigid

privilege protocols within a warrant creates challenges because members of law

enforcement (and the magistrate issuing the warrant) do not yet know what will be found. 9


9
        Broad privilege protections in a warrant—such as specifying that each category of
documents sought must be ‘non-privileged’ or stating that officers must ‘take reasonable
precautions to safeguard privileged materials’—face similar obstacles. Law enforcement
will then be using their judgment—again, without advance knowledge of what, exactly,
they will find—in trying to comply with the warrant. This quickly becomes a constitutional
reasonableness analysis. To be clear, we are not saying that judges should never include
limitations in warrants to protect the privilege; such limitations may be appropriate and


                                               24
Cf. In re Search Warrant Issued June 13, 2019 (“Baltimore Law Firm”), 
942 F.3d 159, 178

(4th Cir. 2019) (noting that authorizing a filter protocol 5 days before the search warrant

was executed “undermined the judge’s ability to exercise discretion with respect to the

Filter Team and its Protocol” and that “the judge should have deferred the decision

concerning the proposed Filter Team and its Protocol pending the execution and return of

the search warrant”).

       For those seeking to safeguard privileged documents in a search, it is more

appropriate to ask whether the search, as it was actually conducted, was constitutionally

reasonable. This totality of the circumstances analysis allows for more flexibility and

nuance. In sum, we conclude that the Particularity Clause does not require that every

warrant list specific privilege-screening procedures for law-office searches. Such a rule

would not only be unprecedented, but also ineffective.

       McNeilly argues that even if the Particularity Clause does not mandate privilege

safeguards in a warrant, the warrant here nonetheless undermined the attorney-client

privilege and work-product doctrine by allowing members of the investigation and

prosecution team to access materials protected by those doctrines. Specifically, the warrant

authorized “Dakota County Electronics Crimes Unit [personnel], . . . peace officers of the

State of Minnesota, and any other authorized person” to conduct the search of McNeilly’s

electronic devices. According to McNeilly, even if the examiner were the only person to

actually conduct the search, her search was pursuant to an invalid warrant and thus violates


even beneficial in certain cases. We are rather deciding that such limitations are not
constitutionally required under the Particularity Clause.

                                            25
the Fourth Amendment. Groh, 540 U.S. at 559–60 (holding that even if a search is

reasonable as executed, this does not cure a facially invalid warrant).

       The problem with this argument is that it challenges neither the location of the

search, nor the items to be seized, but rather the persons conducting the search. This

challenge goes beyond the text of the Particularity Clause, which provides that “no

Warrants shall issue, but upon probable cause . . . and particularly describing the place to

be searched, and the persons or things to be seized.” U.S. Const. amend. IV (emphasis

added). McNeilly does not point us to a single decision that invalidated a warrant under

the Particularity Clause based on the persons authorized to conduct the search.

                                             ii.

       McNeilly next contends that the search of her devices should have been limited

temporally to communications on or after May 1, 2018—the date of the police search of

M.W.’s home. 10 When evaluating particularity of a warrant, “the circumstances of the case

must be considered, as well as . . . whether a more precise description is possible under the

circumstances.” Miller, 
666 N.W.2d at 713
.

       Here, it was not possible to specify a more precise time frame in the warrant.

Communications before May 1, 2018, could be relevant evidence because the parties

disputed the reason that M.W. paid McNeilly $15,000.             That dispute required an


10
       When the examiner conducted the search, she only reviewed documents dated on or
after May 1, 2018. That fact is not constitutionally relevant. Assuming—contrary to our
holding today—that a warrant allowing the police to search for materials before May 1 was
insufficiently particular, the fact that the police self-limited the search to the
constitutionally permissible timeframe would not cure a facially invalid warrant. Groh,
540 U.S. at 559–60.

                                             26
investigation into the full scope of McNeilly’s representation of M.W., including monies

paid and/or owed for any legal work McNeilly had provided on M.W.’s landlord-tenant

dispute, his drug case, or any other case. That is why the application for the device warrant

included “retainer agreements, casefiles, and documents pertaining to M.W. and J.S.” The

warrant application specifically stated that “[t]hese files, if located, could be used to

confirm or contradict M.W.’s assertion that McNeilly has not provided legal services on

his behalf for the [monies] which he provided to her for the retainer and the ‘donation’ to

the police fund.”

                                             iii.

       McNeilly argues that the particularity requirement demands that warrants specify

the crime to which the documents must relate. In support of this contention, McNeilly cites

United States v. Kow, 
58 F.3d 423, 427
 (9th Cir. 1995).

       Kow centered around an FBI raid of a video cassette distribution company that was

suspected of defrauding a related company and the Internal Revenue Service. 
Id. at 425
.

The court observed:

       [T]he warrant apparently sought to describe every document on the premises
       and direct that everything be seized. The government emphasizes that the
       warrant outlined fourteen separate categories of business records. However,
       the warrant contained no limitations on which documents within each
       category could be seized or suggested how they related to specific criminal
       activity.

Id. at 427
.

       Contrary to McNeilly’s assertion, Kow did not set out a rule that a warrant must

specify the crime being investigated.      The Kow court applied the correct standard:



                                             27
“[g]eneric classifications in a warrant are acceptable only when a more precise description

is not possible.” 
Id.
 (citation omitted) (internal quotation marks omitted); see also Miller,

666 N.W.2d at 713
 (reasoning that when evaluating particularity of a warrant, courts must

consider “whether a more precise description is possible under the circumstances”).

       In Kow, the government did not provide any limits on which documents could be

seized. The court concluded that a more precise description was possible. The court

suggested that the “[m]ost obvious[]” limitation would be to “specif[y] the suspected

criminal conduct.” Kow, 
58 F.3d at 427
. But it suggested numerous other ways the

government could have made the warrant more particular, including limiting the scope of

the seizure “to a time frame within which the suspected criminal activity took place” or

limiting the documents sought to those that include the suspect company’s “tax

identification number . . . account number at the Bank of Trade, or the names of the foreign

companies allegedly receiving the proceeds.” 
Id.

       In this case, it was not immediately apparent during the investigation what the crime

was—initial reports suggested bribery, but ultimately investigators determined that the

crime was theft by swindle. Even if the warrant had specified either bribery or theft by

swindle as the suspected crime under investigation, it is not clear that specifying either or

both as suspected crimes would significantly circumscribe the warrant. The device warrant

specifically described files for two clients, one of whom was swindled and the other who

witnessed key events in the swindle case. (This is analogous to the Kow court’s suggestion

that the search be limited to documents associated with certain companies or banks central

to the crime). M.W.’s housing court file was relevant to the crime because the State was


                                             28
investigating what legal services, if any, had been provided in exchange for the monies

paid. Likewise for communications with the Minnetonka detective—specifying that the

crime in question was alleged bribery would authorize seizure of the same documents

pertaining to the detective. And at the time, the police did not know if McNeilly would

continue to claim that the bribery scheme was real. Put differently, although it is true that

the device warrant could have specified the crime being investigated, it would not have

altered the scope of the search authorized by the warrant.

                                             iv.

       McNeilly argues that the device warrant was insufficiently particular because it

authorized seizure of all contacts between McNeilly and the Minnetonka detective,

including those that pertained to clients other than M.W. and J.S. We disagree. The search

of all communications with the detective was justified because this investigation originated

from allegations that he was accepting a bribe. And the actual communications between

McNeilly and the Minnetonka detective were still relevant to showing that McNeilly had

swindled M.W. by falsely claiming that law enforcement was extorting her client. And in

seeking evidence that McNeilly and the Minnetonka detective were—or were not—

engaged in a bribery scheme, police were within their rights to seek communications

between those two, even if those communications did not pertain to M.W. or J.S. After all,

a bribery scheme between a criminal defense attorney and a detective may suggest an

ongoing relationship that extends beyond a single client.

       Further, even assuming the provision about contacts with the Minnetonka detective

were insufficiently particular, the outcome would not change. Under our precedent, we


                                             29
would exclude any evidence seized under the ‘contacts with [the Minnetonka detective]’

provision.    See Hannuksela, 
452 N.W.2d at 673
.             No evidence pertaining to

communications with the Minnetonka detective was ever used or introduced, so there is

nothing that would require exclusion.

                                             v.

       Finally, McNeilly argues that the device warrant was insufficiently particular

because it authorized seizure of all documents pertaining to a confidential informant form,

regardless of the client to whom that form related or the date it was prepared.

       “[W]hen determining whether a clause in a search warrant is sufficiently particular,

the circumstances of the case must be considered, as well as the nature of the crime under

investigation and whether a more precise description is possible under the circumstances.”

Miller, 
666 N.W.2d at 713
. The warrant application provided that “M.W. stated that

McNeilly showed him an example of the CI form.” Further, M.W. refused to sign a

confidential informant form when McNeilly made the request.              Thus, police had

information that McNeilly had shown M.W. a copy of a confidential informant form, but

not whether it had a date or person’s name on it. The confidential informant forms

ultimately seized and presented at trial did not have names or dates included. One form

was from the Texas Alcoholic Beverage Commission and the other was a forgery—based

on the Texas form—that purported to be from the Southwest Hennepin Drug Task Force.

Given these facts, it is not apparent that a more precise description of the confidential

informant form in question was possible under the circumstances.




                                            30
                                      *      *       *

       In summary, we hold that both warrants in this case were sufficiently particular

under the United States and Minnesota Constitutions.

                                             II.

       Separate from her particularity claims, McNeilly contends that the search warrants

were executed in an unreasonable manner under the Fourth Amendment and Article I,

Section 10, because the police did not take adequate steps to identify and exclude from the

search privileged communications and lawyer work product.

                                             A.

       A government agent conducting a search can violate the Fourth Amendment by

performing the search without proper judicial authorization, Groh, 540 U.S. at 562–63, by

seizing evidence beyond that which is authorized in the warrant, Bivens v. Six Unknown

Named Agents of Federal Bureau of Narcotics, 
403 U.S. 388
, 394 n.7 (1971), or by

executing the search in an unreasonable manner, Dalia v. United States, 
441 U.S. 238, 258

(1979). McNeilly’s argument that the State failed to implement reasonable privilege

safeguards falls into the third category: unreasonable execution of a search.

       “When officers obtain a warrant to search an individual’s home, they also receive

certain limited rights to occupy and control the property; however, the Fourth Amendment

binds the officers such that the right to search a home concomitantly obliges the officers to

do so in a reasonable manner.” San Jose Charter of Hells Angels Motorcycle Club v. City

of San Jose, 
402 F.3d 962
, 971 (9th Cir. 2005) (internal quotation marks omitted) (quoting

Lawmaster v. Ward, 
125 F.3d 1341, 1350
 (10th Cir. 1997)). “[W]hen executing a search


                                             31
warrant, an officer is limited to conduct that is reasonably necessary to effectuate the

warrant’s purpose.” Lawmaster, 
125 F.3d at 1349
; see Ginter v. Stallcup, 
869 F.2d 384, 388
 (8th Cir. 1989). In Bell v. Wolfish, the United States Supreme Court explained:

       The test of reasonableness under the Fourth Amendment is not capable of
       precise definition or mechanical application. In each case it requires a
       balancing of the need for the particular search against the invasion of
       personal rights that the search entails. Courts must consider the scope of the
       particular intrusion, the manner in which it is conducted, the justification for
       initiating it, and the place in which it is conducted.

441 U.S. 520, 559
 (1979). McNeilly argues that the scope of the intrusion is considerable

when police search an attorney’s files because there is a very high probability that they will

contain privileged communications or attorney work product. Thus, a search of a lawyer’s

files has serious potential to undermine the values underlying the attorney-client privilege

and the work-product doctrine as well as constitutional protections of criminal defendants

set forth in the Fifth and Sixth Amendments to the United States Constitution and

corresponding protections set forth in the Minnesota Constitution.

       McNeilly notes that the attorney-client privilege provides space for open and

complete communication between a lawyer and client. An attorney “can only effectively

fulfill [her] roles as counselor, intermediary, and advocate if the client, assured of

confidentiality, is wholly free to completely and candidly disclose all the facts, favorable

or unfavorable.” Kahl v. Minn. Wood Specialty, Inc., 
277 N.W.2d 395, 398
 (Minn. 1979).

The work-product doctrine—which protects from disclosure “an attorney’s mental

impressions, trial strategy, and legal theories in preparing a case for trial,” Dennie v. Metro.

Med. Ctr., 
387 N.W.2d 401, 406
 (Minn. 1986)—is likewise essential for effectively serving



                                              32
her clients. Accordingly, McNeilly argues, a search of an attorney’s office, even when the

attorney is suspected of a crime, presents a substantial intrusion into private and sensitive

matters, and the manner of the search must be carefully scrutinized. As discussed above,

although the police in this case took steps to make sure the documents that were turned

over to the prosecution team were relevant, they did not consider whether the documents

they were reviewing were privileged or protected by the work-product doctrine. As

McNeilly observes, that is troubling.

       McNeilly relies on our decision in O’Connor, which involved the search of a law

office when the lawyer was not the target of the investigation. 
287 N.W.2d at 404
. In that

case—which has been our law for nearly half a century—we recognized the sanctity of the

attorney-client privilege and work-product doctrine when police search a law office. 
Id.

We said that “[i]n protecting these rights and privileges we must take care to protect . . . the

rights of all clients of the attorney whose office is being searched.” 
Id.
 In other words, a

search of an attorney’s office implicates concerns about the privacy interests of clients who

entrust their attorney with sensitive privileged information in order to receive full and

effective representation.

       Indeed, we recognized in O’Connor that a search of a law office—especially the

office of a criminal defense attorney—gives the attorney-client privilege a constitutional

dimension. We observed:

       A criminal defendant’s constitutional right to counsel, guaranteed by Article
       I, section 6 of the Minnesota Constitution and the Sixth Amendment of the
       United States Constitution, must also be weighed in determining the
       reasonableness of a search warrant under Article I, section 10 of the



                                              33
       Minnesota Constitution and the Fourth Amendment of the United States
       Constitution.

Id. at 404
. We also observed that mere disclosure to police could be incredibly damaging:

“[o]nce [privileged] information is revealed . . . the information cannot be erased from the

minds of the police.” 
Id. at 405
; see also Kaur v. Maryland, 
141 S. Ct. 5
, 6–7 (2020)

(statement Sotomayor, J., respecting denial of certiorari) (noting some of the “many

insidious ways” privileged information can be used against a criminal defendant). Based

on these concerns, we adopted rules to regulate the search of a lawyer’s office when the

lawyer was not the subject of the police investigation. The protections we established were

rooted in part in our power “to afford . . . greater protection [under Article I, Section 10, of

the Minnesota Constitution] than the safeguards guaranteed in the Federal Constitution.”

O’Connor, 
287 N.W.2d at 405
.

       McNeilly also relies on State v. Flowers, 
986 N.W.2d 686
 (Minn. 2023). In

Flowers, we reaffirmed the constitutional dimension of the attorney-client privilege:

“although the attorney-client privilege is . . . a statutory right codified under 
Minn. Stat. § 595.02
, subd. 1(b) (2022) . . . it is relevant to a Sixth Amendment right-to-counsel

analysis.” Id. at 694.

       According to McNeilly, federal courts have diligently scrutinized the procedures

used to protect privileged material and work product because of the tremendous risks

involved in the search of a law office. See, e.g., United States v. Regan, 
281 F. Supp. 2d 795, 802
 (E.D. Va. 2002). “[S]earches and seizures of items from law offices are not

unreasonable, per se, if measures are taken to protect certain privileges that might attach



                                              34
to documents contained therein.” Id.; see also Klitzman, Klitzman & Gallagher v. Krut,

744 F.2d 955, 959
 (3d Cir. 1984) (noting that where an attorney is the target of a criminal

investigation, a search of a law office is not “per se unreasonable” and that “the correct

approach to this issue . . . is not to immunize law offices from searches, but to scrutinize

carefully . . . the nature and scope of the search, and any resulting seizure”). McNeilly also

cites to a number of other federal courts that have scrutinized the procedures used to

safeguard privileged and work-product materials during searches of law offices, but with

one exception we have identified, those courts have not expressly determined that a search

without such protections is constitutionally unreasonable. 11 See, e.g., United States v.


11
        The exception is United States v. Renzi, 
722 F. Supp. 2d 1100
 (D. Ariz. 2010). In
that case, a federal court in Arizona specifically found that failure to follow protocols to
prevent disclosure of privileged documents to the government rendered a search—in that
case, a wiretap—unreasonable. 
Id. at 1127
. Federal investigators obtained a warrant to
wiretap a congressman; the warrant detailed procedures to protect privileged information,
and those procedures were not followed. 
Id.
 at 1105–10. The court concluded that “[t]he
Government’s conduct, in its totality, warrants a more significant sanction than just
suppressing the privileged evidence. The Court suppresses the wiretap.” 
Id. at 1111
.
        Renzi is not decisive of the issue presented here. First, it is not binding on us.
Second, unlike Renzi, in this case the district court had not specified, in advance,
procedures to protect privileged materials that the police then ignored. Third, unlike Renzi,
this prosecution stems from an investigation of an attorney, not the attorney’s client; a
difference we find significant as discussed below. Finally, the privileged communications
in Renzi were shared with the prosecution team as well as with co-defendants. The record
here is not so clear. McNeilly correctly points out that no privilege review was conducted.
But the record does not reveal whether, despite that serious oversight, privileged
communications or work-product materials were reviewed by the examiner or turned over
to the prosecution team. The record does not reveal that any of the documents in the files
of McNeilly that were searched were in fact privileged communications or work-product
material and McNeilly does not identify any that were so used. This lack of record is one
reason that we hesitate to reach the constitutional issue in this case.
        We also take note of a case from the Third Circuit, Klitzman, 
744 F.2d at 960
, where
the court found that a search of a law office was overbroad because it authorized a search


                                             35
Stewart, No. 02 CR. 395 JGK, 
2002 WL 1300059
, at *3 (S.D.N.Y. June 11, 2002);

Baltimore Law Firm, 
942 F.3d at 176
; United States v. Ritchey, 
605 F. Supp. 3d 891
, 902

(S.D. Miss. 2022).

       We emphasize that unlike our prior decision in O’Connor and many of the federal

decisions, in this case, the lawyer—not the lawyer’s client—is the target of the police

investigation. This distinction is significant because the attorney-client privilege belongs

to the client and not the attorney. It is the client that has the protected privacy interest, not

the lawyer. In re Houge, 
764 N.W.2d 328, 340
 (Minn. 2009); State v. Tall, 45 N.W 449,

450 (Minn. 1890). We know that the privilege belongs to the client because “[a] client can

waive his or her attorney-client privilege either by explicit consent or by implication.”

State v. Walen, 
563 N.W.2d 742, 752
 (Minn. 1997) (emphasis added); see 
Minn. Stat. § 595.02
, subd. 1(b) (2022) (“An attorney cannot, without the consent of the attorney’s

client, be examined as to any communication made by the client to the attorney or the

attorney’s advice given thereon in the course of professional duty . . . .”). Once the client

has waived the privilege, the lawyer can no longer use the privilege as a shield against

discovery or disclosure at trial. See Walen, 
563 N.W.2d at 752
 (noting that implicit waiver

occurs when a client alleges that her attorney breached a duty to the client and concluding




of “all client files, open or closed” as well as “the seizure of all of the firm’s financial
records, file lists, and appointment books.” It discussed the potential for privilege
violations at length, but did not clarify whether that would, on its own, justify its finding
that the search was overbroad. Id. at 961. Moreover, the court did not reach the ultimate
issue of whether the Fourth Amendment was violated, but rather affirmed the issuance of
a preliminary injunction. Id. at 962.

                                               36
that the client waived the privilege by bringing an ineffective-assistance-of-counsel

claim). 12

       In other words, the prohibition against intruding into the attorney-client privilege

exists to protect the client, not to protect the attorney. Consequently, there is a legitimate

question as to whether a lawyer in her individual capacity 13 has a sufficient expectation of


12
         The State argues that M.W. waived the privilege as to all his communications with
McNeilly when he reported McNeilly’s scheme to the police. We are not convinced,
however, that M.W.’s discussions with the police about McNeilly’s acts on November 5,
2018, constitute a wholesale waiver of every attorney-client communication that M.W.
may have had with McNeilly. The scope of an implicit waiver of the attorney-client
privilege is limited to “communications relevant to that issue.” Walen, 
563 N.W.2d at 752
;
see also Fort James Corp. v. Solo Cup Co., 
412 F.3d 1340, 1349
 (Fed. Cir. 2005) (“The
widely applied standard for determining the scope of a waiver of attorney-client privilege
is that the waiver applies to all other communications relating to the same subject matter.”).
M.W’s communications with law enforcement waived the privilege as to the events
surrounding McNeilly’s swindle. We are not convinced, and will not assume, that M.W.
intended to waive the privilege as to all communications with McNeilly regarding the
underlying drug offense or the earlier housing court matter. Indeed, it seems unlikely that
such a broad waiver was intended or effectuated, especially when one considers that
M.W.’s communications with law enforcement were through Paule, the attorney who
succeeded McNeilly as M.W.’s counsel for the drug charge.
         In addition, the record in this matter is insufficiently developed to allow us to know
the full extent of the communications between McNeilly and M.W. McNeilly did not
identify any attorney-client communications with M.W. that were introduced as evidence.
On the other hand, the police failed to consider whether privileged communications were
included in the files they searched and did not make any record of the documents that were
reviewed by the examiner and turned over to the Burnsville Police Department.
Consequently, it is impossible for us to determine if McNeilly’s files included
communications with M.W. on issues that were not waived when he made his statements
to the police about the events of November 5. Based on our resolution of this case, we
need not definitively resolve the issue of whether M.W. waived the attorney-client
privilege with regard to all his communications with McNeilly.
13
       We acknowledge that, as McNeilly argues, attorneys have a professional obligation
to assert the attorney-client privilege on behalf of clients. Minn. R. Prof. Conduct 1.6;
O’Connor, 
287 N.W.2d at 403
 (noting that an attorney is required “to preserve the


                                              37
privacy in privileged or work-product materials to allow her to challenge a search as

constitutionally unreasonable. See State v. deLottinville, 
890 N.W.2d 116, 119
 (Minn.

2017) (quoting Rakas v. Illinois, 
439 U.S. 128, 143
 (1978), for the principle that “standing

to bring a Fourth Amendment claim hinges on whether [the defendant] has ‘a legitimate

expectation of privacy in the invaded place’ ”).

       A somewhat more complicated question is whether an attorney who is under

investigation can claim that a search is unreasonable based on inadequate protections for

attorney work product. The work-product doctrine protects from disclosure an attorney’s

opinions, conclusions, mental impressions, trial strategy, and legal theories in materials

prepared in anticipation of litigation. See Dennie, 
387 N.W.2d at 406
; Minn. R. Crim.

P. 9.02, subd. 3; Minn. R. Civ. P. 26.02(d). Underlying the doctrine is the understanding

that nondisclosure of an attorney’s work product is essential to mounting an effective

defense and disclosure of work product can reveal the same sensitive information conveyed

in attorney-client communications. Hickman v. Taylor, 
329 U.S. 495, 511
 (1947) (noting




confidences and secrets of his clients”). As a result, attorneys facing a warranted police
search of their law office are put in the difficult position of having an obligation to assert
the privilege without necessarily having any constitutional standing to challenge the
warrant on the ground that the search may invade privileged communications with their
clients. See State v. deLottinville, 
890 N.W.2d 116, 119
 (Minn. 2017) (“Fourth
Amendment rights are ‘personal’ and ‘may not be vicariously asserted.’ ” (quoting
Alderman v. United States, 
394 U.S. 165, 174
 (1969))). This tension is particularly
pronounced when clients whose rights are implicated in the search have nothing to do with
the matter the police are investigating. Recognition of this tension is one of the reasons
that we exercise our supervisory powers, discussed below, to adopt procedural safeguards
that apply when the police search the office of a lawyer who is suspected of a crime, to
protect disclosure of privileged attorney-client communications and work-product
materials. Those restrictions are described fully in Part III below.

                                             38
that absent the protections of the work-product doctrine, “[i]nefficiency, unfairness and

sharp practices would inevitably develop . . . . And the interests of the clients and the cause

of justice would be poorly served”).

       A lawyer may retain some greater interest in work product consisting of mental

impressions, conclusions, opinions, or legal theories related to a case than the lawyer has

under the attorney-client privilege. We have never expressly addressed the issue of

whether a lawyer has an independent interest in work-product materials. 14 But even if we

assume without deciding that a lawyer retains such an independent interest unrelated to



14
        Some other courts have held that, unlike the attorney-client privilege, “the
work[-]product privilege belongs to both the client and the attorney, either one of whom
may assert it. Thus, a waiver by the client of the work[-]product privilege will not deprive
the attorney of his own work[-]product privilege, and vice versa.” In re Grand Jury Proc.,
43 F.3d 966, 972
 (5th Cir. 1994); see also In re Special Sept. 1978 Grand Jury, 
640 F.2d 49, 63
 (7th Cir. 1980); First Wis. Mortg. Tr. v. First Wis. Corp., 
86 F.R.D. 160, 163
 (E.D.
Wis. 1980); see generally Fred C. Zacharias, Who Owns Work Product?, 
2006 U. Ill. L. Rev. 127
, 134–36 (2006) (discussing different federal rulings regarding waiver of
work-product doctrine). On the other hand, section 90 of the Restatement (Third) of the
Law Governing Lawyers adopts the contrary position that “work-product immunity may
be invoked by or for a person on whose behalf the work product was prepared” and “[w]hen
lawyer and client have conflicting wishes or interests with respect to work-product
material, the lawyer must follow instruction of the client.” Restatement (Third) of the L.
Governing Laws. § 90 and comment c (Am. L. Inst. 2000).
        Note that, under Minnesota Rules of Professional Conduct 1.16(d), upon
termination of representation, a lawyer has a responsibility to return materials in the client’s
file to the client, with two exceptions. In litigation matters, a lawyer need not return
“pleadings, discovery, motion papers, memoranda and correspondence which have been
drafted, but not served or filed if the client has not paid the lawyer’s fee for drafting or
creating the documents.” Minnesota Rule of Professional Conduct 1.16(e)(2)(i).
Similarly, in transactional representations, an attorney need not return “drafted but
unexecuted estate plans, title opinions, articles of incorporation, contracts, partnership
agreements, or any other unexecuted document which does not otherwise have legal effect,
where the client has not paid the lawyer’s fee for drafting the document(s).” Minnesota
Rule of Professional Conduct 1.16(e)(3).

                                              39
protecting the client’s interest in some work-product materials, that interest is limited to a

general interest in the proper functioning of the legal profession, In re Special Sept. 1978

Grand Jury, 
640 F.2d 49, 62
 (7th Cir. 1980) (discussing the majority and concurrence in

Hickman, 
329 U.S. 495
), and a more specific interest in avoiding unnecessary and unfair

disclosure of the lawyer’s economic or competitive interest in her unique approach to legal

questions. See, e.g., Fred C. Zacharias, Who Owns Work Product?, 2006 U. Ill. L. Rev. at

127–28 and 146. The broader interest in the proper functioning of the legal profession is

not personal to a lawyer under criminal investigation. And an economic interest or

competitive advantage interest on its own is not a basis for preventing law enforcement

from obtaining documents as part of a warranted search supported by probable cause of a

person suspected of a crime. Consequently, in the specific context of this case—a search

of a lawyer’s office where the lawyer is the subject of a criminal investigation—the lawyer

cannot hide behind the work-product doctrine if her client has waived the benefit of that

doctrine.

       We must emphasize, however, that the fact that a lawyer may not have an

independent interest under the attorney-client privilege does not mean that broader

constitutional concerns that we identified in O’Connor fall away. When the police

investigating a lawyer for a crime demonstrate probable cause and obtain a warrant to

search the lawyer’s office, a tension exists. On the one hand, police searches of law offices

involve a considerable intrusion into private and sensitive privileged communications and

work-product materials; clients have privacy interests in those materials. Further, as

discussed above, privilege and work-product protections have important constitutional


                                             40
implications for a lawyer’s clients—implications that bear on whether a search satisfies the

Fourth Amendment requirement that the police execute search warrants in a reasonable

manner. On the other hand, the reason we protect privileged communications and a

primary reason we limit disclosure of work-product materials is to shield the client and not

the lawyer as an individual.

       McNeilly asserts that this tension should be resolved by a holding that a search of a

law office where the lawyer is the subject of the investigation without any (let alone

sufficient) safeguards for privileged communications and work-product materials is a

violation of the Fourth Amendment and Article I, Section 10. We decline to accept that

invitation in this case. Even if we assumed that, because the police did not review the

seized materials for privileged communication or work product materials, the warrants to

search McNeilly’s office and devices were executed in an unreasonable manner in violation

of the Fourth Amendment or Article I, Section 10, McNeilly is not entitled to a new trial.

Because the jury’s verdict was surely unattributable to the district court’s decision not to

suppress evidence for unreasonable execution of the searches, the alleged constitutional

error was harmless beyond a reasonable doubt. We explain why below.

                                            B.

       When determining whether a defendant was prejudiced by the admission of

evidence that should have been excluded, we apply one of two different harmless-error

tests. When an error does not implicate a constitutional right, we ask whether “there is

a reasonable possibility that the wrongfully admitted evidence significantly affected the

verdict.” State v. Cram, 
718 N.W.2d 898
, 904 n.1 (Minn. 2006). But when the error


                                            41
implicates a constitutional right, we employ a heightened standard and ask whether the

error was harmless beyond a reasonable doubt. State v. Davis, 
820 N.W.2d 525, 533

(Minn. 2012). “An error is harmless beyond a reasonable doubt if the jury’s verdict was

surely unattributable to the error.” State v. Sanders, 
775 N.W.2d 883, 887
 (Minn. 2009).

         McNeilly was charged with theft by swindle under Minnesota Statutes

section 609.52, subdivision 2(a)(4). To prevail, the State had to prove that M.W. gave up

possession of his property (the $15,000) due to a swindle; that McNeilly intended to obtain

for herself or someone else possession of the property; and that McNeilly’s act was a

swindle. State v. Pratt, 
813 N.W.2d 868, 873
 (Minn. 2012). “The essence of a swindle is

the defrauding of another of his property by deliberate artifice.”          State v. Olkon,

299 N.W.2d 89, 106
 (Minn. 1980); see 
Minn. Stat. § 609.52
, subd. 2(a)(4) (defining theft

by swindle as obtaining property or services from another person “by artifice, trick, device,

or any other means”). In other words, the State had to prove that McNeilly intentionally

tricked M.W. into paying her $15,000—which she intended to keep—based on her

fraudulent story that the $15,000 would be used as a down payment on a bribe to the police

union.

         The State presented overwhelming evidence that McNeilly engaged in a swindle.

M.W. and J.S. both testified in detail about an elaborate plot by McNeilly. They explained

how she had urgently summoned them on November 5, 2018, and told them that she had

met with the Minnetonka detective and prosecutors who were building a massive federal

case against M.W. They testified that McNeilly claimed that a federal bug had been planted

in M.W.’s house by a renter and subsequently removed by the Minnetonka detective. They


                                             42
described McNeilly’s proposal: M.W. faced 15–20 years in federal prison, but he could

avoid charges if he paid $35,000 to the police union and acted as a confidential informant.

When M.W. said he did not want to be an informant, McNeilly offered him a second option:

pay $50,000 to the police union and no service as a confidential informant would be

necessary. M.W. and J.S. testified that M.W. agreed to the $50,000 option and indicated

that he could pay $15,000 that day. McNeilly went to M.W.’s garage—ostensibly to make

a phone call—and emerged 5 or 10 minutes later claiming that the detective had agreed to

the deal.

       That same day, at McNeilly’s insistence, M.W. provided McNeilly with a cashier’s

check for $15,000. There is no dispute that M.W. paid her $15,000. M.W. testified to that

fact and his testimony was supported by bank records (obtained directly from the bank)

which showed a $15,000 deposit on the same day.

       Other evidence that did not come from the search of McNeilly’s law office showed

McNeilly confirming M.W.’s story. M.W. provided law enforcement with a series of text

and email exchanges between him and McNeilly. For instance, M.W. sent McNeilly an

email stating “I am unable to move forward with the plan discussed at my home” and asking

her to return the $15,000. In response, McNeilly texted M.W. as follows: “Yes, I got your

email. It was paid as directed. So how can I get a refund? This is a serious issue.” Notably,

McNeilly did not contest that the $15,000 was for a “plan discussed” on November 5 and

did not assert that the money was for past services. Instead, McNeilly asked how she could

get a refund—indicating that she had paid the funds to a different party—which is

consistent with M.W.’s testimony that McNeilly told him she would send the money to the


                                             43
Minnetonka detective in exchange for dismissal of M.W.’s drug charges. The conclusion

that a refund was unavailable because “[i]t was paid as directed” also strongly suggests that

McNeilly was, at the time, still trying to maintain the ruse of buying off law enforcement.

       The defense theory at trial was that the $15,000 was paid for legal services McNeilly

had rendered to M.W. prior to November 5, 2018 (the date of payment). McNeilly’s

argument to the jury was that M.W. made up the bribery scheme to avoid having to pay for

legal services rendered. 15 The only evidence she introduced in support of this theory was

an invoice which was dated November 5, 2018. The “for” line states “Invoice from

5/15/18-11/4/18.”    The invoice lists various tasks purportedly performed, including

“Hearing Prep” and “Court Appearance(s)” without listing dates when work was

performed. The total comes to $16,075 and at the bottom is handwritten “Paid $15,000

11/5/18.”

       McNeilly’s theory, however, does not stand up to scrutiny. In determining whether

an error was harmless beyond a reasonable doubt, “overwhelming evidence of guilt” is a

relevant and often important factor, although certainly not a dispositive factor. See State

v. Al-Naseer, 
690 N.W.2d 744, 748
 (Minn. 2005). First and critical under the unique facts

of this case, the theory that the $15,000 was paid for legal services rendered is inconsistent

with McNeilly’s own words in her text message to M.W. on November 8, 2018, which


15
       Even if M.W. had owed McNeilly the money, it could still be theft by swindle if she
obtained the funds by artifice, trick, device, or similar means. See State v. Lone,
361 N.W.2d 854, 860
 (Minn. 1985) (holding that it is not a defense to theft by swindle to
say that the victim received something of value); State v. Andrade, No. A06-797, 
2007 WL 1598849
, at *5 (Minn. App. June 5, 2007) (“[A] claim of right is irrelevant to the crime of
theft by swindle.”).

                                             44
confirms M.W.’s story by stating, “Yes, I got your email. It was paid as directed. So how

can I get a refund? This is a serious issue.” In the text, McNeilly did not refute that she

and M.W. had a plan for using the $15,000, that the $15,000 “was paid as directed,” and

that she could not get a refund from the person to whom she had paid the money. McNeilly

did not assert that the money was for past services—which would have been the obvious

response if that was the reason M.W. paid her $15,000.

       Indeed, the record does not disclose how M.W. could accrue over $16,000 in legal

fees—purportedly for more than 50 hours of legal work—for a criminal matter that

authorities had not yet charged. 16 Moreover, the $15,000 in “legal fees” was in addition to

the $20,000 fee that M.W. had already paid on the uncharged matter. 17


16
       M.W.’s housing court case was summarily resolved after two hearings and M.W.
had paid $2,000 in advance on that matter. J.S.’s drug charge was quickly resolved with a
guilty plea, and a flat fee of $2,500 had been paid to McNeilly for that representation.
17
        The retainer agreement purports to be an ‘availability retainer,’ in which a client
pays not for legal services, but for the availability of the attorney (i.e., an option for future
representation). See Minn. R. Prof. Conduct 1.5(b)(2). But the retainer agreement also
lists services McNeilly would provide in exchange for the fee paid:

       2. SCOPE OF SERVICES: Client hires Lawyers to provide legal services in
       the following matters: Availability retainer fee only for possible drug
       trafficking case-per client conversation. If charges develop at a later date,
       new retainer must be signed. Will research warrant on home and arrange bail
       if needed. Will take steps to get defense ready for possible case.

This retainer is not an availability retainer because it details legal services to be provided
in exchange for the fee. See Minn. R. Prof. Conduct 1.5(b)(2) (“A lawyer may charge a
fee to ensure the lawyer’s availability to the client . . . on a specified matter in addition to
and apart from any compensation for legal services performed.”). In other words, the
“research” and other “steps to get defense ready for possible case” theoretically performed
by McNeilly would be covered by the $20,000 payment and could not be separately
charged at $300 per hour as the invoice purports to do.

                                               45
        In addition, the State provided bank records that showed M.W. paid McNeilly

$15,000 on November 5. M.W. and J.S. testified to McNeilly’s proposed bribery scheme.

And, perhaps most importantly, none of the evidence discussed so far was obtained in the

searches of McNeilly’s office and electronic devices.

        The State did introduce some of the evidence it obtained in the search to support its

case.   In particular, the State introduced the Texas Bureau of Alcohol Confidential

Informant Form that had been downloaded to McNeilly’s computer on November 5, 2018,

and the identical form, with the heading changed to “Southwest Hennepin Drug Task

Force” that was created on McNeilly’s computer. The State also entered into evidence the

actual (very different) confidential informant form used by the Southwest Hennepin Drug

Task Force (a document not in McNeilly’s files).

        This evidence supports the conclusion that McNeilly had lied about the possibility

of acting as a confidential informant. We observe that the State did discuss the confidential

informant agreements in closing, but overall, after review of the record, we conclude that

the State did not give the forms significant focus at the trial and the forms were not highly

persuasive in the context of the trial. See State v. Caulfield, 
722 N.W.2d 304, 317
 (Minn.

2006) (discussing other non-exclusive factors that overcome strong evidence of guilt if

they support the conclusion that the error was harmful). In particular, the evidence

demonstrating that McNeilly fabricated the story about a federal drug investigation and a

bribery scheme to convince M.W. to pay her $15,000 included McNeilly’s own

contemporaneous words maintaining the ruse that she was using the $15,000 to pay the

police union. Accordingly, we conclude that the jury’s decision to find McNeilly guilty of


                                             46
theft by swindle was surely unattributable to the State’s use of the two confidential

informant forms. 18

                                            III.

       As discussed above, in O’Connor we recognized that in the search of a law office—

especially the office of a criminal defense attorney—the attorney-client privilege takes on

a constitutional dimension for the lawyer’s clients. It is true that in O’Connor, the lawyer

was not the target of the police investigation. Our concern about the constitutional

implications for a lawyer’s clients of allowing the police to gain access to privileged

attorney-client communications and work-product materials, however, is not diminished

simply because the target of an investigation is the lawyer whose office is searched rather

than one of the lawyer’s clients.

       In O’Connor, we adopted a special prophylactic rule for police searches of law

offices where the lawyer is not the target of the investigation to protect the constitutional

rights of the lawyer’s clients. We held that the police searching the office of an attorney

who is not the subject of a criminal investigation must proceed by subpoena duces tecum

rather than by search warrant. 
287 N.W.2d at 405
. That process allows an attorney—on

behalf of her clients—“to assert applicable privileges by a motion to quash.” 
Id.
 The

process also provides the benefit of judicial review of privilege claims. We required these

procedures—even though we recognized that the procedures may “limit[] the ability of the


18
        The State also used invoices it had obtained in the searches of McNeilly’s office and
computer to discredit the November 5, 2018, invoice introduced by McNeilly. As
explained above, this document was discredited in several other ways that did not require
resort to evidence found in the searches.

                                             47
police to obtain information in the early stages of an investigation”—because of the vital

interest in protecting privileged materials from disclosure. 
Id.

       We also observed in O’Connor that the risk of an attorney frustrating a search for

documents implicating a client in a crime is limited. We reasoned that lawyers have a

professional obligation to turn over all responsive documents (again subject to a motion to

quash) and there was no indication that the lawyer in O’Connor would attempt to destroy

the documents before disclosure. 
Id.
 We agree with the State that the solution we adopted

in O’Connor—a requirement that the police proceed by subpoena duces tecum rather than

search warrant—is a poor fit if the lawyer is the subject of the police investigation. When

the lawyer is the target of a search, among other complications, the risk that the lawyer

may attempt to hide or destroy evidence in response to a subpoena rises. Thus, we conclude

that the subpoena requirement adopted in O’Connor is not appropriate when a search

targets an attorney.

       Accordingly, we turn to the question of the procedures necessary to safeguard the

client’s interests—as recognized in O’Connor—when the lawyer is the target of the

investigation. “It is our duty to supervise the criminal justice system and ensure the fair

administration of justice.” State v. Windish, 
590 N.W.2d 311, 319
 (Minn. 1999). “[T]he

thread that binds our court’s interests-of-justice jurisprudence is . . . quite simple: our court

must, at times, act as a backstop—the court of last resort—to protect the human, political,

and property rights guaranteed by the constitution.” State v. Thompson, 
994 N.W.2d 554
,

560 (Minn. 2023) (citation omitted) (internal quotation marks omitted).




                                               48
       As part of that duty, we have the inherent authority to regulate and supervise the

rules that govern the admission of evidence in the lower courts. State v. Obeta, 
796 N.W.2d 282, 287
 (Minn. 2011); State v. Hill, 
871 N.W.2d 900, 909
 (Minn. 2015). We have

exercised that authority to adopt rules to ensure the fair administration of justice. For

instance, we have adopted rules that place limitations on admission of evidence where law

enforcement has not followed certain procedures. See, e.g., State v. Scales, 
518 N.W.2d 587, 592
 (Minn. 1994) (requiring police to record in-custody interrogations); State v.

Lefthand, 
488 N.W.2d 799
, 801–02 (Minn. 1992) (holding that in-custody interrogation of

a formally accused person who is represented by counsel must not proceed prior to

notification of counsel or the presence of counsel). 19

       We conclude that the need to safeguard the client’s constitutionally protected

interests—as recognized in O’Connor—is substantial. In determining the procedures

necessary to protect those interests when the lawyer is the target of the investigation, our

decision in Scales, 
518 N.W.2d at 592
, is instructive.

       In Scales, the defendant disputed law enforcement accounts of his custodial

interrogation. 
Id. at 590
. He argued that he had the right under the Minnesota Constitution



19
       We have also used our supervisory powers to require the State to take affirmative
actions and provide procedural safeguards—essentially prophylactic rules to safeguard
constitutional rights. See State ex rel. Doe v. Madonna, 
295 N.W.2d 356
, 365 n.17 (Minn.
1980) (requiring a preliminary probable cause hearing); State v. Borst, 
154 N.W.2d 888, 894
 (Minn. 1967) (requiring an attorney for a criminal defendant charged with a
misdemeanor); Hepfel v. Bashaw, 
279 N.W.2d 342, 348
 (Minn. 1979) (requiring an
attorney for indigent defendants in paternity adjudications “where the complainant is
represented by the county attorney”); Scales, 
518 N.W.2d at 592
 (requiring electronic
recording of all custodial interrogations).

                                             49
to have his custodial interrogation recorded. 
Id.
 at 590–91. We declined to decide the

issue under the Minnesota Constitution, but also recognized that the constitutional interests

in avoiding self-incrimination and coerced confessions would be served by a prophylactic

rule that both “creat[es] an accurate record of a defendant’s interrogation for trial and

appeal” and “discourag[es] unfair and psychologically coercive police tactics.” State v.

Castillo-Alvarez, 
836 N.W.2d 527, 536
 (Minn. 2013) (quotation omitted) (explaining the

reasons for the rule established in Scales). Thus, we exercised our supervisory powers and

required recording of custodial interrogations, holding that failure to do so would result in

suppression of statements from the interrogation. Scales, 
518 N.W.2d at 592
.

       We have recognized that the threat to the attorney-client privilege and work-product

doctrine is not limited to use of the materials by an adversary but can also result from the

disclosure of privileged communications and work-product materials. See O’Connor,

287 N.W.2d at 405
 (“Once [privileged] information is revealed to the police . . . the

information cannot be erased from the minds of the police.”). Indeed, our efforts to protect

privileged communications and work-product materials are focused on preventing

disclosure of the communications and materials and on ensuring review of any disputes

over the privileged or protected nature of communications and work-product materials by

a neutral third party before disclosure.

       For instance, in the context of civil litigation, privileged materials are not just

shielded from admission by the Minnesota Rules of Evidence—they may be withheld from

disclosure to opposing parties under Minnesota Rule of Civil Procedure 26.02(f)(1). The

withholding party must provide the requesting party with a privilege log identifying the


                                             50
documents not produced.        Minn. R. Civ. P. 26.02(f)(1).        Further, if privileged

communications or work-product material are inadvertently disclosed in litigation, the

party who received it (upon being notified the disclosing party is claiming the documents

are privileged or work product) “must promptly return, sequester, or destroy the specified

information and any copies it has and may not use or disclose the information until the

claim [of privilege] is resolved.” Minn. R. Civ. P. 26.02(f)(2); see Minn. R. Evid. 502. In

either case, the claim of privilege or work-product protection is reviewable by a court. See

Minn. R. Civ. P. 26.02 (Advisory Committee Comment—2007 Amendment). In addition,

a party may seek information from a third party under a subpoena. In that case, a similar

process is followed. Minn. R. Civ. P. 45.04(b).

       The subpoena duces tecum requirement for searches of the office of a lawyer when

the lawyer is not the target of an investigation includes a similar focus on preventing

disclosure of privileged communications and work-product materials and allowing a

neutral magistrate to review disputes over the privileged or work-product status of

materials before the State gains access to them. O’Connor, 
287 N.W.2d at 405
. We

conclude that the rule for searches of the office of a lawyer who is the subject of the

investigation should have a similar focus on preventing disclosure and allowing neutral

magistrate review.

       Accordingly, and pursuant to our supervisory powers, in the context of searches of

law offices where the lawyer is the subject of the search, we direct as follows:




                                            51
       All documents obtained from a search of a law office are presumed to be

privileged. 20 This principle follows from the premise that “a matter committed to a

professional legal adviser is prima facie so committed for the sake of the legal

advice . . . and is therefore within the privilege unless it clearly appears to be lacking in

aspects requiring legal advice.” Kobluk v. Univ. of Minn., 
574 N.W.2d 436, 442
 (Minn.

1998); see also In re Polaris, Inc., 
967 N.W.2d 397
, 414 (Minn. 2021) (Anderson, J.,

dissenting) (“We therefore presume that a communication regarding a matter committed to

an attorney is privileged in its entirety . . . .”); United States v. Pedersen, No. 3:12-CR-

00431-HA, 
2014 WL 3871197
, at *31 (D. Or. Aug. 6, 2014) (“The only entity that is

entitled to make a determination that a private communication between an attorney and her

client is not privileged is the court.” (emphasis added)). Not only are documents in an

attorney’s file likely to be privileged communications, but a file is also likely to contain

work product prepared by the attorney on the client’s behalf. Accordingly, when the police

search an attorney’s law office, the initial burden to show the documents are not privileged

rests with the State.

       The State can satisfy its initial burden to demonstrate that documents are neither

privileged nor work product by establishing (without the prosecution team reviewing the

documents) (i) that the documents fail to meet the elements of those protections; (ii) that

the attorney-client privilege has been waived by the client or that the work-product


20
       Note that documents that are not obtained in the search—such as a client file that is
provided by the client—are not presumed privileged, so the court need not make a final
privilege determination; those documents may be provided to and used by the prosecution
team immediately.

                                             52
protection has been waived pursuant to existing law; or (iii) that an exception to the

privilege (e.g., crime-fraud) applies.

       The presumption of privilege is contrary to the general rule that “the party resisting

disclosure bears the burden of presenting facts to establish the privilege’s existence.”

Kobluk, 
574 N.W.2d at 440
. But the general rule makes little sense in a context in which

a vast number of documents are likely to be subject to the attorney-client privilege and

work-product doctrine and the documents are searched and seized under circumstances that

do not permit a timely and effective opportunity to assert privilege.

       As a corollary to the presumption of privilege, review of files should be limited as

much as practicable during the search process. For example, if a warrant authorizes seizure

of a particular client’s file and the fact that it is a particular client’s file is clear without

opening it, there is no need to open the physical file (or the relevant electronic file) during

the search and before the privilege review by a neutral magistrate or designee or by a taint

team as discussed below.

       Second, the initial screening for privileged communications and work-product

materials included among the seized documents must be undertaken by an entity other than

the investigation and prosecution team. Before information is provided to the prosecution

team, the court should verify that the attorney-defendant has notified clients impacted by

the potential disclosure to the prosecution. If the attorney-defendant does not notify clients

in a timely manner, the court may take appropriate action to protect the client files in a




                                               53
manner that does not unnecessarily delay the criminal investigation or prosecution. 21 The

investigation and prosecution team should not have access to the contents until the file has

been screened and a neutral magistrate has had the opportunity to review disputes over the

privileged or work-product status of materials. See O’Connor, 
287 N.W.2d at 405
.

       The more “traditional” approach to reviewing sensitive documents is to submit those

documents “under seal for in camera review by a neutral and detached magistrate or by

court-appointed special masters.” United States v. Neill, 
952 F. Supp. 834
, 841 & n.13

(D.D.C. 1997). Other courts have allowed review by an independent taint team. See In re

Ingram, 
915 F. Supp. 2d 761, 764
 (E.D. La. 2012) (collecting cases and noting that several

courts “have approved the use of government filter teams”).

       If law enforcement uses a taint team to screen documents, the district court must,

with input from the taint team, the attorney-defendant, and her clients who express interest,

review and approve the process the taint team will use to ensure that sufficient safeguards

are in place to protect from disclosure privileged communications and work product

materials. The process must at a minimum ensure that:




21
       We reinforce our statement from K.M. that following the seizure of documents from
an attorney’s office, a district court should order the immediate return of copies of the
attorney’s files. 940 N.W.2d at 172. We emphasized that return of client files is crucial
so an attorney can “fulfill her professional responsibilities. This includes not just advising
her clients in ongoing matters, but also notifying clients that their open and closed files
have been seized by law enforcement so that those clients can take timely steps to protect
their rights.” Id. (observing that an attorney’s professional responsibilities include
“notifying clients that their open and closed files have been seized by law enforcement”);
Minn. R. Prof. Conduct 1.4(a), 1.7.

                                             54
       (i)     The taint team is disinterested, does not include any members of the

               investigation or prosecution team, and is walled off from the investigation

               and prosecution team; 22

       (ii)    The State strictly limits access to any material it holds to necessary personnel

               and controls are implemented so that the State knows which personnel have

               accessed the material;

       (iii)   Privilege determinations are made by attorneys; 23 and

       (iv)    There is a meaningful opportunity for disputed privilege and work-product

               determinations to be adjudicated by the court (or another neutral magistrate

               or special master appointed by the court). 24 In re Polaris, Inc., 
967 N.W.2d 22
       Cf. United States v. Stewart, No. 02 CR. 395 JGK, 
2002 WL 1300059
, at *7
(S.D.N.Y. June 11, 2002) (noting that when reviewing privileged documents obtained in a
search, the procedure adopted should “not only be fair but also appear to be fair”); In re
Grand Jury Subpoenas, 
454 F.3d 511, 523
 (6th Cir. 2006) (observing that if the filter team
has too many connections with the prosecution team, it compounds the appearance that
“the government’s fox is left in charge of the [law firm’s] henhouse”); Baltimore Law Firm,
942 F.3d at 182
 (rejecting filter team procedures where the filter team “includes
prosecutors employed in the same judicial district where Law Firm clients ‘are being
investigated by, or are being prosecuted by’ ” the same prosecutor’s office).
23
        Cf. In re Search of Elec. Commc’ns in the Acct. of [email protected] at
Internet Serv. Provider Google, Inc., 
802 F.3d 516, 530
 (3d Cir. 2015) (reprimanding
prosecutors where they “include[d] a non-attorney federal agent at the first level of review,
followed by review by independent attorney federal agents” because “first level of
privilege review should be conducted by an independent . . . attorney”); see also Baltimore
Law Firm, 
942 F.3d at 177
 (remanding for greater privilege protections where “the
[privilege protocol] authorized paralegals and IRS and DEA agents to designate seized
documents as nonprivileged”).
24
        Law enforcement does not need a court’s permission to review documents if it is
satisfied that it has obtained clear, adequate waiver of both the attorney-client privilege and


                                              55
               at 410 (“When facts are presented upon which the claimed privilege rests, it

               then becomes necessary for the court to determine whether the privilege

               exists much the same as in the determination of other fact issues.” (emphasis

               added) (internal quotation marks omitted) (quoting Brown, 62 N.W.2d at

               701)). 25

         Third, the State should take precautions regarding data access and retention for

evidence obtained in the search of a law office. For instance, Amicus Tony Webster rightly

points out that law enforcement data breaches do happen. See Tony Webster, Personal

information of Minnesota law enforcement, critical infrastructure personnel published

online      after   massive     hack,    Minnesota       Reformer      (July    10,     2020),

https://minnesotareformer.com/2020/07/10/personal-information-of-minnesota-law-

enforcement-critical-infrastructure-personnel-published-online-after-massive-hack/ (last

visited Apr. 5, 2024) [opinion attachment]. The record does not reveal any information

about security practices for McNeilly’s data. We do not know if the data was segregated




the work-product doctrine. Law enforcement should be cautious, however, because this
court has not had opportunity to rule upon the sufficiency of a waiver of work-product
doctrine, especially where a client has waived the doctrine and her attorney has not. If the
court later determines that waiver was not sufficient, the government risks exclusion of all
fruits from the search.
25
       Cf. United States v. Vepuri, 
585 F. Supp. 3d 760
, 764 (E.D. Pa. 2021) (stating that
“[t]he authority to determine issues of privilege belongs to the courts and the courts alone”
because to allow the State to make final privilege determinations would “undermine[] the
separation of powers and vitiate[] significant interests of the defendant”); Baltimore Law
Firm, 
942 F.3d at 176
 (stating that “a court is not entitled to delegate its judicial power and
related functions to the executive branch, especially when the executive branch is an
interested party in the pending dispute”).

                                              56
from other cases or if law enforcement would know whether there was an intrusion upon

the information or the identity of the intruder. In the event of a data breach (i.e., the

unauthorized acquisition or release of personally identifying information), the State must

inform the attorney-defendant.

       If these procedures are not followed, the district court, on motion made by the

attorney-defendant or one of her clients, may exclude from evidence any documents or

objects obtained in or derived from the search, including non-privileged documents. In

exercising this remedial power, the district court retains discretion to deny the exclusion of

evidence that is not protected by the attorney-client privilege or work-product doctrine if

the court finds after considering the totality of the circumstances that the State’s violation

of the procedures we announce today was not substantial. See Scales, 
518 N.W.2d at 592

(stating that “suppression will be required of any statements obtained in violation of the

recording requirement if the violation is deemed ‘substantial’ ”). But as in Scales, “[i]f the

court finds a violation not to be substantial, it shall set forth its reason for such finding.”

Id.

       The rule and remedy we announce today will apply prospectively to searches

conducted after the date of the filing of this opinion. We do not apply these new rules to

this case because the remedy—suppression of evidence obtained in the search—would not

change the outcome. See supra at section II.B. We do not need to decide today whether

the harmless error or constitutional harmless-error test applies to these new rules because,

as explained above in section II.B, the outcome would not change even under the higher,

constitutional standard.


                                              57
                                      CONCLUSION

       For the foregoing reasons, we affirm the decision of the court of appeals.

       Affirmed.



       PROCACCINI, J., not having been a member of this court at the time of submission,

took no part in the consideration or decision of this case.




                                             58

CONCURRENCE

ANDERSON, Justice (concurring).

       I concur. I write separately to note the undecided constitutionality of taint teams in

Minnesota. See State v. Flowers, 
986 N.W.2d 686
, 691 n.5 (Minn. 2023) (expressing no

opinion on the constitutionality of taint teams generally because the issue was not raised

by the parties). I would reiterate here our observation in Flowers: that federal courts have

expressed reservations about leaving “the government’s fox . . . in charge of the appellants’

henhouse.” 
Id.
 (quoting In re Grand Jury Subpoenas, 
454 F.3d 511, 523
 (6th Cir. 2006))

(internal quotation marks omitted). In 2019, for example, the United States Court of

Appeals for the Fourth Circuit concluded that taint teams violated the separation of powers

because “a court simply cannot delegate its responsibility to decide privilege issues to

another government branch.” In re Search Warrant Issued June 13, 2019, 
942 F.3d 159, 177
 (4th Cir. 2019).

       Although the constitutionality of taint teams is an important issue, it is neither

argued nor decided here. But given the scrutiny of this practice from other courts, our

supervisory directions as to the outer bounds of permissible taint team procedure should

not be construed as a tacit endorsement of the constitutionality of taint teams generally.

See In re Search of Elec. Commc’ns in the Acct. of [email protected] at Internet

Serv. Provider Google, Inc., 
802 F.3d 516
, 530 n.53 (3d Cir. 2015) (establishing certain

restrictions on the use of taint teams despite the case presenting “no occasion to consider

the appropriate limits, if any” on the use of taint teams generally).




                                             C-1
THISSEN, Justice (concurring).

      I join in the concurrence of Justice Anderson.




                                          C-2
                                   e47ÿ1fÿ7e73ÿ53g4116                            h
  0123456357ÿ9ÿ1 7 
  ÿÿÿÿ
  ÿÿ
  !ÿ! "#$ÿÿÿ%
  #&
  '()ÿ+,-.ÿ0123+14ÿ5ÿ678(ÿ9:;ÿ<:<:ÿ=)=>ÿ?@
   A ÿC ÿD ÿE ÿF ÿG




HÿIJKÿLMNKOÿLPÿQJKÿ@RSSKOLQTÿ'UVKTUÿLPÿWVRXRSTYÿZ[[VKJKSORLS;ÿLSKÿLPÿQJKÿT\KSNRKOÿRS]LY]K^ÿRS
QJKÿ_VKTNJÿ̀?JLQLÿ_aÿILSaÿbK_OQKVc@RSSKOLQTÿdKPLVXKV`
0 19237ÿ352ÿ678991ÿ52 92ÿ2282ÿ37ÿ78
                 0123ÿ5678069
                     ÿÿÿÿÿÿ ÿÿ! ÿÿ" 
                 # $ÿ%ÿ&% ÿ' ÿ()*+ÿ&ÿ#ÿ&  ,$ÿ-!ÿ%ÿ
                 % ./%/%. ÿ,$$
                 0123ÿ5210ÿ678912

96:;06<ÿ2658



=>??@ABCDÿF@GHIJ>KD?Aÿ>?CLBMHK@           b@N>AJDCHL@ÿKB?A>M@L>?NÿHGcdLB?CÿADJ@A
J@N>AJDC>B?ÿ>?AG>L@MÿIOÿCP@Q              CDeÿIL@DfÿdBLQ
RSÿTUFVWXYZU[FÿV\]F^U^=                   RSÿ=VTU[bb[ÿ]FVggVXU
-ÿ_ÿ̀()(a                             -ÿaÿ̀()(a
 ^ÿhYiF\^bÿYgÿXU[ÿgF[[ÿZ[YZb[ÿYgÿ=V\\[WYX^
123456758ÿ44                                                         0




                  ÿÿÿÿÿÿÿ




                   !                          "                  #
                     $ÿ&'(()*+,-ÿ.)/+01)02ÿ3435
                               678984



                :;<;=:ÿ?=@:ABBC
               D<EAFÿD=<AG=::FÿDA==F


Reference

Cited By
1 case
Status
Published
Syllabus
1. Search warrants authorizing seizure and search of electronic devices were sufficiently particular under the Fourth Amendment to the United States Constitution and Article I, Section 10, of the Minnesota Constitution. 2. The guilty verdict in this case was surely unattributable to the evidence obtained from the search of a law office and so we need not decide whether the warrants to search that law office were executed in an unreasonable manner because any error in the evidence's admission was harmless beyond a reasonable doubt. 3. When searching the law office of an attorney who is suspected of a crime, specific procedures to safeguard privileged materials are required under the supervisory powers of the Minnesota Supreme Court. Affirmed.