United States v. Tompkins
United States v. Tompkins
Opinion
22-599-cr (L) United States v. Tompkins
UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT
August Term 2024
(Argued: December 1, 2023 Decided: September 23, 2024)
Nos. 22-599-cr (L), 22-602-cr (Con)
––––––––––––––––––––––––––––––––––––
UNITED STATES OF AMERICA,
Appellee,
-v.-
ERIC TOMPKINS,
Defendant-Appellant.
––––––––––––––––––––––––––––––––––––
Before: LIVINGSTON, Chief Judge, MENASHI, and KAHN, Circuit Judges.
Defendant-Appellant Eric Tompkins appeals from a judgment of the United States District Court for the Northern District of New York (Thomas J. McAvoy, District Judge), convicting him, upon entry of a conditional plea preserving a Fourth Amendment issue, of failing to register as a sex offender in violation of
18 U.S.C. § 2250(a), and of possessing child pornography in violation of 18 U.S.C. §§ 2252A(a)(5)(B) and 2252A(b)(2). Tompkins argues that the district court should have suppressed images of child pornography found on a SanDisk flash memory card (“SD card”) inserted into the back of his Samsung cellular phone because the search warrant that authorized the search of his phone did not
1 separately identify the SD card as a place to be searched. We disagree. The warrant authorized a search of the cellular phone for the purpose of recovering specified information, in whatever form and by whatever means that information was created or stored, including any form of electronic storage. We conclude that the search of the SD card—which is itself a form of electronic storage and which was inserted into the cellular phone and attached to it—fell within the scope of the search warrant. Accordingly, we affirm the judgment of the district court.
AFFIRMED.
FOR APPELLEE: PAUL D. SILVER, Assistant United States Attorney, on behalf of Carla B. Freedman, United States Attorney for the Northern District of New York, for United States of America.
FOR DEFENDANT-APPELLANT: DANIEL M. PEREZ, Law Offices of Daniel M. Perez, Newton, N.J., for Eric Tompkins.
DEBRA ANN LIVINGSTON, Chief Judge:
Defendant-Appellant Eric Tompkins appeals from a March 16, 2022
judgment of the United States District Court for the Northern District of New York
(McAvoy, J.), convicting him, upon entry of a conditional plea preserving the
instant Fourth Amendment issue, of failing to register as a sex offender in violation
of
18 U.S.C. § 2250(a), and of possessing child pornography in violation of 18
U.S.C. §§ 2252A(a)(5)(B) and 2252A(b)(2). Tompkins was sentenced principally
to a 120-month term of imprisonment for his possession of child pornography, to
2 run concurrently with a 41-month term imposed for his failure to register as a sex
offender.
On appeal, Tompkins challenges the district court’s denial of his motion to
suppress digital images of child pornography that the government discovered
while examining a SanDisk Micro Secure Digital Card (“SD card”) that was
inserted into the slot for it inside Tompkins’s Samsung cellular phone. Four
images were initially discovered on the SD card during a search conducted
pursuant to a warrant that authorized search of the cellular phone for evidence
related to Tompkins’s failure to register. Upon discovery of these images,
investigators ceased their search and obtained a second search warrant for
evidence related to the possession, receipt and distribution, and transportation of
child pornography. This second warrant separately identified the phone and the
SD card as property to be searched. A second search revealed over two dozen
additional images of child pornography on the SD card.
Tompkins argues that because the first search warrant did not specify the
SD card as a subject device, the government lacked authorization to examine it
during the initial search, tainting the subsequent search as well. We disagree.
The first search warrant expressly authorized a search of the cellular phone for the
3 purpose of locating information evidencing Tompkins’s failure to register, “in
whatever form and by whatever means . . . created or stored, including any form
of computer or electronic storage (such as flash memory or other media that can
store data) . . . .” App’x 53. The warrant thus clearly authorized the search of
an SD card—which is itself a form of electronic storage—inserted into the cellular
phone and attached to it. Concluding that Tompkins’s arguments on appeal are
without merit, we AFFIRM the district court judgment.
BACKGROUND 1
I. Tompkins’s Failure to Register
In October 2018, the United States Marshals Service (“USMS”) opened an
investigation based on employment records indicating that Tompkins had been
working in New York State since at least 2017 but had failed to register as a sex
offender. Tompkins had been convicted in Washington State in 2009 of engaging
in sexual contact with a person between the age of fourteen and sixteen years old.
As part of his sentence, he was required to register as a sex offender and to update
his registration within 10 days of establishing residence or employment in another
1 Unless otherwise indicated, the factual background presented here is derived principally from: (1) undisputed facts from the record of proceedings on the motion to suppress; (2) the district court’s factual findings; and (3) the April 19 and August 14, 2019 search warrants and accompanying affidavits.
4 state. Tompkins complied with these requirements in the years immediately
following his conviction, but the local sheriff’s office in Washington State
thereafter had difficulty locating him. In August 2016, Washington State officials
learned that Tompkins was no longer residing at his registered address. Between
August 2016 and February 2017, Tompkins’s whereabouts remained unknown
and a warrant issued for his arrest. Employment records subsequently showed
that Tompkins had obtained work first at a car wash in Saratoga Springs, New
York in February 2017, and then at a fast-food restaurant in Clifton Park, New
York in January 2018. In each instance, Tompkins’s employment records
indicated that he resided in Clifton Park, New York, but a records search
performed by investigators with the New York State Division of Criminal Justice
Services showed that Tompkins had not registered as a sex offender in New York
State.
On March 18, 2019, Magistrate Judge Daniel J. Stewart in the Northern
District of New York issued a warrant for Tompkins’s arrest for his failure to
register and update his sex offender registration as required by the Sex Offender
Registration and Notification Act (“SORNA”),
18 U.S.C. § 2250(a). Tompkins
was arrested on March 28, 2019 at his then-residence in Corinth, New York. After
5 his arrest, Tompkins admitted that he had not registered but claimed he did not
know he was required to do so.
II. Discovery of Child Pornography on Tompkins’s Device
United States Deputy Marshal Robert Imburgio seized a Samsung model
SM-J336AZ cellular phone from Tompkins at the time of his arrest. On April 19,
2019, Deputy Marshal Imburgio applied for a search warrant to conduct a forensic
examination of the phone for the purpose of “extract[ing] . . . electronically stored
information” related to Tompkins’s failure to register in violation of
18 U.S.C. § 2250(a). App’x 36, 38, 53. In support of the application, Deputy Marshal
Imburgio submitted an affidavit describing the subject device, the factual basis for
probable cause to believe evidence of failure to register would be found on
Tompkins’s cellular phone, and the process by which forensic examination of
electronic storage media is conducted.
The subject property is described in Attachment A of the warrant as follows:
The property to be searched is a Samsung Model SM-J336AZ cell phone bearing serial number R28K53A6L4T currently located in the United States Marshals Service evidence locker located in Albany New York (hereinafter the SUBJECT DEVICE).
App’x 52. Attachment A further describes the scope and intended purpose of the
search, providing that:
6 This warrant authorizes the forensic examination of the SUBJECT DEVICE for the purpose of identifying the electronically stored information described in Attachment B.
Id.Attachment B lists distinct types of information that law enforcement
expected to obtain from the search, including records indicating Tompkins’s
“location and residence, including [in] photographs,” “employment information,”
“registration as a sex offender, . . . in New York and Washington,” and
“Tompkins’[s] state of mind” relating to the suspected SORNA violation. 2 App’x
53. Attachment B further defines the terms “records” and “information” to
include:
[A]ll of the foregoing items of evidence in whatever form and by whatever means they may have been created or stored, including any form of computer or electronic storage (such as flash memory or other media that can store data) and any photographic form.
Id.2 Deputy Marshal Imburgio summarized the probable cause to believe such evidence would be found on Tompkins’s cellular phone in his supporting affidavit, in which he described Tompkins’s prior conviction for Child Molestation in the Third Degree in Washington, his later evasion of local authorities, and his presence in New York State without having updated his sex offender registration, as required by law. The affidavit highlights a “selfie” photograph that was posted on Tompkins’s Facebook account, which depicted him “in front of what appear[ed] to be a residence where he was staying . . . in Clifton Park, New York.” App’x 43. The “selfie” reportedly resembled “the type that are typically taken using a cell phone.”
Id.7 Based on the warrant application and supporting affidavit, Magistrate
Judge Stewart signed and issued the search warrant. Shortly thereafter, USMS
transferred possession of the cellular phone to the Computer Crimes Unit (“CCU”)
of the New York State Police and requested a forensic examination. Deputy
Marshal Imburgio informed the CCU that the Samsung cellular phone was
protected by a PIN code that he did not have. Between June 4, 2019 and June 9,
2019, CCU investigators attempted to forensically examine the cellular phone but
were unsuccessful at unlocking it without the PIN code. However, CCU
Investigator Peter Kozel was able to examine a SanDisk Micro SD card that was
located within and attached to the phone in an SD port just above the battery
holder. 3 While searching its contents, Investigator Kozel observed at least four
images in the SD card’s deleted memory space that depicted the sexual
exploitation of minors. After discovering these images, Investigator Kozel
ceased further review of the SD card and reported his findings to Deputy Marshal
Imburgio.
3 As noted by the district court, when the back cover is removed from Tompkins’s cellular phone, the SD Card, inserted within the phone into its SD port, is visible.
8 On August 14, 2019, Special Agent Brian Seymour of the Federal Bureau of
Investigation applied to Magistrate Judge Stewart for a second warrant to search
the cellular phone and SD card, this time for “electronically stored information”
related to the possession of child pornography, its receipt and distribution, and
the transportation of child pornography, in violation of 18 U.S.C.
§§ 2252A(a)(5)(B), 2252A(a)(2)(A), and 2252(a)(1). App’x 62, 80. In a section
entitled “Identification of the Device to Be Examined,” Special Agent Seymour
wrote:
a. a Samsung model SM-J336AZ (Galaxy J3 Neo), IMEI: 355269091218588, and serial number R28K53A6L4T that was manufactured in China (“SUBJECT PHONE”); and
b. a SanDisk Micro SD XC I card bearing serial number 88460VJG50FF, that was attached to the Samsung phone (“SUBJECT CARD”).
App’x 63. Special Agent Seymour’s affidavit states that Magistrate Judge Stewart
had previously “issued a search warrant for the SUBJECT DEVICE (inclusive of
the SUBJECT PHONE and SUBJECT CARD), to search for information” related to
Tompkins’s failure to register. 4 App’x 65. He described Investigator Kozel’s
discovery of the four images on the SD card, which provided the basis for probable
4 Special Agent Seymour attached the first search warrant as an exhibit to his application for the second warrant.
9 cause to believe additional evidence of child pornography offenses would be
uncovered through the forensic examination of the cellular phone and its
associated SD card.
Magistrate Judge Stewart issued the second warrant on August 14, 2019.
Investigator Kozel undertook a second forensic search of the cellular phone and
its associated SD card in reliance on the August 2019 warrant. This search
revealed twenty-six images of child pornography on the SD card.
A grand jury had indicted Tompkins on April 25, 2019, on one count of
failing to register and update his registration as required by SORNA. Indictment,
United States v. Tompkins, No. 1:19-cr-165, Dkt. 9 (“SORNA Indictment”). A
separate grand jury indicted him on January 30, 2020, on one additional count of
possession of child pornography in violation of 18 U.S.C. §§ 2252A(a)(5)(B) and
2252A(b)(2). Indictment, United States v. Tompkins, No. 20-cr-037, Dkt. 1 (“CP
Indictment”).
II. Procedural History
A. Motion to Suppress
Before the district court, Tompkins moved to suppress the images of child
pornography located on the SD card, contending that Attachment A of the April
10 2019 warrant “only [authorized] the search of the phone itself” and not the SD card
contained within it. App’x 23. He further argued that because the decision by
law enforcement to search the SD card constituted a “blatant disregard” of the
parameters of the first search warrant, all evidence discovered during the second
warrant-based search should also be suppressed, given that the second warrant
relied solely on “tainted evidence” as the basis for probable cause. App’x 28-29.
In addition, Tompkins argued that the August 2019 search warrant application, by
specifically referencing the SD card in its identification of the device to be
examined, demonstrated that “law enforcement was aware that the April warrant
was deficient for failing to name the SanDisk Micro SD Card as a place to be
searched.” App’x 30. In such circumstances, Tompkins contended, the good
faith exception was inapplicable. Id.
District Judge Thomas McAvoy conducted an evidentiary hearing to
determine whether Tompkins’s motion to suppress should be granted.
Investigator Kozel, who by then had retired from the CCU, was the principal
witness. 5
5 Deputy Marshal Imburgio testified regarding the process by which he procured the April 2019 search warrant and how the cellular phone was stored and transferred to CCU. Special Agent Seymour was present to testify. However, he was not called to testify after Tompkins made clear that he was not asserting that “the second search
11 Investigator Kozel testified that he served in the CCU for nearly 13 years,
during which time he received “over 3,600 hours” of specialized training in digital
forensics, obtained a Master of Science degree in forensic computing and
cybercrime investigation, and examined “around 600 cellular phones” in
connection with various investigations. App’x 99:4:16–17; App’x 100:5:1–14;
App’x 101:12:7–9. He stated that “between 25 and 50 percent” of the cellular
phones that he examined during this time contained SD cards. App’x 101:12:10–
13.
An SD card, Investigator Kozel testified, is “a type of flash media” and flash
media is a “type of storage” on an electronic device. App’x 100:6:1–12. The
purpose of an SD card, he continued, is “typically [to provide] additional storage
[space]” to the cellular phone. App’x 100:6:15–16. The cellular phone will
“install . . . its own file system so that it can utilize the [SD card]” as soon as the SD
card is inserted. App’x 100:6:19–22. The phone’s utilization of a given SD card
is thereafter affected by user preferences: “The operating system may ask if [a user]
want[s] to store [their] pictures there, . . . as opposed to [in] the internal memory
warrant was done in bad faith,” and that he had referenced the warrant’s explicit inclusion of the SD card in its definition of the devices to be searched simply to show that the government “recognized there was a problem with the first search warrant.” App’x 114.
12 of the phone.” App’x 100:6:23–25. In that way, a cellular phone
“communicat[es]” with the SD card, such that the SD card “become[s] an extension
of [the cellular] device” once inserted. App’x 100:7:11–15; App’x 100:8:24–
101:9:1.
After providing additional background information on the function and
role of an SD card in a cellular phone, Investigator Kozel testified about his initial
examination of the Samsung cellular phone in this case. Investigator Kozel stated
that the Samsung cellular phone was protected by a PIN code, and that despite
checking with the lab for tools to bypass the code, he was unsuccessful. Thus, he
“moved on” to the pieces that he could analyze, which included the inserted SD
card. App’x 103:20:1–4. He had previously testified that the April 2019 warrant
“appeared very clear.” App’x 103:18:1. Acknowledging that the search warrant
did not specifically identify the SD card as a subject device, App’x 103:18:8–10,
Investigator Kozel explained that the SD card was “part of the overall device,”
App’x 105:25:14, because it was “durably attached” to the cell phone, App’x
105:25:19, and that evidence of a SORNA violation “could be potentially found on
any part of th[e cellular] device,” App’x 105:27:8–9.
13 Tompkins’s defense counsel cross-examined Investigator Kozel on his belief
that the search warrant authorized his search of the SD card. Asked whether he
had seen search warrants for computers that separately identified media storage
devices as components to be searched, Investigator Kozel responded,
“[s]ometimes, yes.” App’x 107:33:4–8. He clarified that this was not a
“standard” practice across federal agencies because “all [search warrants are]
written a little differently,” and “do not all look alike” or “use the same wording.”
App’x 107:33:9–20. For that reason, Investigator Kozel affirmed, it was not
“unusual” that the second warrant application, submitted by the FBI, separately
listed the SD card as subject property to be searched. App’x 107:34:6–9 (affirming
that “[d]ifferent agencies do different things in their description in the search
warrant”).
The defense next probed Investigator Kozel on his reliance on the April 2019
warrant, asking whether, in his opinion, the warrant authorized a search of the SD
card. To that, Investigator Kozel responded: “It authorizes me to search the
Samsung phone, which is all inclusive,” and that based on his experience “[i]t’s
standard, standard practice that everything in a device is part of that device unless
it’s found separately.” App’x 108:37:13–14,18–20. Such an approach would
14 hold, he testified, even if items within the device, “such as batteries, SIM cards,
and network connecting devices,” were removed and arrived to him in the same
evidence bag. App’x 108:38:1–10. “The only exception would be if it was
obviously a disparate type of device,” like if “[there was] a hard drive with a
cellphone,” since a hard drive “obviously doesn’t fit in the cellphone.” App’x
108:38:24–108:39:5 (explaining, in that circumstance, that he “would not say that
[the hard drive is] a cellphone”).
B. The District Court’s Order
On January 28, 2021, the district court issued an order denying Tompkins’s
motion to suppress the evidence found on the SD card. The court declined to
reach the question whether the April 2019 warrant authorized a search of the SD
card. Instead, the district court, crediting Investigator Kozel’s “understanding
based upon his experience, training, and education that an SD card attached to a
cellular phone is part of the data storage capabilities of that phone,” determined
that “it was objectively reasonable” for Investigator Kozel to “‘move on’ to a
forensic examination of the SD [c]ard” once he determined that he could not access
the phone itself. App’x 158. The district court found that “Investigator Kozel
acted in good faith reliance upon his understanding of what constitutes the
15 component parts of a cellular phone and the data storage capabilities of such a
device with an attached SD card.” Id. Therefore, “the good faith exception to
the exclusionary rule” was applicable. App’x 159.
Tompkins thereafter pleaded guilty to possessing child pornography in
violation of 18 U.S.C. §§ 2252A(a)(5)(B) and 2252A(b)(2), reserving the right to seek
appellate review of the district court’s denial of his motion to suppress pursuant
to Federal Rule of Criminal Procedure 11(a)(2). 6 This appeal followed
Tompkins’s sentencing on March 16, 2022.
DISCUSSION
The district court denied Tompkins’s motion to suppress without reaching
the question whether the April 2019 warrant authorized Investigator Kozel’s
search of the SD card on the ground that the Investigator’s reliance on that warrant
was objectively reasonable and that the good faith exception to the exclusionary
rule applied. We affirm on the alternative ground that Investigator Kozel’s
search of the SD card was fully consistent with the Fourth Amendment—that the
forensic examination of the SD card fell within the scope of the April 2019 warrant,
which properly authorized it. Neither Investigator Kozel’s examination of the
6 Tompkins had pleaded guilty to the SORNA violation in September 2019.
16 SD card for evidence of Tompkins’s failure to register nor his discovery of the four
images of child pornography that resulted in law enforcement obtaining and
executing the August 2019 warrant violated the Fourth Amendment.
Accordingly, Tompkins’s motion to suppress was properly denied.
* * *
The Warrant Clause of the Fourth Amendment prohibits any warrant from
issuing that fails to “particularly describe[] the place to be searched, and the
persons or things to be seized.” U.S. CONST. AMEND. IV. As we previously
summarized in United States v. Galpin, this so-called “particularity requirement”
contains three parts. “First, a warrant must identify the specific offense for which
the police have established probable cause. . . . Second, a warrant must describe
the place to be searched. . . . Third, the warrant must specify the ‘items to be seized
by their relation to designated crimes.’” United States v. Galpin,
720 F.3d 436, 445-
46 (2d Cir. 2013) (internal citations omitted).
We have repeatedly affirmed that a warrant passes constitutional muster as
to the description of the place to be searched when the description defines the
search location with practical accuracy rather than absolute precision. See Nat’l
City Trading Corp. v. United States,
635 F.2d 1020, 1024 (2d Cir. 1980) (“[W]e are
17 concerned primarily with the ‘practical accuracy’ of the description of the premises
to be searched.”) (quoting United States v. Fitzmaurice,
45 F.2d 133, 135(2d Cir.
1930)); Fitzmaurice,
45 F.2d at 135(noting that “the description of the premises need
only define the search with practical accuracy”); see also United States v.
Voustianiouk,
685 F.3d 206, 211(2d Cir. 2012) (“It is long-established that ‘[i]t is
enough if the description is such that the officer with a search warrant can, with
reasonable effort ascertain and identify the place intended.’”) (quoting Steele v.
United States,
267 U.S. 498, 503(1925)). In the context of electronic device
searches, we have previously observed that digital information is “not maintained,
like files in a file cabinet, in discrete physical locations,” but instead is often
“‘fragmented’ on a storage device, potentially across physical locations.” United
States v. Ganias,
824 F.3d 199, 213(2d Cir. 2016) (en banc). We have also noted
that “[t]he Fourth Amendment does not require [that search warrants include] a
perfect description of the data to be searched and seized,” including search
warrants for digital data. United States v. Ulbricht,
858 F.3d 71, 100(2d Cir. 2017),
abrogated on other grounds by Carpenter v. United States,
585 U.S. 296(2018). Our
focus on practical accuracy, as opposed to technical precision, thus extends to
warrants authorizing the search of electronic devices. Accord United States v. Ivey,
18
91 F.4th 915, 918(8th Cir. 2024) (holding that a warrant to search anywhere in a
defendant’s cell phone for evidence related to firearms possession satisfied the
particularity requirement because “the [particularity] requirement is one of
‘practical accuracy rather than a hypertechnical one’”); United States v. Palms,
21 F.4th 689, 698(10th Cir. 2021) (finding that a warrant for “all digital evidence” of
human trafficking in a defendant’s devices was sufficiently particular because
“practical accuracy rather than technical precision controls the determination of
whether a search warrant adequately describes the place to be searched”); see also
United States v. Blakeney,
949 F.3d 851, 862(4th Cir. 2020) (“When it comes to
particularity, we construe search warrants in a ‘commonsense and realistic’
manner, avoiding a ‘hypertechnical’ reading of their terms.”); United States v.
Bradley,
644 F.3d 1213, 1259(11th Cir. 2011) (stating that the particularity
“requirement does not necessitate technical perfection; instead, it is applied with
‘a practical margin of flexibility.’”).
Tompkins argues that the April 2019 warrant did not authorize the search
of the SD card inserted into his Samsung cellular phone because the warrant did
not specifically reference the SD card as subject property in Attachment A.
Instead, Attachment A states that “[t]he property to be searched is a Samsung
19 Model SM-J336AZ cell phone bearing serial number R28K53A6L4T currently
located in the United States Marshals Service evidence locker located in Albany
New York (hereinafter the SUBJECT DEVICE).” App’x 34. Tompkins contends
that because the SD card has its own serial number, can be removed from the
cellular phone, and can operate independently of it, the SD card is a separate
device beyond the scope of the April 2019 warrant. For the following reasons, we
disagree.
“We ‘look directly to the text of the search warrant to determine the
permissible scope of an authorized search.’” United States v. Johnson,
93 F.4th 605, 613(2d Cir. 2024) (quoting United States v. Bershchansky,
788 F.3d 102, 111(2d Cir.
2015)). Here, Attachment A specifically states that “[t]his warrant authorizes the
forensic examination” of the referenced phone “for the purpose of identifying the
electronically stored information described in Attachment B.” App’x 34. And
Attachment B, in turn, specifies not only the type of digital information sought but
also that such information includes “all of the foregoing items of evidence in
whatever form and by whatever means they may have been created or stored,
including any form of computer or electronic storage (such as flash memory or other media
that can store data) and any photographic form.” App’x at 35 (emphasis added).
20 This language clearly encompasses the forensic examination of information
stored not only in the cellular phone itself, but also in the SD card that was found
inserted into the phone when the phone’s back cover was removed. As the Ninth
Circuit has noted in a different context, “SD cards are the dominant form of flash
memory card on the market, and are widely used in cellular phones, digital
cameras, audio players, and other forms of mobile electronics” to augment the
storage capacity of these devices. Samsung Elecs. Co., Ltd. v. Panasonic Corp.,
747 F.3d 1199, 1201(9th Cir. 2014). See also United States v. Orzco,
41 F.4th 403, 406 n.3
(4th Cir. 2022) (“A micro-SD card [operates as] an external storage device used to
augment the storage of or transfer files between electronic devices such as
cellphones and tablets.”). Thus, by using the terms “electronic storage,” “flash
memory,” and “other media” to describe the form in which a cellular phone may
“create[] or store[]” electronic information, the search warrant contemplated a
search of not only the phone itself, but any SD card inserted into it. See United
States v. Simpson,
152 F.3d 1241, 1248(10th Cir. 1998) (recognizing “no authority
finding that computer disks and hard drives are closed containers somehow
separate from the computers themselves”).
21 Tompkins attempts to avoid this conclusion by relying on our observation
in United States v. Galpin,
720 F.3d 436, 447(2d Cir. 2013), that there is a “heightened
sensitivity to the particularity requirement in the context of digital searches.” Br.
of Defendant-Appellant Tompkins at 31-32. This effort is unavailing. The
warrant in Galpin was deemed facially overbroad because, inter alia, it purported
to authorize a search of Galpin’s electronic equipment for evidence of any
violations of “‘NYS Penal Law and or Federal Statutes.’” Galpin,
720 F.3d at 447.
See also United States v. Rosa,
626 F.3d 56, 62(2d Cir. 2010) (noting infirmity in a
warrant that failed to provide “guidance as to the type of evidence sought” by
purporting to authorize seizure of electronic equipment without specification of
legal violation). And to the extent the Galpin warrant authorized a search of such
equipment for evidence of violation of a specific offense, it failed to “describe with
adequate particularity the ‘items to be seized by their relation to designated
crimes.’” Galpin,
720 F.3d at 450(emphasis omitted) (quoting United States v.
Williams,
592 F.3d 511, 519(4th Cir. 2010)).
The April 2019 warrant suffers from no such infirmities. It specifies that
forensic examination of the cellular phone and any associated electronic storage is
authorized for the purpose of identifying digital information evidencing a specific
22 offense—namely, Tompkins’s SORNA violation. 7 The warrant further
particularizes the type of evidence sought: specifying, for instance, evidence
indicating Tompkins’s location and residence; his employment; and his
registration as a sex offender. True, the April 2019 warrant broadly authorizes
the search of Tompkins’s entire phone and any storage devices attached to it. But
as we have said before, “a search warrant does not necessarily lack particularity
simply because it is broad. . . . [S]earches of computers may sometimes need to be
as broad as searches of residences pursuant to warrants.” Ulbricht,
858 F.3d at 100. See also Johnson,
93 F.4th at 615(noting that “so long as a warrant seeking
digital evidence is sufficiently particular,” it may properly seek a broad range of
potentially relevant material); United States v. Purcell,
967 F.3d 159, 181(2d Cir.
2020) (“[W]arrants which authorize broad searches of both digital and non-digital
locations may be constitutional, so long as probable cause supports the belief that
the location to be searched . . . contains extensive evidence of suspected crimes.”).
7 Tompkins does not challenge the probable cause set forth in Deputy Marshal Imburgio’s affidavit that evidence of Tompkins’s commission of this offense would likely be found in the course of this forensic examination. Tompkins argues, however, that there was only a “tenuous” showing of probable cause and that we should take this into account in considering the “totality of the circumstances.” Br. of Defendant-Appellant Tompkins at 40-41. But Tompkins cites no authority for the proposition that the Fourth Amendment’s particularity requirement is subject to a totality of the circumstances analysis that takes into account the strength of the showing of probable cause.
23 The district court found the preceding analysis, along with Investigator
Kozel’s testimony, compelling evidence that the particularity requirement had not
been violated in this case. Yet, the court hesitated to reach this conclusion
because the FBI separately identified the SD card and the cellular phone in the
August 2019 warrant application to authorize a search for evidence of child
pornography offenses. Specifically, the court said that the second warrant
“provides some indication of a policy or practice . . . to separately identify cellular
phones and SD cards in search warrant applications, at least where it is evident
that an SD card is inserted into a cellular phone.” App’x 155. But as already
stated, we look to “the text of the search warrant to determine the permissible
scope of an authorized search.” Johnson,
93 F.4th at 613(quoting Bershchansky,
788 F.3d at 111). And the sufficiency of a warrant’s description of the places to
be searched does not depend on the policies or practices of different government
agencies. The fact that the FBI specifically referenced the SD card in the August
2019 warrant application—after the SD card was clearly known to exist, to have
been removed from the cellular phone, and to contain images of child
pornography—does not undercut the language in the April 2019 warrant
24 authorizing the search of any electronic storage, including flash memory,
discovered during the forensic examination of the phone. 8
Tompkins repeatedly returns to the proposition that an SD card is a separate
device that must be specifically identified in a warrant application because it has
a “unique serial number” and is removable from a cellular phone, even if it may
also be attached to it. Br. of Defendant-Appellant Tompkins at 26, 34, 39. He
further argues that because Deputy Marshal Imburgio described wireless
telephones and “memory card[s] or other removable storage data” in different
parts of his affidavit, a removable SD card providing additional storage to a
cellular phone cannot fall within the scope of a warrant identifying the phone itself
as the subject device. Id. at 35. Again, we disagree.
8 Tompkins suggests that law enforcement agents “knew” that there was an SD card in the back of his cellular phone at the time the April 2019 warrant issued and withheld this information from the Magistrate Judge. Br. of Defendant-Appellant Tompkins at 27. But Tompkins offers no reason why the agents would have suppressed this information, since the probable cause to search his phone would have encompassed an attached SD card as well. More to the point, the district court did not find that the agents had withheld this information; it noted that the evidence presented at the hearing showed that the phone’s back cover had been removed while the phone was in the custody of the USMS, “to allow the battery to be taken out,” thus “display[ing] the SD port with the SD card inserted” but that there was “no testimony indicating that anyone at the USMS was specifically aware that the subject phone contained an SD card. . . .” App’x 155.
25 The mere fact that various components of Tompkins’s cellular phone (such
as its battery, camera, or the SD card inserted into the phone’s back) may have
their own serial numbers is not dispositive to the question whether the April 2019
search warrant authorizes their search. And the fact that an SD card can be
removed from a phone and is easily portable does not undercut that warrant’s
authorization to conduct a forensic examination of the SD card here, found
inserted into the back of Tompkins’s phone, for the purpose of locating digital
information stored in its memory relevant to Tompkins’s failure to register. See
United States v. Beckmann,
786 F.3d 672, 678(8th Cir. 2015) (concluding that consent
to search a computer was reasonably understood to encompass its external,
connected hard drive). See also United States v. Wilson,
2019 WL 4740509, at *4
(W.D. Mo. Sept. 27, 2019) (applying Beckman in holding that a search warrant for a
cellular phone was not required to specifically reference a Micro SD card inserted
into the phone because the Micro SD card “amounted to a component part of
the . . . phone”).
Finally, given the text of the warrant, it is also beside the point that Deputy
Marshal Imburgio, in outlining technical terms in his affidavit pertaining to
searches for digital information, separately discussed cellular phones and
26 removable storage media. The warrant itself, in Attachment B, authorizes search
of the phone for evidence contained in “electronic storage (such as flash memory
or other media that can store data),” which includes evidence to be found on an
SD card. See United States v. Ventresca,
380 U.S. 102, 109(1965) (“[C]ourts should
not invalidate . . . warrant[s] by interpreting . . . affidavit[s] in a hypertechnical,
rather than a commonsense, manner.”). See Voustianiouk,
685 F.3d at 211(“In
determining the permissible scope of a search that has been authorized by a search
warrant, however, we must look to the place that the magistrate judge who issued
the warrant intended to be searched.”). Deputy Marshal Imburgio’s affidavit is
not to the contrary.
* * *
In sum, we conclude that the April 2019 warrant properly authorized search
of Tompkins’s cellular phone and the SD card inserted into that phone. We have
considered Tompkins’s remaining arguments to the contrary and conclude that
they are without merit. Having determined that the government’s initial
examination of the SD card did not run afoul of the Fourth Amendment, we
discern no error in the district court’s denial of Tompkins’s motion to suppress.
Accordingly, we AFFIRM the judgment of the district court on this alternative
27 ground, without reaching Tompkins’s argument on appeal that the district court
erred in applying the good faith doctrine. See Wells Fargo Advisors, LLC v.
Sappington,
884 F.3d 392, 396 n.2 (2d Cir. 2018) (“[W]e are free to affirm on any
ground that finds support in the record, even if it was not the ground upon which
the trial court relied.”) (quoting Headley v. Tilghman,
53 F.3d 472, 476(2d Cir. 1995)).
28
Reference
- Cited By
- 1 case
- Status
- Published