UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
UNITED STATES OF AMERICA
v.
Criminal No. 11-0106
ALI MOHAMED ALI,
Defendant.
REDACTED MEMORANDUM OPINION*
Defendant Ali Mohamed Ali is charged with conspiracy, aiding and abetting, piracy, and
hostage taking as a result of the hijacking of the M/V CEC Future, a Bahamian-flagged cargo
ship owned by Clipper Group A/S, a Danish company.1 On November 7, 2008, the CEC Future
was sailing in the Gulf of Aden, off the coast of Yemen, when it was seized by Somali pirates.
The pirates forced the crew to navigate the ship to Point Raas Binna, near the Somali coast.
There, sometime on November 9 or 10, Ali boarded the ship before it sailed to waters near Eyl,
Somalia. The government alleges that while the ship was under the pirates’ control, Ali
communicated ransom demands from the pirates to Clipper. Initially, Ali communicated with
“Steven,” a negotiator hired by Clipper, but as the incident wore on, Ali began communicating
directly with Per Gullestrup, Clipper’s CEO. The government further alleges that, as Ali
negotiated a ransom of $1.7 million for the release of the ship, he also negotiated a separate
*
The Court filed this Memorandum Opinion under seal on May 25, 2012 [Dkt. No. 183] because
many of the pleadings it addressed were sealed. Based on input from the parties, the Opinion is
now being made public in redacted form. It will be released in full once trial in this matter is
underway.
1
See Second Superseding Indictment, May 8, 2012 [Dkt. No. 172] (“Ind.”).
1
Among his purported anti-piracy efforts, Ali includes his role in the CEC Future incident,
as well as in a number of other piracy incidents. In June 2008, before the CEC Future was
hijacked, Somali pirates attacked the Rockall, and took its owners, a German couple, to shore in
Somalia and held them there. (Defendant’s Motion for a Deposition Under Federal Rule of
Criminal Procedure 15, March 6, 2012 [Dkt. No. 128] (under seal), Ex. 2 at 1.) Ali was asked by
4
Conspiracy and aiding and abetting are inchoate crimes. United States v. Bailey, 444
U.S. 394, 405 (1980) (conspiracy is an “inchoate offense[]”); United States v. Seals, 130 F.3d
451, 463 (D.C. Cir. 1997) (aiding and abetting is an “inchoate offense[]”).
This is to say, that, although the law generally makes criminal only antisocial
conduct, at some point in the continuum between preparation and consummation,
the likelihood of a commission of an act is sufficiently great and the criminal
intent sufficiently well formed to justify the intervention of the criminal law.
United States v. Feola, 420 U.S. 671, 694 (1975) (citation omitted). Because of their focus on an
“agreement to engage in a criminal venture,” id.,9 “laws against conspiracy . . . criminalize
speech . . . that is intended to . . . commence illegal activities.” United States v. Williams, 553
U.S. 285, 298 (2008) (emphasis added). Where a particular kind of criminal intent is absent, so,
too, is criminal liability. The same can be said of aiding and abetting.10 Thus, under “the law of
inchoate offenses . . . a heightened mental state separates criminality itself from otherwise
innocuous behavior.” Bailey, 444 U.S. at 405.11
9
See United States v. Jimenez Recio, 537 U.S. 270, 274 (2003) (“The Court has repeatedly said
that the essence of a conspiracy is ‘an agreement to commit an unlawful act.’” (emphasis added)
(collecting cases) (quoting Iannelli v. United States, 420 U.S. 770, 777 (1975))).
10
See Ethan Preston & John Lofton, Computer Security Publications: Information Economics,
Shifting Liability and the First Amendment, 24 Whittier L. Rev. 71, 101 (2002) (“Many cases of
inchoate crimes are often or always effected through speech acts. Such crimes include
conspiracy . . . and aiding and abetting.” (internal quotation marks, alterations, citation, and
footnote omitted)); Jeremy J. Ofseyer, Taking Liberties with John Stuart Mill, 1999 Ann. Surv.
Am. L. 395, 411 (1999) (“Speech crimes include perjury and several inchoate crimes, such as
incitement, solicitation, conspiracy, and aiding and abetting.”).
11
See Ira P. Robbins, Double Inchoate Crimes, 26 Harv. J. on Legis. 1, 6–7 (1989) (Inchoate
crimes “allow the judicial system to impose criminal liability on conduct designed to culminate
in the commission of a substantive offense” and “permit[] intervention once an individual’s
actions, though not criminal in themselves, have sufficiently manifested an intent to commit a
criminal act.” (emphasis added, footnotes omitted)); David B. Filvaroff, Conspiracy and the
First Amendment, 121 U. Pa. L. Rev. 189, 194–95 (1972) (Inchoate crimes “reach[] back in time,
prior to the completion of the substantive offense, and seek[] to punish for something less than
9
Courts sometimes refer to this “heightened mental state” as one of “specific intent.” See
United States v. Moore, 651 F.3d 30, 92 (D.C. Cir. 2011) (“An aiding and abetting conviction
require[s] proof that [the defendant] had . . . the specific intent to facilitate the commission of a
crime by another.” (internal quotation marks and citation omitted)); United States v. Childress,
58 F.3d 693, 707 (D.C. Cir. 1995) (“[C]onspiracy is a ‘specific intent’ crime.”).12 Specific
intent, in turn, is described as encompassing notions of purpose. See Bailey, 444 U.S. at 405 (“In
a general sense, ‘purpose’ corresponds loosely with the common-law concept of specific
intent.”).
“‘[T]he specific intent required for the crime of conspiracy is . . . the intent to advance or
further the unlawful object of the conspiracy.’” Childress, 58 F.3d at 708 (alterations in the
original) (quoting United States v. Haldeman, 559 F.2d 31, 112 (D.C. Cir. 1976)). Accordingly,
in order to convict Ali of conspiracy, the government must prove beyond a reasonable doubt that
Ali acted with the “specific intent to further the conspiracy’s objective.” Id.
The second superseding indictment alleges that the “purpose and object” of the
conspiracy to commit piracy (Count One) was “to profit and make money by detaining the ship,
crew and cargo of the M/V CEC Future and depriving the lawful owners of control over and the
value of the ship and the cargo until ransom was paid.” (Ind. at 2.) The indictment does not
effectuation of the ultimate harm. . . . Among [these], conspiracy is most distant from the
completed harm. . . . [C]onspiracy prescribes punishment for little more than state of mind.”).
12
The term “specific intent” is not without its detractors. The Supreme Court has acknowledged
that the distinction between specific intent and general intent, while “venerable,” “has been the
source of a good deal of confusion.” Bailey, 444 U.S. at 403. Other courts and treatises have
noted that the term “‘specific intent’ [is] particularly susceptible to a wide variety of meanings.”
United States v. Starnes, 583 F.3d 196, 210 (3d Cir. 2009); see generally Wayne R. LaFave, 1
Substantive Criminal Law § 5.2(e) (2d ed. 2003). In Starnes, after examining the “‘traditional
dichotomy of general versus specific intent,’” the Third Circuit rejected it as “more perplexing
than helpful.” 583 F.3d at 209 (quoting Dixon v. United States, 548 U.S. 1, 7 (2006)).
10
specifically define the objective of the conspiracy to commit hostage taking (Count Three), but
alleges that Ali and others
did conspire and agree with one another, to seize, detain and threaten to kill, to
injure, and to continue to detain the crew of the M/V CEC Future, in order to
compel . . . Clipper Group . . . to pay a ransom, consisting of 1.7 million U.S.
dollars delivered to the ship, and a separate payment of 75,000 U.S. dollars
delivered via a wire transfer to a bank account, as an explicit condition for the
release of the M/V CEC Future, its crew and cargo.
(Ind. at 6.)
Therefore, in order to convict Ali of conspiracy, the government must establish that Ali
acted with the specific intent, or the “purposeful intent,” Childress, 58 F.3d at 707 (emphasis in
the original), to a) profit and make money by detaining the CEC Future, its crew, and its cargo,
and by depriving Clipper of control over the ship, and of the ship’s value, until ransom was paid
(Count One); and to b) compel Clipper to pay a ransom by seizing, detaining, and threatening to
kill, injure, and continue to detain the CEC Future’s crew (Count Three). (Ind. at 2, 6.) The
government bears the burden of proving beyond a reasonable doubt that Ali “consciously
desire[d] [these] result[s].” Bailey, 444 U.S. at 404 (internal quotation marks and citation
omitted); see Childress, 58 F.3d at 707–08.
Similarly, “[i]n order to aid and abet another to commit a crime it is necessary that a
defendant ‘in some sort associate himself with the venture, that he participate in it as in
something that he wishes to bring about, that he seek by his action to make it succeed.’” Nye &
Nissen v. United States, 336 U.S. 613, 619 (1949) (quoting United States v. Peoni, 100 F.2d 401,
402 (2d Cir. 1938) (Hand, J.)) (cited in Moore, 651 F.3d at 92). “All the words used” in this
definition—“even the most colorless, ‘abet’—carry an implication of purposive attitude.” Peoni,
100 F.2d at 402 (emphasis added). Therefore, in order to convict Ali of aiding and abetting
11
piracy under the law of nations (Count Two) and hostage taking (Count Four), the government
must prove that Ali acted with “the specific intent to facilitate the commission of [these] crime[s]
by []other[s].” Moore, 651 F.3d at 92 (internal quotation marks and citation omitted).
Ali argues that the evidence which the government seeks to prevent him from introducing
is directly relevant to whether he acted with these intentions onboard the CEC Future.
Specifically, he claims that evidence and of his role
in other piracy incidents both before and after the CEC Future hijacking would undercut the
government’s case as to his mens rea and further would, as to post-CEC Future events, show a
lack of consciousness of guilt.13 The government, on the other hand, characterizes such evidence
as purporting to show Ali’s “good motive,” and argues that it is irrelevant to his defense. (Gov’t
Omnibus Mot. at 4.)
Court decisions, treatises, and law reviews are rife with debates about the relationship
between specific intent and motive, and the relevance (if any) of the latter in a criminal case.14
13
The government arguably opened the door to this argument by seeking to introduce evidence
that Ali “conducted negotiations” during the piracy of the Karag l. (Gov’t Karag l Mot. at 3.)
Ali not only urged the Court to admit the Karag l evidence under Rule 404(b) (Def. Omnibus
Opp’n at 2 & n.2), but also moved to introduce evidence of his role in additional incidents of
piracy, all to negate the government’s mens rea showing. (See Def. 404(b) Mot.) This Court has
granted the government’s motion regarding the Karag l as unopposed. (See Order, April 12,
2012 [Dkt. No. 164] (under seal).) The Court addresses Ali’s Rule 404(b) motion below.
14
Compare United States v. Poindexter, 727 F. Supp. 1470, 1475 (D.D.C. 1989) (agreeing with
defendant that “absence of . . . motive would . . . refute the claim that [defendant] intentionally
entered into” the conspiracy charged in the indictment, and holding that “[e]vidence regarding
the absence of motive is usually admitted to negate specific intent”) (collecting cases), and
United States v. Richmond, 700 F.2d 1183, 1196 (8th Cir. 1983) (“good motive, by itself, is not a
defense to a crime” but “evidence relating to motive can be considered in relationship to [a
defendant’s] intent or state of mind”), abrogated on other grounds, United States v. Raether, 82
F.3d 192 (8th Cir. 1996), and United States v. Wilson, 2 F. Supp. 2d 1170, 1171 (E.D. Wis.
1998) (“‘[t]he motive of the defendant is . . . immaterial except insofar as evidence of motive
may aid in the determination of state of mind or the intent of the defendant’” (alterations in the
12
The Court need not wade into this debate, however, because on these facts, Ali has the better
argument. This is not the typical case where the criminal law finds it irrelevant that a robber
original) (quoting 1 Devitt, Blackmar, Wolff, & O’Malley, Federal Jury Practice and
Instructions § 17.06 (14th ed.))), and Elaine M. Chiu, The Challenge of Motive in the Criminal
Law, 8 Buff. Crim. L. Rev. 658, 663 (2005) (“As Jerome Hall so pithily stated in 1960, ‘[h]ardly
any part of penal law is more definitely settled than that motive is irrelevant.’ . . . Earnest
defenders of the maxim,” however, “qualify the pithy phrase: ‘The orthodox doctrine holds that
motive is irrelevant to criminal liability unless it is specifically made relevant as part of the
definition of a crime . . . .’ Although stated for the purpose of defending the irrelevance maxim,
such qualifications are basically a concession that specific intent crimes, inchoate crimes, and
[certain defenses] have long regarded the motives of a defendant in determining criminal
liability.” (footnotes omitted) (quoting Jerome Hall, General Principles of Criminal Law 88 (2d
ed. 1960)), and Guyora Binder, The Rhetoric of Motive and Intent, 6 Buff. Crim. L. Rev. 1, 48–
49 (2002) (“inchoate offenses such as attempt and conspiracy . . . criminal[ize an act] only if [it
is] committed with the . . . purpose of causing some harm” (citing Walter H. Hitchler, Motive as
an Essential Element of Crime, 35 Dick. L. Rev. 105, 111, 113–14 (1931)), with United States v.
Romano, 849 F.2d 812, 816 n.7 (3d Cir. 1988) (affirming the irrelevance of any defense based on
an intent to save lives in a case charging a defendant with conspiring to damage government
property), and United States v. Kabat, 797 F.2d 580, 588–89 (8th Cir. 1986) (evidence of motive
is irrelevant even with regard to a specific intent crime), and United States v. Martin, 740 F.2d
1352, 1360 (6th Cir. 1984) (same), and United States v. Rosado, 728 F.2d 89, 93 (2d Cir. 1984)
(describing as “erroneous” the “assumption that good motive for committing a crime is
inconsistent with criminal intent”), and United States v. Badolato, 701 F.2d 915, 921–22 (11th
Cir. 1983) (“The Government does not deny that [the defendant] is an investigative journalist
and film-maker by profession, and we are not unsympathetic to this position; however, his
argument on appeal confuses the intent to enter into an agreement to violate federal drug laws
with the purpose or goal which motivates one to enter into such an agreement. . . . What [the
defendant] hoped to achieve by entering into this agreement is of little consequence. . . .
Regardless of what the conspirator hopes to get out of it, conspiracy is a criminal act, and the
issue properly phrased is whether [defendant] knowingly and intentionally entered into it.”), and
United States v. Huet-Vaughn, 43 M.J. 105, 113–14 (C.A.A.F. 1995) (“‘A person often acts with
two or more intentions. These intentions may consist of an immediate intention (intent) and an
ulterior one (motive), as where the actor takes another’s money intending to steal it and intending
then to use it to buy food for his needy family. . . . It may be said that, so long as the defendant
has the intention required by the definition of the crime, it is immaterial that he may also have
had some other intention.’” (quoting W. LaFave & A. Scott, 1 Substantive Criminal Law § 3.5(d)
at 313 (1986))), and Michael T. Rosenberg, Note, The Continued Relevance of the Irrelevance-
of-Motive Maxim, 57 Duke L. J. 1143, 1169–70 (2008) (“Once motive is understood as
something altogether distinct from intentions, it is clear that motive is irrelevant to specific intent
crimes and inchoate crimes.” (citing Hall, General Principles, supra, at 86)).
13
stole to stave off starvation. Rather, to “prove” the “particular offense[s]” with which Ali is
“charged[,] . . . an analysis of [his] purpose . . . . is necessary.” United States v. Cullen, 454 F.2d
386, 391–92 (7th Cir. 1971) (Stevens, J.) (footnote omitted).15 Specific intent is unquestionably
“an element of” the crimes of conspiracy and aiding and abetting. Id. at 391; see Childress, 58
F.3d at 707–08 (“purposeful intent—or ‘conscious desire’ to achieve a ‘result[]’ . . . is the
essence of conspiracy” (emphasis in the original, citation omitted) (quoting Bailey, 444 U.S. at
404)); Moore, 651 F.3d at 92 (aiding and abetting is a specific intent crime); see also Peoni, 100
F.2d at 403 (aiding and abetting and “conspiracy [both] import[] a concert of purpose”). With
regard to the conspiracy charges, evidence that Ali acted “to shorten the crew’s ordeal, protect
their lives, and collect intelligence on pirates for the benefit of the United States and the
seafaring community” (Def. Omnibus Opp’n at 3) may make it more or less likely that he acted
15
In Cullen, the defendant had been convicted of burning draft records. 454 F.2d at 387. On
appeal, his principal contention was that the trial judge should have instructed the jury “that
religious compulsion might negate the requisite criminal intent and thereby warrant acquittal.”
Id. Cullen claimed that he was “compelled by his religious beliefs to act as he did and, therefore,
did not have the requisite intent to commit the offenses charged.” Id. at 390.
The Seventh Circuit affirmed Cullen’s conviction. Id. at 392. Writing for the court,
then-Judge Stevens responded to Cullen’s contention “that his evidence of ‘compulsion’ [was]
relevant to the issue of intent” by first “recogniz[ing] that the term ‘intent’ may be used in at
least three different senses: First, that the prohibited act was performed deliberately; second, that
defendant knew it was wrong; and third, that it was designed to further some ultimate goal.” Id.
at 390. Judge Stevens concluded that the crimes with which Cullen was charged only required a
showing of intent as contemplated by the first and second meanings of the term, such that any
religious compulsion he may have felt was irrelevant. Id. at 392. As to the third type of intent,
however, Judge Stevens recognized that, “[i]n some situations the defendant’s ultimate objective
may be an element of the particular offense charged.” Id. at 391. As an example, Judge Stevens
stated that “to prove a criminal attempt an analysis of the defendant’s purpose beyond the overt
act actually completed is necessary.” Id. at 391–92 (footnote omitted). Conspiracy and aiding
and abetting, as other inchoate offenses, require the same. As noted above, under “‘the law of
inchoate offenses,’” with regard to crimes “‘such as attempt[,] . . . conspiracy,’” and aiding and
abetting, “‘a heightened mental state separates criminality itself from otherwise innocuous
behavior.’” Childress, 58 F.3d at 707 (quoting Bailey, 444 U.S. at 405); see Seals, 130 F.3d at
463 (aiding and abetting is an inchoate offense).
14
purposefully, Childress, 58 F.3d at 707–08, to profit and make money by taking and holding the
CEC Future for ransom, and to compel Clipper to pay a ransom by seizing, detaining, and
threatening to kill, injure, and continue to detain the CEC Future’s crew. And with regard to
aiding and abetting piracy and hostage taking, such evidence may make it more or less likely that
Ali acted with the specific intent to facilitate the commission of those crimes by the pirates.
Moore, 651 F.3d at 92. The Court therefore concludes that the evidence at issue is relevant, and
it will deny the government’s motions in limine.16
The Court further concludes that although this evidence pertains to Ali’s “other act[s],” it
is nonetheless “admissible” for the “purpose” of negating the government’s showing of Ali’s
“intent.” Fed. R. Evid. 404(b)(2). Evidence of a defendant’s other acts is admissible under Rule
404(b) if it
1) . . . is relevant in that it has “any tendency to make the existence of any fact
that is of consequence to the determination of the action more probable or less
probable than it would be without the evidence,” Fed. R. Evid. 401; 2) the fact of
consequence to which the evidence is directed relates to a matter in issue other
than the defendant’s character or propensity to commit crime; and 3) the evidence
is sufficient to support a jury finding that the defendant committed the other . . .
act.
16
The Supreme Court’s decision in United States v. Pomponio, 429 U.S. 10 (1976) (per curiam),
is not to the contrary. In Pomponio, the court approved a district court’s jury instruction that
“‘[g]ood motive alone is never a defense where the act done or omitted is a crime,’ and that
consequently motive [is] irrelevant except as it [bears] on intent.” 429 U.S. at 11 (emphasis
added, first alteration in the original, internal quotation marks omitted); see id. at 13. This
instruction, the court held, accurately reflected the government’s burden of proving that
defendants acted with “the specific intent to violate the law.” Id. at 11. Here, “the act done or
omitted”—Ali’s agreement with the pirates in the conspiracy charges, for example—is only “a
crime,” id., if Ali acted with “purposeful intent—or ‘conscious desire’ to achieve . . . the
conspiracy’s objective.” Childress, 58 F.3d at 707–08 (emphasis in the original, citation
omitted) (quoting Bailey, 444 U.S. at 404). Therefore, this Court’s decision is entirely consistent
with Pomponio, as the evidence that the Court is admitting, however it is characterized, bears on
Ali’s intent. 429 U.S. at 11.
15
United States v. Bowie, 232 F.3d 923, 930 (D.C. Cir. 2000) (some citations omitted). The
evidence at issue qualifies in all regards, in that it 1) is relevant to 2) Ali’s intent, and 3) is
sufficient to show that Ali committed the other acts in question. Id. Notwithstanding the
government’s arguments to the contrary (see Gov’t Omnibus Mot. at 6–7), the fact that the
evidence may negate the government’s showing as to Ali’s mens rea is precisely what makes it
admissible under Rule 404(b). “Whether the [other act] is laudable or unlawful should not make
much difference; the question in each case is whether [the act] makes more or less likely the
existence of some fact that matters.” United States v. Burke, 781 F.2d 1234, 1243 (7th Cir.
1985); see United States v. Hayes, 219 F. App’x 114, 116 (3d Cir. 2007) (unpublished) (“As is
true with bad act evidence, evidence of good acts is also admissible for a proper purpose such as
motive, intent, absence of mistake, etc.”).
However, the Federal Rules of Evidence require the Court, in its discretion, to “exclude
relevant evidence if its probative value is substantially outweighed by a danger of,” inter alia,
“confusing the issues, misleading the jury, undue delay, wasting time, or needless presenting
cumulative evidence.” Fed. R. Evid. 403; see United States v. Brown, 597 F.3d 399, 406 (D.C.
Cir. 2010) (“‘[T]he Rule 403 inquiry in each case involving Rule 404(b) evidence will be case-
specific. There can be no ‘mechanical solution,’ no per se rule.’ United States v. Crowder, 141
F.3d 1202, 1210 (D.C. Cir. 1998) (en banc). . . . [T]he decision on exclusion rests in the sound
discretion of the district court.” (some alterations in the original)).
For the reasons stated above and discussed at hearings on April 11, 2012, and May 17,
2012, the Court will grant Ali’s 404(b) motion. Specifically, the Court will admit evidence
pertaining to Ali’s role in incidents of piracy involving the ships Rockall, Karag l, Stolt
Strength, Maersk Alabama, Lynn Rival, and De Xin Hai under Rule 404(b). (See also Order,
16
II. DEFENDANT’S MOTION TO SUPPRESS
Ali challenges six search warrants and the searches and seizures conducted pursuant to
them.19 He argues that the Fourth Amendment demands the exclusion of the evidence obtained.
A. Legal principles
The Fourth Amendment protects “[t]he right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures,” and provides that “no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons or things to be seized.” U.S. Const. amend.
IV. By its text, the Amendment “‘contains no provision expressly precluding the use of evidence
obtained in violation of its commands.’” Herring v. United States, 555 U.S. 135, 139 (2009)
(quoting Arizona v. Evans, 514 U.S. 1, 10 (1995)). However, Supreme Court “decisions
establish an exclusionary rule that, when applicable, forbids the use of improperly obtained
evidence at trial,” id., in order “to ‘compel respect for the constitutional guaranty.’” Davis v.
United States, 131 S. Ct. 2419, 2426 (2011) (quoting Elkins v. United States, 364 U.S. 206, 217
(1960)).
Although the Supreme Court “has applied the exclusionary rule to certain Fourth
Amendment violations,” it “‘has never . . . interpreted’” that provision as “‘proscrib[ing] the
introduction of illegally seized evidence in all proceedings or against all persons.’” United
States v. Spencer, 530 F.3d 1003, 1006 (D.C. Cir. 2008) (quoting United States v. Leon, 468 U.S.
897, 906 (1984)). To the contrary, the Court has “repeatedly rejected the argument that
19
See Def. Mot. to Suppress, Ex. 1 (May 25, 2010 warrant for Ali’s email), Ex. 3 (April 21, 2011
warrant for Ali’s suitcase and computer bag), Ex. 4 (April 21, 2011 warrant for Ali’s cell phone),
Ex. 5 (April 21, 2011 warrant for Ali’s laptop computer), Ex. 6 (May 4, 2011 warrant for Ali’s
external hard drive).
18
exclusion is a necessary consequence of a Fourth Amendment violation.” Herring, 555 U.S. at
141 (collecting cases). Rather, the judicially created exclusionary rule is designed to safeguard
Fourth Amendment rights generally through its deterrent effect, and therefore applies only where
it results in appreciable deterrence. Id. at 139, 141.
Furthermore, “[r]eal deterrent value is a necessary condition for exclusion, but it is not a
sufficient one,” because “[t]he analysis must also account for the substantial social costs
generated” by the rule. Davis, 131 S. Ct. at 2427 (internal quotation marks and citations
omitted). The rule “almost always requires courts to ignore reliable, trustworthy evidence
bearing on guilt or innocence.” Id. Therefore, the Supreme Court has emphasized that “[f]or
exclusion to be appropriate, the deterrence benefits of suppression must outweigh its heavy
costs.” Id.
“In a line of cases beginning with” Leon, the Supreme Court has calibrated its “cost-
benefit analysis” according to “the flagrancy of the police misconduct at issue” and has
instructed that “the deterrence benefits of exclusion vary with the culpability of the law
enforcement conduct.” Id. (internal quotation marks and alterations omitted); see Leon, 468 U.S.
at 909. When the police exhibit deliberate, reckless, or grossly negligent disregard for Fourth
Amendment rights, the deterrent value of exclusion is strong and tends to outweigh the resulting
costs. Davis, 131 S. Ct. at 2427 (citing Herring, 555 U.S. at 144). But when the police act with
an objectively reasonable good-faith belief that their conduct is lawful, or when their conduct
involves only simple, isolated negligence, the deterrence rationale loses much of its force, and
“exclusion cannot ‘pay its way.’” Id. at 2427–28 (quoting Leon, 468 U.S. at 908 n.6).
In Davis, the Supreme Court listed cases where it had “applied [Leon’s] ‘good-faith’
exception” to the exclusionary rule. Id. at 2428 (collecting cases). The Court stated the well-
19
established “theme” linking these cases, and the rationale behind it: “The error in [such cases]
rests with the issuing magistrate, not the police officer, and ‘punish[ing] the errors of judges’ is
not the office of the exclusionary rule.” Id. (second alteration in the original) (quoting Leon, 468
U.S. at 916). Thus, in “Leon itself,” the Supreme Court held that “the exclusionary rule does not
apply when the police conduct a search in ‘objectively reasonable reliance’ on a warrant later
held invalid.” Id. (quoting Leon, 468 U.S. at 922).
Pursuant to Leon, courts determine the objective reasonableness of the police’s reliance
on a warrant by considering “‘whether a reasonably well trained officer would have known that
the search was illegal’ in light of ‘all of the circumstances.’” Herring, 555 U.S. at 145 (quoting
Leon, 468 U.S. at 922 n.23).20 If such an officer would have discerned the search’s illegality
because “the affidavit supporting the warrant was ‘so lacking in indicia of probable cause as to
render official belief in its existence entirely unreasonable,’” then suppression remains
appropriate. Spencer, 530 F.3d at 1007 (quoting Leon, 468 U.S. at 923). Supreme Court
“precedents make clear, however, that [this] threshold . . . is a high one.” Messerschmidt v.
Millender, 132 S. Ct. 1235, 1245 (2012).
Probable cause is “a fluid concept—turning on the assessment of probabilities in
particular factual contexts—not readily, or even usefully, reduced to a net set of legal rules.”
Illinois v. Gates, 462 U.S. 213, 232 (1983). In determining whether probable cause exists,
[t]he task of the issuing magistrate is simply to make a practical, common-sense
decision whether, given all the circumstances set forth in the affidavit before him
. . . there is a fair probability that contraband or evidence of a crime will be found
in a particular place. And the duty of a reviewing court is simply to ensure that
20
Courts consider the executing “officer’s knowledge and experience” but the test remains an
objective one, Herring, 555 U.S. at 145, and asks, given what he knew, whether it was
reasonable for the officer to rely on the magistrate’s finding of probable cause.
20
the magistrate had a “substantial basis for . . . conclud[ing]” that probable cause
existed.
Id. at 238–39 (some alterations in the original) (quoting Jones v. United States, 362 U.S. 257,
271 (1960), overruled on other grounds by United States v. Salvucci, 448 U.S. 83, 85 (1980)).
Thus, the Supreme Court has “described . . . probable cause to search as existing where the
known facts and circumstances are sufficient to warrant a man of reasonable prudence in the
belief that contraband or evidence of a crime will be found.” Ornelas v. United States, 517 U.S.
690, 696 (1996).
In this “totality-of-the-circumstances analysis,” Gates, 462 U.S. at 238, courts consider,
inter alia, whether the facts in the underlying affidavit are “so closely related to the time of the
issue of the warrant as to justify a finding of probable cause at that time.” Sgro v. United States,
287 U.S. 206, 210 (1932). Yet, pursuant to Leon, an affidavit’s facts are only “too stale,” and the
exclusionary rule only applies, if the officers executing the warrant “‘could not have harbored an
objectively reasonable belief in the existence of probable cause.’” United States v. Webb, 255
F.3d 890, 905 (D.C. Cir. 2001) (quoting Leon, 468 U.S. at 926). Courts “give ‘great deference’
to the issuing judge’s probable-cause determination . . . [a]nd a police officer is ordinarily
entitled to rely on the magistrate’s conclusion.” Spencer, 530 F.3d at 1006 (quoting Gates, 462
U.S. at 236).
Objectively reasonable reliance by the executing officers does not, however, bar
application of the exclusionary rule in all instances. Suppression remains appropriate under Leon
“‘if the magistrate or judge in issuing a warrant was misled by information in an affidavit that the
affiant knew was false or would have known was false except for his reckless disregard of the
truth.’” Id. at 1007 (quoting Leon, 468 U.S. at 923); see Franks v. Delaware, 438 U.S. 154
21
(1978).21 Yet, “[a]n affidavit offered in support of a search warrant enjoys a ‘presumption of
validity.’” United States v. Maynard, 615 F.3d 544, 550 (D.C. Cir. 2010) (quoting Franks, 438
U.S. at 171). In order to invoke Franks, a defendant must
make[] a substantial preliminary showing that a false statement knowingly and
intentionally, or with reckless disregard for the truth, was included by the affiant
in the warrant affidavit, and [that] the allegedly false statement [was] necessary to
the finding of probable cause.
438 U.S. at 155–56. Upon making this substantial showing, which must be “more than
conclusory” and “accompanied by an offer of proof,” id. at 171, “the Fourth Amendment
requires that a hearing be held.” Id. at 156. If the defendant proves his allegations “by a
preponderance of the evidence, and, with the affidavit’s false material set to one side, the
affidavit’s remaining content is insufficient to establish probable cause, the search warrant must
be voided and the fruits of the search excluded.” Id.
“[U]nder certain circumstances,” a defendant may establish that he is entitled to a Franks
hearing on the basis of “material omissions.” Spencer, 530 F.3d at 1007 (citing United States v.
Johnson, 696 F.2d 115, 118 n.21 (D.C. Cir. 1982)); see Burke, 405 F.3d at 81 (“the intentional or
reckless omission of material exculpatory facts from information presented to a magistrate may
21
Whereas Leon emphasizes the deference courts owe magistrates’ probable cause
determinations, in the situations contemplated in Franks,
[a]llegations of intentional or reckless misstatements or omissions implicate the
very truthfulness, not just the sufficiency, of a warrant application. If such
allegations prove to be true, a court owes no deference to a magistrate’s decision
to issue an arrest warrant because, “where officers procuring a warrant have
deliberately misled the magistrate about relevant information, no magistrate will
have made a prior probable cause determination” based on the correct version of
the material facts.
Burke v. Town of Walpole, 405 F.3d 66, 82 (1st Cir. 2005) (quoting Velardi v. Walsh, 40 F.3d
569, 574 n.1 (2d Cir. 1994)).
22
. . . amount to a Fourth Amendment violation” (citing DeLoach v. Bevers, 922 F.2d 618, 622
(10th Cir. 1990))). Indeed, “[b]y reporting less than the total story, an affiant can manipulate the
inference a magistrate will draw. To allow a magistrate to be misled in such a manner could
denude the probable cause requirement of all real meaning.” United States v. Stanert, 762 F.2d
775, 781 (9th Cir. 1985) (citing Franks, 438 U.S. at 168).22
Therefore, a defendant seeking to obtain a Franks hearing must show that (1) the
affidavit contained false statements or omitted certain facts; (2) the false statements or omitted
facts were material to the finding of probable cause; and (3) the false statements or omissions
were made knowingly and intentionally, or with reckless disregard for the truth. United States v.
Becton, 601 F.3d 588, 594 (D.C. Cir. 2010); Spencer, 530 F.3d at 1007.
22
The Sixth Circuit has observed that “an affidavit which omits potentially exculpatory
information is less likely to present a question of impermissible official conduct than one which
affirmatively includes false information.” United States v. Atkin, 107 F.3d 1213, 1217 (6th Cir.
1997) (citing United States v. Martin, 920 F.3d 393, 398 (6th Cir. 1990)); see also Mays v. City
of Dayton, 134 F.3d 809, 816 (6th Cir. 1998). The Sixth Circuit’s reasoning, however, has
nothing to do with the likelihood that an officer’s conduct was impermissible, but rather with the
unrelated concern that an allegation of an omission “‘potentially opens officers to endless
conjecture about investigative leads, fragments of information, or other matter that might, if
included, have redounded to defendant’s benefit.’” Martin, 920 F.2d at 398 (quoting United
States v. Colkley, 899 F.2d 297, 301 (4th Cir. 1990)). The Court recognizes that this concern
may be compelling, but because it has no bearing on the question that motivates Franks—
namely, “whether there ha[s] been official misconduct in the drafting of the affidavit,” 438 U.S.
at 167—the Court will not treat the Sixth Circuit’s empirical observation as though it were a
substantive factor to be applied in assessing whether a defendant has made out the preliminary
showing that Franks requires. In so doing, the Court follows the example of the Fourth Circuit,
on which the Sixth Circuit has relied. The Fourth Circuit has observed that “the Franks
threshold is even higher for defendants making claims of omissions rather [than] affirmative
false statements,” but in defining that threshold, it has stated the same, standard formulation on
which this Court relies: “the defendant must show that the omissions were ‘designed to mislead,
or . . . made in reckless disregard of whether they would mislead’ and that the omissions were
material, meaning that their ‘inclusion in the affidavit would defeat probable cause.’” United
States v. Clenney, 631 F.3d 658, 664 (4th Cir. 2011) (emphasis and alterations in the original)
(quoting Colkley, 899 F.2d at 301).
23
With regard to the second factor, allegedly false information in an affidavit is material
only if, when it is “set to one side, the affidavit’s remaining content is insufficient to establish
probable cause.” Franks, 438 U.S. at 156. By corollary, omitted facts are only material if “their
‘inclusion in the affidavit would defeat probable cause.’” Spencer, 530 F.3d at 1007 (quoting
Colkley, 899 F.2d at 301); see United States v. Davis, 617 F.2d 677, 694 (D.C. Cir. 1979)
(omitted facts are only material if their “recitation would have tipped the balance against a
finding of probable cause”). Accordingly, for a defendant to be entitled to a Franks hearing, “[a]
substantial preliminary showing that the affidavit contained reckless or deliberate falsities and
omissions must be followed by a substantial showing that the affidavit purged of those falsities
and supplemented by the omissions would not be sufficient to support a finding of probable
cause.” United States v. McNeese, 901 F.2d 585, 596 (7th Cir. 1990), overruled on other
grounds by United States v. Nance, 236 F.3d 820 (7th Cir. 2000).
With regard to the third factor, “Franks protects against” false statements and “omissions
that are designed to mislead, or that are made in reckless disregard of whether they would
mislead, the magistrate.” Colkley, 899 F.2d at 301 (emphasis omitted). “Under Franks,
negligent police miscommunications in the course of acquiring a warrant do not provide a basis
to rescind a warrant and render a search . . . invalid.” Herring, 555 U.S. at 145. Courts are well-
equipped to judge allegations that false statements and omissions are intentionally misleading.
However, “as the Court of Appeals for the District of Columbia Circuit has lamented,
‘unfortunately, the Supreme Court in Franks gave no guidance concerning what constitutes a
reckless disregard for the truth in fourth amendment cases, except to state that negligence or
innocent mistake is insufficient.’” Wilson v. Russo, 212 F.3d 781, 787 (3d Cir. 2000) (alterations
and some internal quotation marks omitted) (quoting Davis, 617 F.2d at 694).
24
In Davis, the D.C. Circuit defined recklessness as it pertains to alleged false statements
with recourse to “precedents in the area of libel and the [F]irst [A]mendment,” where “reckless
disregard for the truth requires a showing that” the speaker “‘in fact entertained serious doubts as
to the truth of his publication.’” 617 F.2d at 694 (quoting St. Amant v. Thompson, 390 U.S. 727,
7231 (1968)). At issue in Davis was whether the defendant was entitled to a Franks hearing
where the affidavit included statements made by an informant whom the affiant knew to have
been “under coercion” when he made them. Id. Importing the “subjective test” for reckless
disregard from the libel area, the court held that a defendant could succeed “by showing actual
deliberation” on behalf of the affiant or “by demonstrating that there existed ‘obvious reasons to
doubt the veracity of the informant or the accuracy of his reports.’” Id. (quoting St. Amant, 390
U.S. at 732)). Since the D.C. Circuit decided Davis, “most Circuits that have had occasion to
address the issue have adopted a” similar test, which asks whether the affiant “in fact entertained
serious doubts as to the truth of the . . . statements” which the defendant alleges to be false.
United States v. Kunen, 323 F. Supp. 2d 390, 395 (E.D.N.Y. 2004) (internal quotation marks,
alterations, and citation omitted).
Determining whether an omission was made recklessly presents particular difficulties.
On the one hand, “[a]ll storytelling involves an element of selectivity,” and courts “cannot
demand that police officers relate the entire history of events leading up to a warrant application
with every potentially evocative detail that would interest a novelist or gossip.” Wilson, 212
F.3d at 787. To do so “would make the process of applying for a search warrant a cumbersome
procedure inimical to effective law enforcement” and therefore “might encourage rather than
discourage improper police behavior: facing ever more stringent requirements for obtaining
warrants, police might forego applying for one whenever they think they might have a tenable
25
case for proceeding without one.” Davis, 617 F.2d at 694 (citing United States v. Ventresca, 380
U.S. 102, 108 (1965)).
“On the other hand, one of the reasons for requiring a neutral magistrate to evaluate
probable cause is that an uninterested party is presumably better suited to review and evaluate
the facts than an officer pursuing a lead.” Wilson, 212 F.3d at 787. As the Supreme Court has
emphasized,
“The point of the Fourth Amendment, which often is not grasped by zealous
officers, is not that it denies law enforcement the support of the usual inferences
which reasonable men draw from evidence. Its protection consists in requiring
that those inferences be drawn by a neutral and detached magistrate instead of
being judged by the officer engaged in the often competitive enterprise of
ferreting out crime. . . . When the right of privacy must reasonably yield to the
right of search is, as a rule, to be decided by a judicial officer, not by a policeman
or Government enforcement agent.”
Payton v. New York, 445 U.S. 573, 586 n.24 (1980) (quoting Johnson v. United States, 333 U.S.
10, 13–14 (1948)). Thus, consistent with the Fourth Amendment, “a police officer cannot make
unilateral decisions about the materiality of information, or, after satisfying him or herself that
probable cause exists, merely inform the magistrate or judge of inculpatory evidence.” Wilson,
212 F.3d at 787.
Balancing these competing concerns, the Third Circuit chose to “follow the common
sense approach” of the Eighth Circuit, id., and held that “omissions are made with reckless
disregard for the truth when an officer recklessly omits facts that any reasonable person would
know that a judge would want to know.” Id. at 783; see United States v. Jacobs, 986 F.2d 1231,
1235 (8th Cir. 1993) (inferring reckless disregard based on the “highly relevant” nature of the
omitted information); United States v. Reivich, 793 F.2d 957, 961 (8th Cir. 1986) (noting
inference permissible when omission would have been “‘clearly critical’” to the issuing judge’s
26
probable cause determination (quoting United States v. Martin, 615 F.2d 318, 329 (5th Cir.
1980)). It is clear that courts cannot “infer recklessness solely from [an affiant’s] alleged
awareness” of exculpatory material. Davis, 617 F.2d at 694. Yet, the weight of legal authority
permits the inference “‘where the omitted information was critical to the probable cause
determination.’” Burke, 405 F.3d at 81 (quoting Golino v. City of New Haven, 950 F.2d 864, 871
(2d Cir. 1991); citing Wilson, 212 F.3d at 783); accord Madiwale v. Savaiko, 117 F.3d 1321,
1327 (11th Cir. 1997); DeLoach v. Bevers, 922 F.2d 618, 622 (10th Cir. 1990).23
With these principles in mind, the Court proceeds to address Ali’s specific arguments for
suppression. To begin, the Court will consider two issues that concern many of the underlying
23
As noted, the First, Second, Third, Fifth, Eighth, Tenth, and Eleventh circuits instruct courts
assessing a defendant’s request for a Franks hearing to infer that an affiant’s omission was
reckless if the omitted material was “clearly critical” to the finding of probable cause. The Ninth
Circuit has also adopted this approach, albeit in an unpublished opinion. See United States v.
Hayes, Nos. 87-5164, 87-5166, and 87-5168, 1993 WL 515508, at *2 (9th Cir. Dec. 10, 1993)
(“recklessness may be inferred ‘where the omitted information was clearly critical to the
probable cause determination’” (some internal quotation marks omitted) (quoting Rivera v.
United States, 928 F.2d 592, 604 (2d Cir. 1991))). The Fourth Circuit, however, has criticized
the “clearly critical” approach on the grounds that it “collapses into a single inquiry the two
elements—‘intentionality’ and ‘materiality’—which Franks states are independently necessary.”
Colkley, 899 F.2d at 301.
“The D.C. Circuit has not yet weighed in on whether a court can make an inference of
recklessness if an affiant omits material that is ‘clearly critical’ to the finding of probable cause.”
United States v. Lindsey, 596 F. Supp. 2d 55, 60 n.4 (D.D.C. 2009). However, in the context of
false statements, the Circuit in Davis held that an affiant acts with reckless disregard for the truth
where “there exist[] ‘obvious reasons to doubt [the statement’s] veracity.’” 617 F.2d at 694
(quoting St. Amant, 390 U.S. at 732). By extension, it seems that reckless disregard can be
inferred in the context of omissions where “any reasonable person would know that a judge
would want to know” the omitted facts in making a determination of probable cause. Wilson,
212 F.3d at 783; see, e.g., United States v. Robinson, 546 F.3d 884, 889 (7th Cir. 2008) (To be
entitled to a Franks hearing, “a defendant has the burden to ‘offer direct evidence of the affiant’s
state of mind or inferential evidence that the affiant had obvious reasons for omitting facts in
order to prove deliberate falsehood or reckless disregard.’” (emphasis added) (quoting McNeese,
901 F.2d at 594)).
27
probable cause to believe that . . . evidence of a crime will be found.”).25 On these facts, Ali’s
intent was not relevant to the magistrates’ determinations of probable cause.
The Fourth Circuit’s recent decision in Sennett v. United States, 667 F.3d 531 (4th Cir.
2012), is illustrative. Laura Sennett was “a photojournalist who claim[ed] a special interest in
covering protests, political demonstrations, and grassroots activism.” Id. at 532 (internal
quotation marks omitted). In April 2008, she “received a phone tip that there would be a
demonstration during the International Monetary Fund’s (‘IMF’) annual spring meeting at the
Four Seasons Hotel in Washington, D.C.” Id. at 533. She “arrived at the Four Seasons at
approximately 2:30 a.m. on April 12, 2008, in order to photograph the protest,” allegedly
“unaware that the purported protesters planned to destroy property or commit other criminal
acts.” Id. Nonetheless, the protest turned violent. “[I]ndividuals entered the hotel lobby and
threw firecrackers and smoke-generating pyrotechnic devices, along with paint-filled balloons, at
various targets,” and “shattered a large glass window by the entrance” before fleeing the scene.
Id.
The hotel’s security camera footage revealed a woman “using a small handheld camera to
videotape or photograph the protest.” Id. The photographer was dressed similarly to the
25
Therefore, Ali is incorrect when he argues that “the government could not rummage through
Mr. Gullestrup’s email account, mobile phone records, and laptop files—without any indication
of impropriety by Mr. Gullestrup—simply because he discussed the CEC Future incident with
journalists, law enforcement officers, and maritime security experts.” (Def. Suppression Reply
at 10 (emphasis in the original).) To the contrary, if there was probable cause to believe that
Gullestrup possessed evidence pertaining to crimes committed aboard the CEC Future, and if
Gullestrup refused to disclose that evidence to the government, there would be nothing improper
about a search warrant executed against him notwithstanding that he is not suspected of criminal
activity. See Mays, 134 F.3d at 814 (“Property owned by a person absolutely innocent of any
wrongdoing may nevertheless be searched under a valid warrant.”); accord United States v.
Adjani, 452 F.3d 1140, 1147 (9th Cir. 2006) (same); United States v. Tehfe, 722 F.2d 1114, 1118
(3d Cir. 1983) (same).
30
protestors. Id. “Like several others present, the photographer . . . remained outside during the
incident in the lobby. And, after the people who damaged the lobby exited the hotel, the
unidentified female fled from the hotel with or in the same general direction as the protesters.”
Id.
Eventually, Sennett was identified as the female photographer, id., and a warrant was
issued for a search of her residence for evidence of suspected criminal activity that occurred
during the protest. Id. at 534. When the warrant was executed, the agents “seized dozens of
items, including an external hard drive allegedly containing more than 7,000 photographs, two
computers, several cameras, and several camera memory cards.” Id. “Sennett was never
arrested or charged with any crimes relating to” the protest. Id.
Sennett sued under the Privacy Protection Act, 42 U.S.C. §§ 2000aa et seq., arguing that
the search of her residence was unlawful for lack of probable cause. Id.26 The district court
granted summary judgment in favor of the government. Id. at 534–35. On appeal, Sennett
argued that there was no probable cause because there were “innocent explanation[s] for her
actions”:
For instance, Sennett argue[d] that she believed there was a noncriminal purpose
for protesting at night—such as waking up the IMF delegates—rather than
concealing criminal acts under cover of darkness. Moreover, Sennett argue[d]
that she fled not out of a consciousness of guilt, but because she was frightened
for her safety.
26
The Privacy Protection Act “prohibits government searches for documents and materials that
are intended for publication,” but does not apply “when the person possessing the materials is a
criminal suspect, rather than an innocent third party.” Sennett, 667 F.3d at 535 (emphasis,
internal quotation marks, and citations omitted). To take advantage of this exception, the
government must have “‘probable cause to believe that the person possessing such materials has
committed or is committing the criminal offense to which the materials relate.’” Id. (quoting 42
U.S.C. §§ 2000aa(a)(1) & (b)(1)). The question in Sennett was whether this so-called “suspect
exception,” under which the police claimed authority to search Sennett’s residence, applied. Id.
31
Id at 536. The Fourth Circuit, however, upheld the grant of summary judgment in favor of the
government:
Such plausible explanations, based on Sennett’s subjective mindset, . . . do not
factor into the probable cause calculus. “[I]n considering the totality of the
circumstances, [a defendant’s] innocent explanations for his odd behavior cannot
eliminate the suspicious facts from the probable cause calculus. The test is not
whether the conduct under question is consistent with innocent behavior; law
enforcement officers do not have to rule out the possibility of innocent behavior.”
Ramirez v. City of Buena Park, 560 F.3d 1012, 1024 (9th Cir. 2009) (internal
quotation marks omitted). . . . [Furthermore,] [a]lthough Sennett’s occupation
provides an innocent explanation for her appearance in the security camera
footage, the other facts nevertheless permitted [the affiant] to reasonably conclude
that Sennett was involved in the acts of vandalism. See United States v. Booker,
612 F.3d 596, 601 (7th Cir. 2010) (“The possibility of an innocent explanation
does not vitiate properly established probable cause.”).
Sennett, 667 F.3d at 536 (emphasis added, some alterations in the original);27 cf. Pennsylvania v.
Dunlap, 129 S. Ct. 448, 448 (2008) (Roberts, C.J., dissenting from the denial of a cert. petition)
(“an officer is not required to eliminate all innocent explanations for a suspicious set of facts to
have probable cause to make an arrest” (citing Gates, 462 U.S. at 244 n.13)). Here, any innocent
explanations for Ali’s actions were irrelevant to the question of probable cause. The issuing
magistrates were not required to make a determination of Ali’s guilt or innocence, or to assess
his intent.
27
In his reply in support of his motion to suppress, Ali posits that,
if an affidavit stated that criminal informant observed a kilo of marijuana inside a
particular building, a search warrant would likely be issued. But that search
warrant would have been illegal based upon that fact alone if the building was a
research laboratory authorized to possess marijuana, and the affiant had
deliberately failed to disclose that fact.
(Def. Suppression Reply at 3 n.1 (emphasis added).) Sennett demonstrates why Ali is incorrect:
the omission of such an “innocent explanation” would not be determinative where the affidavit
stated “other facts” that would “permit[ the affiant] to reasonably conclude that” the building
would contain evidence of a crime. 667 F.3d at 536.
32
Under Franks, “the intentional or reckless omission of material exculpatory facts from
information presented to a magistrate may . . . amount to a Fourth Amendment violation,” Burke
405 F.3d at 81 (emphasis added), and omitted facts are “material” only if “their inclusion in the
affidavit would defeat probable cause.” Spencer, 530 F.3d at 1007 (internal quotation marks
omitted). The exculpatory facts that Ali claims were omitted from the affidavits (see supra n.24)
speak to his intent and nothing more.28 Because Ali’s intent was not at issue, those facts were
not material to the magistrates’ findings of probable cause and Ali is not entitled to a Franks
hearing on the basis of their omission. 438 U.S. at 156.
C. Staleness
Ali also argues that the affidavits were based on such stale information that the executing
officers “‘could not have harbored an objectively reasonable belief in the existence of probable
cause.’” Webb, 255 F.3d at 905 (quoting Leon, 468 U.S. at 926). Specifically, Ali protests that
the piracy of the CEC Future concluded more than fifteen months before the first warrant
application was submitted on May 25, 2010, and more than two years before the majority of the
warrant applications were submitted in April and May 2011.
It is true that in cases that pre-date Leon, the D.C. Circuit concluded that probable cause
expired in far shorter periods. See, e.g., Schoeneman v. United States, 317 F.2d 173, 177–78
(D.C. Cir. 1963) (no probable cause to believe that classified documents were in defendant’s
house when they were last seen 107 days before the application for the warrant was made). Yet,
“[i]n determining probable cause for the issuance of a search warrant, time alone, of course, is
not controlling.” Id.; see United States v. Harris, 369 F.3d 1157, 1165 (10th Cir. 2004) (“The
28
Other omitted facts revealed more than Ali’s intent. The Court will addresses these facts
below.
33
determination of timeliness . . . does not depend on simply the number of days that have elapsed
between the facts relied on and the issuance of the warrant.” (internal quotation marks and
citation omitted)). Rather, “the probable-cause requirement looks to whether evidence will be
found when the search is conducted.” United States v. Grubbs, 547 U.S. 90, 95 (2006)
(emphasis in the original). Accordingly, the critical question is whether, at the time an affidavit
is presented to a magistrate, it establishes probable cause that evidence will be found at the
location of the search. United States v. Abboud, 438 F.3d 554, 572 (6th Cir. 2006). In answering
this question, courts consider, inter alia, “the nature of the criminal activity, the length of the
activity, and the nature of the property to be seized.” Harris, 369 F.3d at 1165 (internal
quotation marks and citation omitted).
As relevant here, “courts have determined that when the evidence sought is of a type that
would be maintained after the criminal activity ceased, then older information can still be
considered reliable when used to obtain a search warrant.” United States v. Edelin, 128 F. Supp.
2d 23, 46 (D.D.C. 2001) (collecting cases). Where a warrant targets documentary materials such
as business records, for example, staleness presents less of a concern because these “are the type
of records typically found to be maintained over long periods of time.” United States v. Dozier,
844 F.2d 701, 707 (9th Cir. 1988) (citing Andresen v. Maryland, 427 U.S. 463, 478 n.9 (1976));
see United States v. Procopio, 88 F.3d 21, 26 (1st Cir. 1996) (noting that although “the crime had
taken place 14 months before” the affidavit was sworn, this span of time “did not eliminate the
likelihood that the paper trail of financial records could be found in [the defendant’s]
residence”). Where the records or documents in question are digital, staleness is even less of a
problem. “[D]igital files remain on computers for extensive periods of time,” such that “the
passage of time does not necessarily render the evidence stale.” United States v. Coon, No. 10-
34
CR-110A, 2011 WL 1871165, at *3 (W.D.N.Y. May 16, 2011) (collecting cases). Thus, “‘the
nature of digital evidence . . . weighs against a finding of staleness.’” United States v. Payne,
394 F. App’x 891, 894 (3d Cir. 2010) (unpublished) (quoting United States v. Payne, 519 F.
Supp. 2d 466, 477 (D.N.J. 2007)).
In addition, “[c]ourts have been considerably more lenient in assessing the currency of
information supporting probable cause in the context of extended conspiracies than in the context
of single-incident crimes.” Webb, 255 F.3d at 905. Accordingly, staleness is also less likely to
defeat the existence of probable cause where the affidavit alleges ongoing criminal activity.
Abboud, 438 F.3d at 573; see United States v. Greene, 250 F.3d 471, 481 (6th Cir. 2001); accord
United States v. McElroy, 587 F.3d 73, 77–78 (1st Cir. 2009); United States v. Kennedy, 427
F.3d 1136, 1142 (8th Cir. 2005); United States v. Riddick, 156 F.3d 505, 509 (3d Cir. 1998);
United States v. Harris, 20 F.3d 445, 450 (11th Cir. 1994) (collecting cases). Furthermore, “acts
which are not inherently criminal may become criminal and support a finding of probable cause
if committed to further an ongoing conspiracy.” Id. at 451 n.7.
All of the above factors weigh in the government’s favor. The magistrates were entitled
to conclude that the evidence targeted by the warrants (documents, computer files, emails, call
records, text messages, photos, and address book entries pertaining to piracy) was of the “type
that would be maintained after” the pirates released the CEC Future. Edelin, 128 F. Supp. 2d at
46. Furthermore, the affidavits allege that Ali continued to use his email account, cell phone,
and computer to communicate about piracy well after the CEC Future incident,29 which in itself
29
See Def. Mot to Suppress, Ex. 1 at 1393 (alleging that Ali continued to use his email address to
communicate about the CEC Future, and piracy more generally, after he disembarked from the
boat); id., Ex. 4 at 1367–68 (same, cell phone); id., Ex. 5 at 1442–43 (same, laptop computer);
id., Ex. 6 at 1458–59 (same, external hard drive); id., Ex. 7 at 1418 (same, email).
35
may be enough to “defeat [Ali’s] claim of staleness.” Abboud, 438 F.3d at 573. The fact that Ali
conceivably could have deleted his email, wiped his phone, cleared his computer, or destroyed
his business records is of no consequence to the Court’s inquiry, for probable cause requires only
a “fair probability that contraband or evidence of a crime will be found.” Gates, 462 U.S. at 238
(emphasis added). At the very least, the Court concludes that the warrants were not so lacking in
fresh information so as to make the executing officers’ reliance on them objectively
unreasonable. Webb, 255 F.3d at 905.
Having rejected Ali’s general challenges to the affidavits’ omissions of certain allegedly
exculpatory facts and to their purported staleness, the Court will now assess Ali’s remaining
arguments for suppression.30
D. May 25, 2010 and October 11, 2011 search warrants for Ali’s email
1. May 25, 2010 warrant
On May 25, 2010, a magistrate issued a warrant authorizing the police to search Ali’s
email account. (Def. Mot. to Suppress, Ex. 1) Ali alleges that he is entitled to a Franks hearing
because the affidavit underlying the warrant contains misrepresentations and omissions.
Certain of Ali’s allegations can be summarily dismissed. First, Ali protests that the
affidavit described him as “very knowledgeable about pirate operations, procedures and ransom
negotiations” (id., Ex. 1 at 1386), notwithstanding that Gullestrup had told the affiant that, after
Ali boarded the CEC Future, Ali “realized he was in over his head and remained in his own
30
As to the April 21, 2011 warrant for Ali’s cell phone, Ali only argued that the underlying
affidavit was stale. (Id. at 28.) Because the Court has rejected that argument, it need not further
address that particular warrant.
36
cabin away from the pirates.” (Id., Ex. 1431 at 2010.) But the Court does not agree that these
statements are “in considerable tension.” (Id. at 22.) Ali may have known a great deal about
piracy generally but still have been overwhelmed by the specific occurrences aboard the CEC
Future. This rather nuanced dispute over the proper inference does not rise to the level of a
falsity.
Second, Ali challenges the fact that the affidavit describes as a “ruse” his alleged
statement to Clipper that “his was life in danger.” (Id., Ex. 1 at 1391.) Ali alleges that the
characterization was false because Gullestrup had told the affiant that, “[a]round day 60 of the
hijacking, the pirates were thinking about getting another negotiator” and “confined Ali to his
cabin.” (Id., Ex. 14 at 2013.) However, Gullestrup’s source for this information was Ali
himself. The fact that Gullestrup relayed Ali’s statements to the affiant does not undercut the
affiant’s belief that the whole story was pretextual.32
31
Exhibit 14 to Ali’s motion to suppress is an April 13, 2010 summary, written by the affiant
who sought the May 25, 2010 warrant, of the affiant’s interview with Gullestrup. The words
quoted above are the affiant’s own.
32
In his reply, Ali argues that an affiant’s beliefs and inferences have no place in an application
for a warrant. (Def. Suppression Reply at 4–6.) As noted, the Fourth Amendment requires “the
usual inferences which reasonable men draw from evidence . . . [to] be drawn by a neutral and
detached magistrate instead of being judged by the officer engaged in the often competitive
enterprise of ferreting out crime.” Johnson, 333 U.S. at 14. Yet, this statement merely stands for
the proposition that the ultimate question of whether probable cause exists, i.e., whether “the
right of privacy must reasonably yield to the right of a search,” is “to be decided by a judicial
officer, not by a policeman.” Id. Thus, were an affidavit to consist solely of a policeman’s
beliefs, it would not support the issuance of a warrant. See Ventresca, 380 U.S. at 108–09
(Probable cause cannot “be made out by affidavits which are purely conclusory, stating only the
affiant’s or an informer’s belief that probable cause exists without detailing any of the underlying
circumstances upon which that belief is based.” (internal quotation marks omitted)). But, in
alleging facts and arguing why probable cause exists, the Fourth Amendment does not prohibit
an affiant from stating his beliefs. Cf. Jones, 362 U.S. at 269 (“an affidavit does not establish
probable cause which merely states the affiant’s belief that there is cause to search, without
stating facts upon which that belief is based” (emphasis added) (citing Nathanson v. United
37
Ali’s remaining challenges to the sufficiency of the affidavit underlying the May 25,
2010 warrant are more troubling. First, the affiant knew that “[t]here was no email contact with
the [p]irates” or with Ali while they were onboard the CEC Future (id., Ex. 14 at 2010), but
immediately after describing the piracy negotiations and ransom payment (see id., Ex. 1 at 1390–
91), the affiant implied that Ali used email during negotiations by stating, “[s]ometime during
discussions between Mr. Ali and Clipper Shipping, Mr. Ali provided a Clipper Shipping
representative his email address.” (Id., Ex. 1 at 1391.) The Court agrees that a fair reading of
the above, in combination with other passages in the affidavit,33 could create the impression that
States, 290 U.S. 41 (1933)); Virgin Islands v. John, 654 F.3d 412, 420 (3d Cir. 2011) (“[A]n
individual’s Fourth Amendment right cannot be vitiated based on fallacious inferences drawn
from facts not supported by the affidavit.” (alteration in the original, emphasis added) (quoting
United States v. Falso, 544 F.3d 110, 122 (2d Cir. 2008) (Sotomayor, J.))). Rather, the Fourth
Amendment ensures that it is a magistrate who decides whether those beliefs are reasonable in
light of the facts alleged, and whether the affidavit as a whole demonstrates the existence of
probable cause. See id. (a “bedrock principle of the Fourth Amendment” requires “that a warrant
applicant state explicitly her belief . . . as well as reasons justifying such a belief”).
33
For example, the affidavit states:
During [the piracy of the CEC Future], Mr. Ali and Clipper Shipping were in
constant contact to discuss ransom amounts, the welfare of the crew and terms of
release. Mr. Ali requested that Clipper Shipping activate communications
systems, specifically email and fax, in order to expedite the ransom negotiations.
Mr. Ali utilized the ship’s satellite telephone, a Somali based mobile telephone,
and the ship’s fax machine during these negotiations.
(Def. Mot. to Suppress, Ex. 1 at 1387 (emphasis added).) Later, the affidavit stated that, “[a]s
noted above, the investigation has revealed that Mr. Ali utilized the ali_ali692@hotmail.com
account to communicate with Clipper Shipping.” (Id., Ex. 1 at 1392.) The implication is that Ali
was able to access his email via the ship’s satellite phone and used his email to conduct
negotiations.
38
Ali used his email account to negotiate with Clipper during the piracy, when the affiant knew
that he did not.34
Second, the affiant’s statement that Ali “expressed concern that would have
his email address,” and the affiant’s corresponding “belie[f] that this indicates that Mr. Ali still
utilizes this email address for communications and is concerned that may be
able to access the account,” are also troublesome. (Id., Ex. 1 at 1392.) In fact, as the affiant
knew,
That the affiant knew this,
, belies his characterization in the affidavit.
34
As Ali argues, “[i]ndeed, even the FBI agents who [authored affidavits after the May 25, 2010
warrant was issued] appear to have been misled by [the] language” in the affidavit underlying the
May 25, 2010 warrant. (Def. Suppression Reply at 12 (emphasis in the original); see Def. Mot.
to Suppress, Ex. 3 at 1490 (“During the negotiations, Ali communicated with Clipper Group A/S
via email and fax.”); id., Ex. 5 at 1442 (same); id., Ex. 6 at 1458 (same); id., Ex 7 at 1416
(“Based on identification of [ali_ali692@hotmail.com] as being used by Mr. Ali during the time
of the piracy of the CEC Future, a search warrant . . . was issued by the United States District
Court for the District of Columbia.” (emphasis added) (referencing the May 25, 2010 warrant)).
39
Yet, although these misstatements and omissions may well have misled the magistrate,
Ali is only entitled to a Franks hearing if they are material, i.e. if, when the misstatements are
“set to one side” and the omitted facts are included, the corrected affidavit does not “support a
finding of probable cause.” 438 U.S. at 171–72; see Spencer, 530 F.3d at 1007. Here, Ali
argues that the misstatements and omissions are material because the corrected affidavit does not
demonstrate the required “nexus between the place to be searched, the things to be seized, and
the underlying criminal activity.” United States v. Glay, No. 08-cr-213, 2009 WL 1921405, at
*2 (D.D.C. June 30, 2009).35 With regard to the May 25, 2010 warrant, the place to be searched
is Ali’s email account, the things to be seized are emails within a certain timeframe pertaining to
specified subjects, and the underlying criminal activity is the piracy of the CEC Future. (See
Def. Mot. to Suppress, Ex. 1 at 1381, 1386, 1391.)
Ali is surely correct that it would not be enough if the corrected affidavit amounted to
nothing more than, for example, “crimes were committed aboard the CEC Future, Ali was
aboard the CEC Future and may have participated in those crimes, and Ali has an email
account.” In concluding that warrants to search suspects’ email accounts adequately establish a
nexus, courts insist on a direct connection between the alleged criminal activity and the specific
email account at issue,36 and that connection typically arises because the affidavit asserts that the
35
See United States v. Hammons, 411 F. App’x 837, 842 (6th Cir. 2011) (unpublished)
(“Affidavits supporting a search warrant have to establish a nexus between the place to be
searched and probable evidence of criminal activity . . . .”); United States v. Peterson, 145 F.
App’x 820, 821 (4th Cir. 2005) (unpublished) (“For a search warrant to be supported by probable
cause, a nexus must be established between the place searched and the alleged criminal activity.”
(citing United States v. Lalor, 996 F.2d 1578, 1582 (4th Cir. 1993)).
36
In this circuit, the requisite connection can be established by either “an independent
evidentiary basis” or “an affiant’s statement that her training and experience provides probable
cause to believe that there is a nexus between criminal activity and the place to be searched.”
40
account was used in the commission of the crime.37 To require anything less would be to
authorize “‘a general, exploratory rummaging in a person’s belongings’” contrary to the Fourth
Amendment’s prohibition against general warrants. Andresen, 427 U.S. at 479 (quoting
Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971)). As Ali notes, however, he is “accused
of committing piracy on the high seas, not software piracy.” (Def. Suppression Reply at 16 n.9.)
The corrected affidavit would state that Ali did not have email access while he was aboard the
CEC Future, so his account would not contain any communications made during the piracy.
Furthermore, it would neither state nor imply that Ali had been guarded about revealing his email
address to .
Nonetheless, especially given that Ali’s intent is the central issue in this case, the
evidence sought need not be contemporaneous with the piracy to support a finding of probable
cause. What happened after the pirates released the CEC Future is also relevant to that inquiry.
Even when the statements which Ali alleges to be false are left out and the facts which Ali argues
were omitted are included, the affidavit shows a sufficient nexus because it posits that Ali may
Glay, 2009 WL 1921405, at *3 (citing United States v. Johnson, 437 F.3d 69, 71–72 (D.C. Cir.
2006); United States v. Thomas, 989 F.2d 1252, 1254 (D.C. Cir. 1993)).
37
See, e.g., United States v. Bansal, 663 F.3d 634, 662 (3d Cir. 2011) (“The affidavit more than
sufficiently establishes probable cause to believe Bansal’s email accounts contained evidence of
his internet-based illegal controlled substance distribution operation.” (emphasis added)); United
States v. Wagers, 452 F.3d 534, 541 (6th Cir. 2006) (“the nexus between an AOL email account
and Internet-accessed child pornography, especially where some of that access has been through
AOL IP addresses, is . . . obvious” (emphasis added)); United States v. Yousef, No. S308cr1213,
2011 WL 2899244, at *11 (S.D.N.Y. June 30, 2011) (“The affidavit supporting the warrant”
specified that the defendant’s co-conspirator “used the [target] email account to conduct a
fraudulent, large-scale weapons deal” with the defendant.); United States v. Noyes, No. 1:08-cr-
55, 2010 WL 5139859, at *9 (W.D. Pa. Dec. 8, 2010) (“the exhibits that were attached and
incorporated into [the affidavit] clearly showed that Noyes was using the specified Yahoo and
Google email accounts to communicate with others in furtherance of his alleged criminal
activities”).
41
2. October 11, 2011 warrant
Ali alleges that the second warrant for his email, issued on October 11, 2011 (Def. Mot.
to Suppress, Ex. 7), contains similar misstatements and omissions. The Court concludes that
Ali’s arguments fail for similar reasons.
First, Ali protests that the affiant for this warrant repeated the statement, made in the May
25, 2010 affidavit, “that Ali’s knowledge about piracy indicates that ‘he was a key participant in
the conspiracy.’” (Id. at 28 (quoting id., Ex. 7 at 1416).) There is nothing misleading here.
Ali’s actions aboard the CEC Future, which the affiant described in some detail (see id., Ex. 7 at
1416), justify the affiant’s characterization of Ali as a “key participant.” Whether Ali was a
conspirator is a separate issue, and one that is not relevant to the probable cause analysis. (See
supra Section II(B).)
Second, Ali argues that this affiant, like the affiant of the May 25, 2010 affidavit, sought
“to conjure a nexus by misleading the magistrate into believing that Ali used his personal email
account during the CEC Future crisis” (id. at 29) when the affiant stated that Ali “provided a
Clipper Shipping representative with his email address . . . [d]uring the ransom negotiations.”
(Id., Ex. 7 at 1417.) Yet, as previously decided, this misstatement does not entitle Ali to a
Franks hearing. Had the fact that Ali had no email access while he was aboard the CEC Future
been included in the affidavit, the affidavit nonetheless still would have supported a finding of
probable cause to search Ali’s email account because it stated that Ali continued to use the
account after he disembarked from the boat to communicate about his experiences on the boat
and about his involvement in other piracies. (See id., Ex. 7 at 1418–19 (describing how Ali
communicated about his involvement in the piracy of the Lynn Rival via email with reference to
evidence obtained via prior warrants, all of which the Court concludes were valid).)
43
3. Scope of the warrants as executed
In addition to challenging the validity of the May 25, 2010 and October 11, 2011
warrants, Ali challenges their execution, claiming that the officers exceeded the scope of the
warrants when they searched his email. Specifically, Ali claims that the government seized
emails that were outside the date ranges and not pertinent to the subject matters specified in those
warrants. (Def. Mot. to Suppress at 27–28, 30–31.)
Here, Ali’s claims go to the behavior of the police, and they therefore implicate the
precise concerns that motivate the exclusionary rule. Davis, 131 S. Ct. at 2427–28.
Furthermore, challenges to the scope of searches for digital evidence raise unique Fourth
Amendment issues, in part because computers and email accounts “‘often contain significant
intermingling of relevant documents with documents that the government has no probable cause
to seize.’” United States v. Cioffi, 668 F. Supp. 2d 385, 391 (E.D.N.Y. 2009) (quoting United
States v. Vilar, No. S305CR621, 2007 WL 1075041, at *35 (S.D.N.Y. April 4, 2007)).39 Thus,
the “acute constitutional hazards” of document searches, United States v. Heldt, 668 F.2d 1238,
1260 (D.C. Cir. 1981) (per curiam), are amplified in the information age. Cioffi, 668 F. Supp. 2d
39
As the Sixth Circuit has observed:
[C]omputers hold [a great deal of] personal and sensitive information touching on
many private aspects of life. We recognize individuals have a reasonable
expectation of privacy in the content of emails stored, sent, or received through a
commercial internet service provider. United States v. Warshak, 631 F.3d 266,
288 (6th Cir. 2010). And we know there is a far greater potential “for the
‘intermingling’ of documents and a consequent invasion of privacy when police
execute a search for evidence on a computer.” United States v. Walser, 275 F.3d
981, 986 (10th Cir. 2001).
United States v. Lucas, 640 F.3d 168, 178 (6th Cir. 2011).
44
at 391 (citing Andresen, 427 U.S. at 482 n.11).40 Yet, “‘it is precisely because computer files can
be intermingled and encrypted that the computer is a useful criminal tool.’” Id. (quoting Vilar,
2007 WL 107041, at *35). Therefore, “‘responsible officials, including judicial officials, must
take care to assure that’” searches of computers and email accounts “‘are conducted in a manner
that minimizes unwarranted intrusions upon privacy.’” Heldt, 668 F.2d at 1260 (quoting
Andresen, 427 U.S. at 482 n.11).
However, absent a showing that an executing officer exhibited “a flagrant disregard for
the limitations in a warrant [that] might transform an otherwise valid search into a general one,
thereby requiring the entire fruits of the search to be suppressed,” where “officers seize some
items outside the scope of a valid warrant, this by itself will not affect the admissibility of other
contemporaneously seized items which do fall within the warrant.” Id. at 1259 (collecting
cases). In Ali’s motion to suppress, he does not allege that the officers executing the May 25,
40
The Heldt court stated:
In the context of document searches, the need to prevent general, exploratory
rummaging in a person’s belongings is particularly acute. Unlike searches for
other tangibles, document searches—like eavesdropping and bugging searches—
tend to involve broad disclosures of the intimacies of private lives, thoughts and
transactions.
668 F.2d at 1260 (internal quotation marks, citations, and footnotes omitted). The court went on
to quote at length from the Supreme Court’s decision in Andresen, “which involved a search and
seizure of a criminal defendant’s office files”:
“[T]here are grave dangers inherent in executing a warrant authorizing a search
and seizure of a person’s papers that are not necessarily present in executing a
warrant to search for physical objects whose relevance is more easily
ascertainable. In searches for papers, it is certain that some innocuous documents
will be examined, at least cursorily, in order to determine whether they are, in
fact, among those papers authorized to be seized.”
Heldt, 668 F.2d at 1260 (quoting Andresen, 427 U.S. at 482 n.11).
45
2010 and October 11, 2011 warrants exhibited such a flagrant disregard. Indeed, in protesting
the scope of the email searches he only moved for the suppression of “all seized information not
specifically identified by the warrant[s].” (Def. Mot. to Suppress at 27–28, 31 (emphasis
added).) For its part, the government has represented that it will not “use any emails outside the
scope of the warrant[s] in its case-in-chief at trial.” (Gov’t Suppression Opp’n at 16–17.) Given
this representation, and in the absence of any argument or evidence by Ali to support a claim of
flagrant disregard, Heldt compels this Court to deny Ali’s unsubstantiated request (see Def.
Suppression Reply at 24) for a hearing on the issue.
E. April 21, 2011 and May 4, 2011 warrants for materials in Ali’s possession
when he was arrested at Dulles International Airport
1. April 21, 2011 search warrant for Ali’s suitcase and computer bag
While Ali states, without elaboration, that the affidavit underlying the April 21, 2011
warrant for his suitcase and computer bag “is materially misleading,” the only argument he puts
forward is that the affidavit so lacked in indicia of probable cause as to make official reliance on
it unreasonable because “[t]here is no reason to believe that probable cause existed that Ali
would be carrying . . . incriminating documents relating to piracy on his person” when he landed
at Dulles purportedly en route to attend a conference in North Carolina. (Def. Mot to Suppress at
31 (emphasis in the original).) Without more, this claim cannot justify exclusion of the evidence
obtained. When the customs agents opened Ali’s suitcase, the affiant “observed . . . that it
contained documents,” and in the affidavit she stated her belief that Ali’s luggage might “contain
records or documents related to Ali’s participation in the piracy of the CEC Future and may
identify individuals or associates who were also involved in the piracy.” (Id., Ex. 3 at 1490–91.)
In combination with the other facts relayed, including that Ali communicated with Clipper
46
during the piracy via fax (id., Ex. 3 at 1490), these statements were enough to establish probable
cause, or at the very least to make it objectively reasonable for the executing officers to rely on
the magistrate’s determination thereof. Leon, 468 U.S. at 922.
2. April 21, 2011 search warrant for Ali’s laptop computer and May 4,
2011 search warrant for Ali’s external hard drive
The affidavits underlying the April 21, 2011 warrant for Ali’s laptop and the May 4, 2011
warrant for Ali’s external hard drive are nearly identical. After briefly describing the piracy of
the CEC Future and Ali’s alleged role, the affidavit underlying the April 21, 2011 warrant
indicates that:
During the negotiations, Ali communicated with Clipper Group A/S via
email and fax. Witnesses observed Ali in possession of a laptop computer
when he boarded the ship. Witnesses observed him using the laptop
computer when he boarded the ship. Investigation revealed that Ali used
[the] email address, ali_ali692@hotmail.com. Ali has communicated with
numerous people via email regarding piracy after the CEC Future was
released. In some of those communications, Ali marketed himself as an
expert in piracy. It is reasonable to believe that communications regarding
piracy would be contained on the laptop computer.
Upon arrest, Ali was found to be in possession of a laptop computer . . . .
It is believed that this device and any associated media may contain
records or documents related to Ali’s participation in the piracy of the
CEC Future and may identify individuals or associates who were also
involved in the piracy. If the device was used to connect to the internet, it
may contain records of email communications and their content.
(Def. Mot. to Suppress, Ex. 5 at 1442–43 (emphasis added).) The affidavit underlying the May
4, 2011 warrant omitted the two italicized sentences, each beginning “Witnesses observed . . .,”
and swapped the italicized references to Ali’s “laptop computer” with references to the “external
hard drive” that Ali also had with him when he was arrested. (Id., Ex. 6 at 1458–59.) Otherwise,
the affidavits established how the government had come to possess the devices, described their
47
government knew that the laptop Ali had with him when he arrived in the United States could
not have been the laptop witnesses had seen him use when he was onboard the CEC Future.
This omission was misleading and goes directly to the nexus question.
Again, however, the Court concludes that these misstatements and omissions were not
material to the establishment of probable cause. Even the corrected affidavits would establish a
sufficient nexus. The affiants placed Ali onboard the CEC Future using a laptop, and landing at
Dulles with a laptop and external hard drive. Even if the affidavits omitted any mention of email
and stated that two different laptops were at issue, the possibility that Ali might have transferred
his files from one to the other, or from his original laptop to the external drive, would establish a
“fair probability” that Ali’s laptop and external hard drive would contain evidence of a crime.
Gates, 462 U.S. at 238. Therefore, the alleged omissions and misstatements do not provide a
basis for a Franks hearing.41
CONCLUSION
For the reasons stated, the Court will deny the government’s motions in limine pertaining
to evidence of Ali’s mental state, grant Ali’s motion for the admission of evidence under Rule
41
In the alternative, the government argues that all of the searches authorized by the April 21,
2011 and May 4, 2011 warrants could have been executed without warrants pursuant to the
government’s authority to conduct searches incident to arrest and border searches without
warrants. (See Gov’t Suppression Opp’n at 11; Gov’t Supp. Suppression Mem. at 1–4.) The
government appeals to the “inevitable discovery” doctrine on the theory that any inadequacies in
its April 21, 2011 and May 4, 2011 warrants are irrelevant where the evidence “could [have
been] lawfully . . . obtained through another” lawful process. Cioffi, 668 F. Supp. 2d at 397.
Because the Court concludes that the warrants were valid, however, it need not address the
government’s alternative argument.
49
404(b), and deny Ali’s motion to suppress. A separate Order accompanies this Memorandum
Opinion.42
/s/
ELLEN SEGAL HUVELLE
United States District Judge
Date: May 25, 2012
42
Because many of the underlying motions, oppositions, and replies are sealed, the Court is
issuing this Memorandum Opinion under seal. The accompanying Order directs the parties to
notify the Court by June 8, 2012, of whatever redactions are necessary in order for this
Memorandum Opinion to be unsealed.
50