State v. Shaskus

[Cite as State v. Shaskus, 2016-Ohio-7942.] IN THE COURT OF APPEALS OF OHIO TENTH APPELLATE DISTRICT State of Ohio, : Plaintiff-Appellant, : No. 14AP-812 (C.P.C. No. 13CR-4970) v. : (REGULAR CALENDAR) James F. Shaskus, : Defendant-Appellee. : D E C I S I O N Rendered on November 29, 2016 On brief: Ron O'Brien, Prosecuting Attorney, and Seth L. Gilbert, for appellant. Argued: Seth L. Gilbert. On brief: Dennis C. Belli, for appellee. Argued: Dennis C. Belli. APPEAL from the Franklin County Court of Common Pleas BROWN, J. {¶ 1} This is an appeal by plaintiff-appellant, State of Ohio, from a judgment of the Franklin County Court of Common Pleas granting a motion to suppress filed by defendant-appellee, James F. Shaskus. {¶ 2} On September 18, 2013, a Franklin County Grand Jury returned an indictment charging appellee with five counts of pandering sexually oriented matter involving a minor, in violation of R.C. 2907.322. On April 18, 2014, appellee filed a motion to suppress physical evidence and statements. Specifically, appellee sought an order from the court suppressing "the email messages under the account of jack.flash75@yahoo.com which were obtained by a detective of the Franklin County Sheriff's Department Internet Crimes Against Children Task Force from Yahoo, Inc. pursuant to a search warrant issued on October 21, 2011." Appellee also sought to No. 14AP-812 2 suppress "the digital images, data, and emails stored on the hard drive of the Dell desktop computer which was seized by the same detective from [appellee's] residence pursuant to a search warrant issued on November 14, 2011." On May 23, 2014, the state filed a memorandum contra appellee's motion to suppress. (Def.['s] Mot. to Suppress at 1.) {¶ 3} On July 7, 2014, the trial court conducted a hearing on the motion to suppress. The state called as a witness David R. Hunt, formerly a detective with the Franklin County Sheriff's Department. During his employment with the sheriff's department, Detective Hunt's duties included performing investigations as part of the Franklin County Internet Crimes Against Children Task Force ("ICAC task force"). {¶ 4} At the suppression hearing, Detective Hunt provided testimony regarding a 2011 police investigation into a Craigslist advertisement soliciting sexual encounters with minors. Detective Hunt became involved in the investigation leading to the indictment against appellee as a result of "a spinoff of an investigation from another case" in which investigators "were looking at different Craigslist predators." (July 7, 2014 Tr. at 8-9.) {¶ 5} In April 2011, a police investigator with the Franklin County Sheriff's Department became aware of an online advertisement indicating that an individual "might be seeking to have sexual encounters with minors." (July 7, 2014 Tr. at 9.) Specifically, the advertisement read: "Up to 500 younger the more u get – m4w 38. Younger the better let me take u shopping lol send pic, stats, and number! To text u." (State's Ex. A at 2.) {¶ 6} Investigators opened an investigation and "started issuing subpoenas to various internet service providers, tracking the postings." (July 7, 2014 Tr. at 9.) According to Detective Hunt, Craigslist maintains the anonymity of posters, requiring investigators to "notify [Craigslist] with a subpoena requesting identification information" such as the internet protocol address ("IP address") used to post the advertisement. (July 7, 2014 Tr. at 10.) {¶ 7} On September 20, 2011, Detective Hunt observed the following online Craigslist advertisement: [T]rade young 4 young (Columbus) I have a really young lover looking to find another guy who has the same to share. Mine is 4ft5in, 70lbs blonde, very little hair and has only been with me. If u are interested send pics, stats of yours and if I like we No. 14AP-812 3 might do some trading. Or I can give benefits to u. No questions asked. I'm clean [white] and safe. (State's Ex. B at 3.) {¶ 8} After contacting Craigslist for information, Detective Hunt determined that an individual named Virgil Pennington had placed the advertisement linked to the email address leevp3@gmail.com, and that Pennington had an email account through America Online. Detective Hunt sought and obtained a search warrant to review other emails generated in response to Craigslist advertisements posted through Pennington's Gmail address. Specifically, on October 4, 2011, a judge from the Franklin County Municipal Court approved a warrant to Google, Inc., in California, seeking "evidence of the commission of the criminal offense of Importuning," in violation of R.C. 2907.07, to wit: "any and all emails including read, unread, and sent since September 21, 2011 and all indicia, documents, and records showing ownership or rights of possession of the email account of Virgil Pennington." (State's Ex. A at 1.) {¶ 9} Detective Hunt obtained approximately 500 email communications sent in response to the poster of the Craigslist advertisement, including a reply by an individual who identified himself online as "Jack Flash." One of the emails from the Jack Flash email account, dated in September 2011, "included a photograph of a young, white female." The female "was fully clothed, standing in * * * a kitchen area * * * next to a birthday cake with the number '13' on it." (July 7, 2014 Tr. at 12.) {¶ 10} In an email exchange between Flash and Pennington on September 27, 2011, Flash wrote to Pennington at the email address leevp3@gmail.com, stating: "id love if you shared yours with me but i might be able to get one for you to have as well tell me about yours." A response from leevp3@gmail.com stated: "U first. I gave mine stats now u. She has only been with me and does what * * * daddy tells her." Flash responded as follows: "mine is 4'9 and she weighs about 80lbs shes a very good girl and very accommodating do you have a pic of yours i could see? and where in columbus are you? id love to play." Pennington then wrote: "Yes pic for pic. and there will be any trading. I take urs out for a so called lunch and if all goes well Ill let u take mine out for lunch. I'm very protective of her. She is a good girl. So I also have to know u are clean and safe." Flash responded: "[P]lease send yours as well." No. 14AP-812 4 {¶ 11} Detective Hunt, out of concern "that there was a live victim" that he "needed to identify and locate," subpoenaed Yahoo!, Inc. ("Yahoo") to obtain the IP address information for Flash. (July 7, 2014 Tr. at 24.) The detective subsequently sought and obtained a warrant, issued by a municipal court judge on October 21, 2011, to search Yahoo for: [E]vidence of the commission of the criminal offenses of Compelling Prostitution, 2907.21 R.C., to wit: specifically, any and all emails including opened, unopened, sent, forwarded, deleted; any and all subscriber information including names, addresses, other email accounts; original IP address used and date the account was opened; any other information relating to the email account requested; and all indicia, documents, and records showing ownership or rights of possession of the email account of Jack Flash c/o Yahoo Inc. (State's Ex. B at 1.) {¶ 12} Approximately one week later, the detective received a CD from Yahoo containing "approximately 3,000 e-mails from the jack.flash75 account." (July 7, 2014 Tr. at 18.) The information included "some IP addresses as to when the account was opened," and Detective Hunt was able to determine that the Flash account was through Time Warner Cable. (July 7, 2014 Tr. at 18.) The detective sent a subpoena to Time Warner Cable, issued on November 1, 2011, "for the subscriber information for that specific IP address." (July 7, 2014 Tr. at 20.) Time Warner Cable sent Detective Hunt information that the IP address was associated with an address on Hunter Avenue, Columbus. {¶ 13} During his review of emails, Detective Hunt found photographs of an individual he was later able to identify as appellee. The detective determined that a second individual associated with the Hunter Avenue address did not match photographs from the emails. Appellee's name eventually appeared in a public records search as an individual who also resided at the Hunter Avenue address. Based on the information obtained, the detective believed that appellee "was jack.flash75." (July 7, 2014 Tr. at 26.) {¶ 14} Detective Hunt testified that he initially reviewed the emails from the Flash account "that only had attachments, i.e., photographs." (July 7, 2014 Tr. at 24.) During his "review of the different attachments and the earlier e-mails," Detective Hunt "came across numerous images" of what he believed to be "child pornography." (July 7, 2014 Tr. at 26.) No. 14AP-812 5 {¶ 15} Detective Hunt subsequently obtained a warrant to search appellee's residence on Hunter Avenue, Columbus, for evidence of pandering obscenity involving a minor, in violation of R.C. 2907.32, illegal use of a minor in nudity oriented material, in violation of R.C. 2907.323, disseminating matter harmful to juveniles, in violation of R.C. 2907.31, and endangering children, in violation of R.C. 2919.22. Detective Hunt identified state's exhibit C as the search warrant, dated November 14, 2011. At the time Detective Hunt and other officers arrived at the Hunter Avenue residence, appellee was at his workplace; Detective Hunt and another law enforcement officer went to appellee's place of employment and advised him of the nature of the warrant and "asked him if he would return home with us voluntarily or give us a key so that we could gain entry into the residence." (July 7, 2014 Tr. at 28.) Appellee accompanied the officers back to his residence. {¶ 16} During the search, police officers recovered a computer from appellee's residence. Detective Hunt testified that a forensic examination of the computer revealed "over 900 images" of child pornography. (July 7, 2014 Tr. at 28.) {¶ 17} Appellee testified on his own behalf during the hearing, and stated he was at work on the date the officers sought to execute the search warrant. Detectives arrived at his workplace and told him "[t]hey were getting ready to kick down the door if I would not go with them." (July 7, 2014 Tr. at 42.) Appellee testified that detectives informed him "they were looking for something in conjunction with another case. They were looking for a live person." (July 7, 2014 Tr. at 43.) One of the detectives "showed me the picture that I had shared * * * with Virgil Pennington and said do I know this person. I said no." (July 7, 2014 Tr. at 44.) Appellee acknowledged that the computers inside the house belonged to him. {¶ 18} On July 14, 2014, the trial court conducted another hearing on the motion to suppress. At the conclusion of the hearing, the court requested the parties to brief the "specific issue of should there have been a limit on the subpoena that went to Yahoo! initially." (July 14, 2014 Tr. at 17.) {¶ 19} On July 30, 2014, the trial court conducted a third hearing on the motion to suppress. During the hearing, the court stated on the record that it would grant the motion to suppress the email messages obtained from appellee's Yahoo account because "the search in this case was overbroad. It could have been narrow and should have been No. 14AP-812 6 narrow and * * * based upon that overbreadth * * * it violated Mr. Shaskus' right to his Fourth Amendment search and seizure." (July 30, 2014 Tr. at 24-25.) By decision and entry filed October 9, 2014, the trial court granted the motion to suppress. {¶ 20} On appeal, the state sets forth the following assignment of error for this court's review: The Trial Court Committed Reversible Error in Sustaining Shaskus's Motion to Suppress. {¶ 21} Under its single assignment of error, the state argues the trial court erred in granting the motion to suppress based on the court's determination that the warrant was overbroad in its authorization to search "any and all" emails without regard to date. The state maintains the warrant was based on probable cause, and that it was not overbroad. {¶ 22} This court's review of a trial court's ruling on a motion to suppress "presents a mixed question of law and fact. When considering a motion to suppress, the trial court assumes the role of trier of fact and is therefore in the best position to resolve factual questions and evaluate the credibility of witnesses." State v. Burnside, 100 Ohio St.3d 152, 2003-Ohio-5372, ¶ 8, citing State v. Mills, 62 Ohio St.3d 357, 366 (1992). Thus, "an appellate court must accept the trial court's findings of fact if they are supported by competent, credible evidence." Id., citing State v. Fanning, 1 Ohio St.3d 19, 20 (1982). Further, "[a]ccepting these facts as true, the appellate court must then independently determine, without deference to the conclusion of the trial court, whether the facts satisfy the applicable legal standard." Id., citing State v. McNamara, 124 Ohio App.3d 706, 707 (4th Dist.1997). If a reviewing court "determines that a warrant should not have been issued, it must then determine whether the good-faith exception applies, and that question is a question of law, subject to de novo review by the appellate court." State v. Castagnola, 145 Ohio St.3d 1, 2015-Ohio-1565, ¶ 32. {¶ 23} As noted, appellee's motion to suppress sought the suppression of evidence obtained under two search warrants, including the warrant issued by the trial court on October 21, 2011, authorizing a search of the contents of appellee's Yahoo email account. The search warrant affidavit prepared by Detective Hunt in support of that warrant application stated in part: Affiant, Det. David R. Hunt * * * has been with the Franklin County Sheriff's Office for over 30 years retiring in September No. 14AP-812 7 2011. For the past 19 years, affiant was assigned to the Special Investigations Unit conducting vice, narcotic, and internet crimes against children (ICAC) investigations. In late September 2011, the affiant began an investigation into an individual for the internet sexual exploitation of children. This individual was posting various online ads on Craigslist looking for "young" females for sex for which he would pay for. On Tuesday, September 20, 2011, one posting in the personals-casuals encounters was entitled: "trade young 4 young (Columbus) I have a really young lover looking to find another guy who has the same to share. Mine is 4ft5in, 70lbs blonde, very little hair and has only been with me. If u are interested send pics, stats of yours and if I like we might do some trading. Or I can give benefits to u. No questions asked. I'm clean whaite [sic] and safe." The affiant contacted the Franklin County Coroner's Office and provided the above noted height and weight to Chief Investigator Jack Sudimack who then plotted them on growth charts * * *. The height/weight provided on the posting would equate to a boy between the ages of 8-13 years old or a girl, 7- 13 years old. It is the affiant's training and experience that the above noted ad is consistent with that of an online child sexual predator. On October 4, 2011, the affiant obtained a search warrant to obtain emails for the target of that investigation from Google based upon the above series of facts. On October 12, 2011, the affiant received the requested emails from Google for the target as well as subscriber information from AOL.com for the targets account. The affiant reviewed a total of 549 emails dating from 09/21/11 to 10/04/11. One of the replies to the target was on 9/27/11 @ 1:56 PM which was an email from jack.flash75@yahoo.com to the target expressing interest in sharing his 13 y.o. daughter with the subscriber. "Jack Flash" attached a photograph of a young white juvenile female standing next to a birthday cake with the number "13" on the cake. The affiant then sent a subpoena to Yahoo to identify jack.flash75@yahoo.com. No. 14AP-812 8 "Jack Flash" and the target exchanged several follow-up emails between each other from 1:56 PM and 3:17 PM. One email from "Jack Flash" stated: "mine is 4'9 and she weighs about 80lbs. shes a very good girl and very accommodating. do you have a pic of yours I could see? and where in columbus are you? I'd love to play" This description matched that of the earlier noted photograph sent by "Jack Flash" to the target. The affiant has sent an email preservation letter to Yahoo for jack.flash75@yahoo.com to save any additional emails from this person including those to possibly other suspects. The investigation into the original target of this investigation is still on-going. (State's Ex. B at 2-3.) {¶ 24} Based on the facts set forth in the above affidavit, a municipal court judge approved a warrant allowing access to "the email account of Jack Flash c/o Yahoo Inc." for evidence of the commission of the criminal offense of "Compelling Prostitution, 2907.21 R.C.," and authorizing the search of "any and all emails including opened, unopened, sent, forwarded, deleted; any and all subscriber information including names, addresses, other email accounts; original IP address used and date the account was opened; any other information relating to the email account requested." (State's Ex. B at 1.) {¶ 25} The Supreme Court of Ohio has held that "[c]entral to the Fourth Amendment is the probable-cause requirement. While a probable-cause determination for an arrest warrant is similar in nature to that for a search warrant, a search-warrant inquiry is much more complex and presents special considerations." (Emphasis sic.) Castagnola at ¶ 34, citing 2 LaFave, Search and Seizure, Section 3.1(b) (5th Ed.2012). In order for a search warrant to issue, "the evidence must be sufficient for the magistrate to conclude that there is a fair probability that evidence of a crime will be found in a particular place. The reviewing court then must ensure that the magistrate had a substantial basis for concluding that probable cause existed." Id. at ¶ 35. {¶ 26} Further, "[i]n reviewing the sufficiency of probable cause in an affidavit submitted in support of a search warrant issued by a magistrate, neither a trial court nor No. 14AP-812 9 an appellate court should substitute its judgment for that of the magistrate by conducting a de novo determination as to whether the affidavit contains sufficient probable cause upon which that court would issue the search warrant." State v. George, 45 Ohio St.3d 325 (1989), paragraph two of the syllabus. Rather, it is the duty of a reviewing court to simply "ensure that the magistrate had a substantial basis for concluding that probable cause existed." Id. Thus, "[i]n conducting any after-the-fact scrutiny of an affidavit submitted in support of a search warrant, trial and appellate courts should accord great deference to the magistrate's determination of probable cause, and doubtful or marginal cases in this area should be resolved in favor of upholding the warrant." Id. {¶ 27} In the instant case, with respect to facts relevant to the issue of probable cause, Detective Hunt averred in the affidavit cited above that members of the county's ICAC task force were investigating child exploitation on the internet; specifically, an individual had posted various online advertisements on Craigslist seeking " 'young' females for sex for which he would pay for." The poster placed a personal advertisement, dated September 20, 2011, seeking to "trade young 4 young." The poster stated he had a "really young lover," described as "4ft5in, 70lbs blond," and that he was "looking to find another guy who has the same to share." The investigating detective determined that the above description would "equate" to a girl between the ages of 7 and 13 years. Detective Hunt averred that, based on his training and experience, the advertisement at issue "is consistent with that of an online child sexual predator." {¶ 28} Detective Hunt further averred he had obtained a search warrant to obtain emails of the target of that investigation from Google. On October 12, 2011, the detective received from Google approximately 500 emails. One of the replies "was on 9/27/11 * * * which was an email from jack.flash75@yahoo.com to the target," in which the responder expressed interest in sharing his 13-year-old daughter with the subscriber. The individual, identified as "Jack Flash," had attached a photograph of a "young white juvenile female standing next to a birthday cake with the number '13' on the cake." Detective Hunt noted that Flash and the "target" had exchanged several follow-up emails, in which Flash represented that "mine is 4'9 and she weights about 80lbs." Flash further stated in the email that "shes a very good girl and very accommodating," and Flash indicated he would "love to play." No. 14AP-812 10 {¶ 29} In reviewing the representations in the affidavit, and considering the totality of the circumstances, we find that the affidavit gave the magistrate grounds for determining there was a fair probability that the Yahoo account of Flash contained evidence of solicitation of a minor and/or minors for sexual activity. According deference to that determination, we conclude the magistrate had a substantial basis for finding probable cause to issue the warrant to search the email account at issue. {¶ 30} Such determination, however, does not end the inquiry into the legality of the search warrant. As noted, the focus of the trial court's analysis involved the issue of whether the warrant was overbroad. More specifically, during the suppression hearing, the court's primary inquiry was whether the absence of a temporal limitation rendered the warrant overbroad. {¶ 31} In addition to challenging whether an affidavit provides probable cause that evidence of a crime will be found, a criminal defendant can also challenge an affidavit on the basis that it is overbroad and/or not as particular as the Fourth Amendment requires. State v. Vu, 9th Dist. No. 11CA-0042-M, 2012-Ohio-746, ¶ 25 (In seeking to suppress evidence, a criminal defendant "may challenge the probable cause underlying the warrant, the particularity of the warrant itself, or both."). {¶ 32} In Castagnola, the Supreme Court recently considered "the application of the particularity requirement of the Fourth Amendment to the search of a computer." Id. at ¶ 1. Specifically, the court discussed two issues arising in the context of the particularity requirement: (1) "whether the warrant provides sufficient information to 'guide and control' the judgment of the executing officer in what to seize," and (2) "whether the category as specified is too broad in that it includes items that should not be seized." Id. at ¶ 79. The court further recognized, however, that "[a] search warrant that includes broad categories of items to be seized may nevertheless be valid when the description is ' " 'as specific as the circumstances and the nature of the activity under investigation permit.' " ' " Id. at ¶ 80, quoting Guest v. Leis, 255 F.3d 325, 336 (6th Cir.2001), quoting United States v. Henson, 848 F.2d 1374, 1383 (6th Cir.1988), quoting United States v. Blum, 753 F.2d 999, 1001 (11th Cir.1985). {¶ 33} Under the facts of Castagnola, the defendant, Castagnola, admitted to a law enforcement official that he had damaged a prosecutor's vehicle after having looked up the address of the prosecutor on court records. A detective subsequently sought an arrest No. 14AP-812 11 warrant for Castagnola, as well as a warrant to search his residence. The affidavit requested a warrant to search the premises for records and documents, including those stored on computers and electronic recording devices, and further stated that any items found would be seized and used as evidence in prosecuting the crimes of "retaliation, criminal trespassing, criminal damaging, and possession of criminal tools." Id. at ¶ 5. A warrant was issued, leading to the seizure of numerous items, including two computers. A forensic cyber-crimes analyst, employed by the Ohio Bureau of Criminal Investigation, examined the computers through the use of a forensic software program and found a screen filled with images that she thought might be child pornography. A detective then sought a second warrant to search the contents of the computers for evidence relating to child pornography. Castagnola was subsequently indicted for ten counts of pandering sexually oriented material. {¶ 34} Castagnola moved to suppress the evidence from the search, but the trial court denied the motion and the reviewing court affirmed. The Supreme Court accepted jurisdiction on two propositions of law, including the issue of whether a general exploratory search for evidence on a computer meets the particularity requirement of the Fourth Amendment. {¶ 35} The Supreme Court noted under the facts of the case that the detective believed Castagnola "had found [the prosecutor's] address online and that evidence of the online search would be useful in the prosecution of the alleged offenses." Id. at ¶ 86. The detective testified at the suppression hearing that, in addition to a general Google or online white pages search for the prosecutor's name, he believed Castagnola may have searched a clerk of courts' website for information about the prosecutor because Castagnola mentioned in his conversation with a source that he discovered the prosecutor had received a parking ticket years earlier. The detective further testified that, "from his previous experience, he knew that an online search would create 'a cookie, which will tell you where [the persons who have used the computer] have been, what searches they have done, things of that nature.' " Id. {¶ 36} The Supreme Court determined that the search warrant lacked particularity, and held that the above "details regarding the records or documents stored on the computer should have been included in the search warrant to guide and control the searcher and to sufficiently narrow the category of records or documents subject to No. 14AP-812 12 seizure." Id. at ¶ 87. The court held that "this degree of specificity was required, since the circumstances and the nature of the activity under investigation permitted the affiant to be this specific." Id. {¶ 37} The Castagnola court also addressed the state's argument challenging "the notion that a search warrant must contain a restrictive protocol, methodology, or other strategy for conducting the search in order to satisfy the Fourth Amendment." Id. at ¶ 88. The Supreme Court "agree[d] that the Fourth Amendment does not require a search warrant to specify restrictive search protocols," but further "recognize[d] that the Fourth Amendment does prohibit a 'sweeping comprehensive search of a computer's hard drive.' " Id., quoting United States v. Walser, 275 F.3d 981, 986 (10th Cir.2001). The court thus held that "[t]he logical balance of these principles leads to the conclusion that officers must describe what they believe will be found on a computer with as much specificity as possible under the circumstances," thus enabling the searcher "to narrow his or her search to only the items to be seized." Id. The court found this requirement "especially important when * * * the person conducting the search is not the affiant." Id. {¶ 38} In general, the Warrants Clause of the Fourth Amendment "requires particularity and forbids overbreadth." United States v. Cioffi, 668 F.Supp.2d 385, 390 (E.D.N.Y.2009). As noted by one court, the term "overbreadth" is primarily used to refer to "authorizing seizures in excess of probable cause." United States v. Costin, D.C.Conn. No. 3:05-cr-38 (July 31, 2006). Some courts, however, use this term "more generally, to describe a lack of particularity." Id. {¶ 39} The Supreme Court in Castagnola noted an overlap and interplay between "the probable-cause and particularity requirements." Id. at ¶ 70. Federal courts have recognized that challenges to a warrant on the grounds they are overbroad and lack sufficient particularity, while "somewhat similar in focus," involve "two distinct legal issues: (1) whether the items listed as 'to be seized' in the warrant were overbroad because they lacked probable cause and (2) whether the warrant was sufficiently particularized on its face to provide the necessary guidelines for the search by the executing officers." United States v. Hernandez, S.D.N.Y. No. 09-CR-625 (Jan. 6, 2010), citing United States v. Cohan, 628 F.Supp.2d 355, 359 (E.D.N.Y.2009) ("A warrant * * * can be unconstitutionally infirm in two conceptually distinct but related ways: either by seeking specific material as to which no probable cause exists, or by giving so vague a description No. 14AP-812 13 of the material sought as to impose no meaningful boundaries."). See also In re Grand Jury Subpoenas, 926 F.2d 847, 856-57 (9th Cir.1991) (noting that particularity and breadth are two aspects of specificity, particularity being "the requirement that the warrant must clearly state what is sought," while breadth "deals with the requirement that the scope of the warrant be limited by the probable cause on which the warrant is based"). {¶ 40} In the instant case, appellee argued in his motion to suppress before the trial court that the search warrant was overbroad because it "authorized the sheriff to seize 'any and all emails' in the jack.flash75@yahoo.com account," and because the warrant "did not limit the production of the emails to the particular time frame of the investigation of the September 20, 2011 Craigslist advertisement." (Appellee's Mot. to Suppress at 6.) As to the latter point, appellee argued that the detective exceeded the scope of the warrant by examining emails prior to September 2011, including a review of emails as far back as March 2009. {¶ 41} The trial court, in granting the motion to suppress, agreed with appellee's claim that the warrant was overbroad in that it permitted the search of emails in appellee's Yahoo account without any temporal limitations. The trial court noted that investigators had "requested information from Pennington that was very limited," while "the requested information from Jack Flash was very broad." (July 30, 2014 Tr. at 25.) The court found that Yahoo "could have complied with a narrow request." (July 30, 2014 Tr. at 25.) {¶ 42} A number of federal courts have addressed claims that the use of "any and all" language in a warrant pertaining to the search of electronic data grants the searching officer too much discretion and converts the warrant into a general warrant. The Sixth Circuit approach involves "determining reasonableness on a case-by-case basis." United States v. Neuhard, E.D.Mich. No. 2:15-cr-20425 (Feb. 25, 2016). See also United States v. Richards, 659 F.3d 527, 538 (6th Cir.2011) (noting that "the majority of federal courts have eschewed the use of a specific search protocol and, instead, have employed the Fourth Amendment's bedrock principle of reasonableness on a case-by-case basis"). {¶ 43} In this respect, federal courts have approved search warrants allowing access to the entire contents of an email account "in order to conduct a search for emails within the limited categories contained in the warrant." In re A Warrant for All Content & Other Information Associated with the Email Account xxxxxxx@Gmail.com No. 14AP-812 14 Maintained at Premises Controlled by Google, Inc., 33 F.Supp.3d 386, 394 (S.D.N.Y. 2014) (hereafter "In re Gmail Warrant") (noting that "every case of which we are aware that has entertained a suppression motion relating to the search of an email account has upheld the Government's ability to obtain the entire contents of the email account to determine which particular emails come within the search warrant"). See also United States v. McDarrah, S.D.N.Y. No. 05-CR-1182 (July 17, 2006), aff'd 351 Fed.Appx. 558 (2d Cir.2009) (upholding search warrant seeking "[a]ll stored electronic mail and other stored content" from AOL email account against overbreadth challenge); United States v. Upham, 168 F.3d 532, 535 (1st Cir.1999) (court finding, in case involving search of computer for images of child pornography on computer, that affidavit requesting "[a]ny and all" computer disks and disk drives "was about the narrowest definable search and seizure reasonably likely to obtain the images"); United States v. Deppish, 994 F.Supp.2d 1211, 1215 (D.C.Kan.2014) (upholding warrant requiring "all contents" of Yahoo account for evidence of crimes of sexual exploitation of minors); Richards at 539 (upholding search of defendant's entire internet server and noting that, in "[a]pplying a reasonableness analysis on a case-by-case basis, the federal courts have rejected most particularity challenges to warrants authorizing seizure and search of entire personal or business computers"). {¶ 44} Regarding search warrant challenges based on the lack of temporal limitations, the absence of a date limitation may render a warrant overbroad or insufficiently particular. See United States v. Ford, 184 F.3d 566, 576 (6th Cir.1999) ("Failure to limit broad descriptive terms by relevant dates, when such dates are available to the police, will render a warrant overbroad."). Federal courts, however, appear to generally agree that temporal restrictions are not mandatory. See United States v. DSD Shipping, A.S., S.D.Ala. No. 15-00102-CG-B (Sept. 2, 2015) ("Defendants cite no binding precedent to support the assertion that temporal restrictions are a mandatory requirement of a digital search. Rather, * * * courts consider the totality of the circumstances and in some cases, find that a temporal restriction is part of a series of factors considered rather than a threshold requirement."); United States v. Triumph Capital Group, 211 F.R.D. 31, 58 (D.C.Conn.2002) ("A temporal limitation in a warrant is not an absolute necessity, but is only one indicia of particularity," and therefore "the No. 14AP-812 15 absence of a temporal limitation does not render the warrant a prohibited general warrant."). {¶ 45} Cases in which federal courts have upheld search warrants in the absence of temporal limitations typically look to the nature and circumstances of the criminal activity, as well as a consideration of whether the warrant was "already adequately particularized." United States v. Capote, N.D.Ga. No. 1:15-CR-00338-MHC-CMS (May 5, 2016) ("Because the warrant in this case was already sufficiently particularized based on the subject matter limitation—i.e., evidence relating to the criminal activity under investigation—the lack of an additional time period limitation in the warrant does not render the search unconstitutional."); United States v. Ali El Khateeb, M.D.Fla. No. 8:14- cr-00185-T-23MAP (Aug. 4, 2015), quoting United States v. Smith, 918 F.2d 1501, 1507- 08 (11th Cir.1990) (rejecting claim that warrant's failure to specify a date range rendered it fatally overbroad and defective for the seizure of any emails; rather, because the warrant "limits the seizure of electronic information to that connected with the possession, receipt, and distribution of controlled substances," such " 'nexus' satisfies the practical realities 'that enable the searcher to ascertain and identify things authorized to be seized' "); United States v. Lee, N.D.Ga. No. 1:14-CR-00227-TCB-RGV (July 6, 2015) (rejecting argument that issuance of a search warrant requiring Google to disclose the contents of any electronic communications or files belonging to the relevant account did not satisfy Fourth Amendment's particularity requirement; investigative agents "had 'good reason not to include a temporal limitation in the warrants,' since they did not know, when they obtained the warrants, whether [an internet website] existed in some other form at the time the accounts were first opened in 2004"). {¶ 46} Federal courts have rejected the necessity for temporal limitations in cases involving the search of computers for child pornography, noting the particular difficulties posed in such cases. See, e.g., Deppish at 1220 (finding that "[a] temporal limitation was not reasonable because child pornography collectors tend to hoard their pictures for long periods of time," and further noting "the dynamic nature of email accounts makes it more difficult to limit the scope of emails to particular dates"); United States v. Adams, D.C.Ver. No. 2:14-cr-79 (Aug. 25, 2015) (rejecting claim, in child pornography case, that warrant was overbroad because it did not constrain the search to a particular time frame, and distinguishing between cases involving business records and electronically stored No. 14AP-812 16 child pornography; "there is often no way around the fact that many image files will have to be viewed to ensure that no relevant evidence has been missed"). {¶ 47} Ohio courts have also considered the issue of temporal limitations in the context of the search of electronic devices. In State v. McCrory, 6th Dist. No. WD-09- 074, 2011-Ohio-546, ¶ 38, the court noted the general rule adopted by federal courts that "[t]he absence of a temporal limitation will not automatically render the warrant a prohibited general warrant." Rather, "[a] temporal limitation in a warrant is merely one indicium of particularity." Id. (Collecting federal authorities; citations omitted.) {¶ 48} Under the facts of McCrory, a detective investigated allegations by a woman that the appellant had sexually assaulted her at his residence after she responded to an advertisement on "craigslist.org for a topless maid." Id. at ¶ 2. A municipal judge issued three search warrants based on facts in the detective's affidavit indicating that evidence of rape would be found on the appellant's home computers and peripheral devices. The appellant, who was subsequently charged with gross sexual imposition and pandering sexually oriented material involving a minor, filed a motion to suppress evidence seized from his home computer. {¶ 49} One of the warrants issued in that case authorized the police "to analyze the seized devices and 'recover any emails, documents, photos, or any other documentation pertaining to Craigslist.org, the victim from 08-6911, any phone calls, text messages received or made to the victim of 08-6911 * * * which is in violation of 2907.02 ORC Rape.' " Id. at ¶ 9. The trial court denied the motion to suppress and, on appeal, the appellant raised a challenge that the warrants were insufficiently particular and overbroad because "they described the items to be seized in broad terms without imposing a temporal limitation." Id. at ¶ 32. More specifically, the appellant argued that "a 'narrower description was available to the police, namely a limitation to the time between the [Craigslist] ad placement (June 14, 2008) and the complaint (June 28, 2008).' " Id. at ¶ 33. {¶ 50} The reviewing court in McCrory rejected the appellant's argument, finding that the lack of temporal limitations did not render the warrants overbroad because the warrants "contained sufficient subject-matter limitations to satisfy the particularity requirement." Id. at ¶ 34. The court noted that "[s]ubject-matter limitations sufficient to No. 14AP-812 17 satisfy the particularity requirement include references to the crime or criminal activity at hand, specific persons, or specific types of materials." Id. at ¶ 43. {¶ 51} In the present case, based on this court's review of the record and applicable law, we conclude that the warrant authorizing the search of appellee's Yahoo email account was not overbroad or insufficiently particular. We have previously determined that the magistrate had a substantial basis for finding probable cause to permit the search of the account for evidence of solicitation of a minor and/or minors for sexual activity. The warrant at issue specifically identified the email account to be searched and limited the scope of the search to evidence of a particular crime, i.e., "evidence of the commission of the criminal offense of Compelling Prostitution, [R.C.] 2907.21." See Deppish at 1220 (while affidavit sought disclosure of entire Yahoo email account, it "limited seizure to instrumentalities and evidence tending to show and identify persons engaged in" a specific offense, i.e., "sexual exploitation of children in violation of 18 U.S.C. § 2252(a)"). See also United States v. Tsarnaev, 53 F.Supp.3d 450, 457 (D.C.Mass.2014) (the scope of the warrant was properly limited by "restricting the search to evidence of specified crimes"); State v. Enyart, 10th Dist. No. 08AP-184, 2010-Ohio-5623 ¶ 40 (search warrant not overbroad where it "named the items to be seized in reference to the crimes of voyeurism and pandering, thus limiting the search to items related to the offense"). {¶ 52} The fact that the warrant in this case authorized the search of "any and all" emails in the account did not render it impermissibly overbroad or facially invalid. As noted, federal courts have in general upheld the government's ability to "obtain the entire contents" of an email account in order to determine "which particular emails come within the search warrant." In re Gmail Warrant at 394 (collecting cases; citations omitted.) See also United States v. Grimmett, 439 F.3d 1263, 1271 (10th Cir.2006) (warrant authorizing agents to search "any and all" computer equipment was not overbroad because it contained "sufficiently particularized language requiring a nexus with child pornography"). {¶ 53} Nor do we find the lack of a temporal limitation to be dispositive under the circumstances. As cited above, courts have generally determined there is no blanket requirement that warrants have a date restriction. During the suppression hearing in this case, Detective Hunt testified that he was concerned there was "a live victim that was being molested in real time" (i.e., a minor being traded for sex) that he needed to identify No. 14AP-812 18 and locate. (July 7, 2014 Tr. at 13.) As noted by the state, one of the emails from Flash, and identified in the affidavit, stated that the girl he was offering to trade for sex was "a very good girl and very accommodating," suggesting that Flash had traded the minor for sex in the past. The detective also averred in the affidavit that he sent Yahoo a preservation letter to save additional emails from this individual, including those to "possibly other suspects," and that the investigation was "still on-going." {¶ 54} Thus, at the time of the affidavit, investigators knew that an individual using a Yahoo email account and the moniker "Jack Flash" had responded to an advertisement by a poster seeking to "trade young 4 young," and that Flash in turn had offered to trade a minor for sex; the ICAC task force, however, did not have information regarding the identity of Flash or the girl, and whether Flash had previously arranged through emails to trade the girl for sex. The state argues that, based on the information available at the time, including language in the emails suggesting Flash had traded an "accommodating" minor in the past, Detective Hunt had a valid reason not to include a temporal limitation. We agree and find it was reasonable for the magistrate reviewing the affidavit to conclude that emails in the Yahoo account predating the exchanges between Flash and Pennington might contain evidence relating to solicitation of a minor. See United States v. McDarrah, 351 Fed.Appx. 558, 561 (2d Cir.2009) (rejecting claim that warrant to search entire contents of AOL account was overbroad as not limited to email messages between defendant and "Julie" or "David Smith"; magistrate "could have determined there was ample evidence that a crime was committed and strong indication that further evidence of criminal activity could be found in e-mails between McDarrah and people other than 'Julie' and 'David Smith' "); Richards at 541 ("In light of the information known at the time the search warrant was issued," warrant authorizing search of entire server was not overbroad.); Lee (even though certain emails may have "predated the alleged onset" of criminal activity, such emails "might nevertheless prove relevant" in determining the identity of the defendants involved, and could be important for "authenticating the evidence and laying a proper foundation"). Based on the record presented, we conclude that the warrant in this case was " ' "as specific as the circumstances and the nature of the activity under investigation permit[ted]." ' " Castagnola at ¶ 80, quoting Leis at 336, quoting United States v. Henson, 848 F.2d 1374, 1383 (6th Cir.1988), quoting United States v. Blum, 753 F.2d 999, 1001 (11th Cir.1985). No. 14AP-812 19 {¶ 55} Additionally, we note that Detective Hunt testified that he conducted the search of the email account employing a limiting methodology. Specifically, the detective performed a filtering procedure by restricting his review of the emails to those with attachments, hoping to discover the identity of the 13-year-old girl depicted in the photograph in the email sent by appellee. See, e.g., Deppish at 1220 (although warrant did not identify a particularized search strategy, agent employed such a strategy; "[h]e did not search or view the entirety of the emails in the YAHOO account," but, rather, he "performed a keyword, filtered search, to focus on those emails that would probably contain instrumentalities and evidence * * * tending to show and identify persons engaged in sexual exploitation of children"). See also Grimmett at 1270 (even though warrant authorized search of "any and all computer software," there was no evidence of "exploratory rummaging" as agent "testified that he specially searched for files with images," and thus "[n]o wholesale searching occurred here, despite the broad authority the warrant may have granted"). Similarly, the facts of this case do not suggest evidence of such "exploratory rummaging," nor does the record indicate the search method employed by the detective was unreasonable. {¶ 56} On review, we do not find that the search warrant at issue was impermissibly overbroad or that it was particularly insufficient. Accordingly, we conclude that the trial court erred in granting appellee's motion to suppress evidence with respect to the search of appellee's Yahoo email account. {¶ 57} Appellee has submitted, as supplemental authority, the Supreme Court's recent decision in Castagnola. We find, however, the facts of that case, as well as the particularity concerns addressed therein, are distinguishable and do not compel a determination that the search warrant at issue in this case was invalid. {¶ 58} In general, Castagnola stands for the proposition that "[t]he particularity demanded from a search warrant is contingent upon the government's knowledge and the particular circumstances of the case." State v. Knoefel, 11th Dist. No. 2014-L-088, 2015- Ohio-5207, ¶ 129, citing Castagnola at ¶ 80. As noted in our earlier discussion of Castagnola, the Supreme Court, in finding that the language of the search warrant did not "guide and control" the judgment of the forensic examiner, cited testimony by the examiner that "Castagnola's computer was brought in for a case involving 'menacing, threatening, and intimidation,' " and that the "analyst read the case synopsis and the No. 14AP-812 20 search-warrant affidavit and then looked at all the information on the hard drive 'looking for any evidence of intimidation of David * * * and anything associated with that.' " Id. at ¶ 83. The court found "the determination on what to seize was within [the forensic examiner's] discretion." Id. Further, the broad language of the warrant permitted the forensic examiner "to examine every record or document on Castagnola's computer in order to find any evidence of the alleged crimes." Id. at ¶ 84. Noting testimony by the detective as to his knowledge of Castagnola's online activities in seeking information about the law director, as well as the detective's general knowledge about an online search creating a "cookie," the Supreme Court found "those details regarding the records or documents stored on the computer should have been included" in the search warrant to guide and control the searcher because "the circumstances and the nature of the activity under investigation permitted the affiant to be this specific." Id. at ¶ 86, 87. {¶ 59} By contrast, the investigators in the present case did not possess that type of knowledge and information. Stated otherwise, under the facts of Castagnola, the police were "capable of providing greater particularity" based on the amount of knowledge they possessed regarding the object of the search. Knoefel at ¶ 129 (distinguishing the facts of Castagnola). Additionally, the concerns raised by the scope of the search conducted under the facts of Castagnola (permitting the forensic examiner "to examine every record or document on Castagnola's computer in order to find any evidence of the alleged crimes") are not present in the instant case. Castagnola at ¶ 84. As previously noted, the warrant at issue in this case authorized police to search for evidence related to a specific offense, and Detective Hunt limited his review of the emails to those with attachments, hoping to discover the identity of the 13-year-old girl described by appellee in the email he sent to Pennington.1 1 We note that the facts of the instant case, in which the detective who submitted the affidavit was involved in the investigation and search, do not raise an additional concern noted by the Supreme Court in Castagnola regarding scenarios in which a mistaken search can occur where "the person conducting the search [i.e., the forensic analyst] is not the affiant." Castagnola at ¶ 88. No. 14AP-812 21 {¶ 60} Based on the foregoing, we conclude that the trial court erred in granting appellee's motion to suppress evidence seized from his Yahoo email account.2 We therefore sustain the state's single assignment of error. {¶ 61} Accordingly, having sustained the state's assignment of error, the judgment of the Franklin County Court of Common Pleas is reversed, and this matter is remanded to that court for further proceedings in accordance with law, consistent with this decision. Judgment reversed and cause remanded. DORRIAN, P.J., concurs. BRUNNER, J., dissents. BRUNNER, J., dissenting. {¶ 62} I respectfully dissent from the decision of the majority. I would overrule the State's sole assignment of error and affirm the judgment of the trial court. I would hold that a search warrant based on a single suspicious e-mail conversation that purported to authorize the search of any and all e-mails regardless of sender, recipient, subject, date, or status (opened, unopened, deleted, sent, or forwarded) or duration of e-mail account was unconstitutionally overbroad. The executing officer (who was also the affiant for the search warrant) was not justified in relying on it. I would hold that the fruits of that search and other derivative searches traceable to such a warrant were properly excluded. {¶ 63} In considering whether a warrant is unconstitutionally overbroad, reviewing courts must conduct a de novo review. State v. Dingess, 10th Dist. No. 10AP-848, 2011- Ohio-5659, ¶ 32, citing State v. Enyart, 10th Dist. No. 08AP-184, 2010-Ohio-5623, ¶ 38; State v. Gritten, 11th Dist. No. 2004-P-0066, 2005-Ohio-2082, ¶ 11; United States v. Ford, 184 F.3d 566, 575 (6th Cir.1999). {¶ 64} The authority for finding a warrant overbroad finds its origins in the plain text of the Fourth Amendment. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, 2 The trial court did not reach the merits of appellee's constitutional challenge to the second warrant, authorizing the search of the Hunter Avenue residence. We leave it to the trial court to decide in the first instance, on remand, that issue. No. 14AP-812 22 and particularly describing the place to be searched, and the persons or things to be seized. (Emphasis added.) "It is familiar history that indiscriminate searches and seizures conducted under the authority of 'general warrants' were the immediate evils that motivated the framing and adoption of the Fourth Amendment." Payton v. New York, 445 U.S. 573, 583 (1980); see also id. at 583-85, fn. 21, quoting Stanford v. Texas, 379 U.S. 476, 481-82 (1965); Boyd v. United States, 116 U.S. 616, 625 (1886). "[S]earches deemed necessary should be as limited as possible. [T]he problem is not that of intrusion per se, but of a general, exploratory rummaging in a person's belongings." (Emphasis sic.) Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971). This Court has observed, " '[t]o search for evidence of a crime there must "be a nexus * * * between the item to be seized and criminal behavior" as well as "cause to believe that the evidence sought will aid in a particular apprehension or conviction." ' " Dingess at ¶ 33, quoting Enyart at ¶ 32, quoting Warden, Maryland Penitentiary v. Hayden, 387 U.S. 294, 307 (1967). {¶ 65} The majority decision spends significant effort in discussing and distinguishing the recent Supreme Court of Ohio decision finding that a warrant that purported to authorize a search of a computer was insufficiently particular where it failed to limit the search within the computer to particular subjects and sought instead merely "[r]ecords and documents stored on the computer." State v. Castagnola, 145 Ohio St.3d 1, 2015-Ohio-1565, ¶ 77. In reaching this finding, the Supreme Court explained: Courts addressing the particularity requirement of the Fourth Amendment are concerned with two issues. The first issue is whether the warrant provides sufficient information to "guide and control" the judgment of the executing officer in what to seize. United States v. Upham, 168 F.3d 532, 535 (1st Cir.1999). The second issue is whether the category as specified is too broad in that it includes items that should not be seized. See United States v. Kow, 58 F.3d 423, 427 (9th Cir.1995). A search warrant that includes broad categories of items to be seized may nevertheless be valid when the description is " ' "as specific as the circumstances and the nature of the activity under investigation permit." ' " Guest v. Leis, 255 F.3d 325, 336 (6th Cir.2001), quoting United States v. Henson, 848 F.2d 1374, 1383 (6th Cir.1988), quoting United States v. Blum, 753 F.2d 999, 1001 (11th Cir.1985). Warrants that fail to No. 14AP-812 23 describe the items to be seized with as much specificity as the government's knowledge and the circumstances allow are "invalidated by their substantial failure to specify as nearly as possible the distinguishing characteristics of the goods to be seized." United States v. Fuccillo, 808 F.2d 173, 176 (1st Cir.). Because computers can store a large amount of information "there is a greater potential for the 'intermingling' of documents and a consequent invasion of privacy when police execute a search for evidence on a computer. * * * Officers must be clear as to what it is they are seeking on the computer and conduct the search in a way that avoids searching files of types not identified in the warrant." United States v. Walser, 275 F.3d 981, 986 (10th Cir.2001). "[P]ractical accuracy rather than technical precision" is the operative consideration. United States v. Dorrough, 927 F.2d 498, 500 (10th Cir.1991). Castagnola at ¶ 79-81. The Supreme Court also explained the fact that the records "would be used to prosecute Castagnola for the crimes of retaliation, criminal trespassing, criminal damaging, and possession of criminal tools, added nothing to narrow the search." Id. at ¶ 82. "As written," the Court concluded, "this search warrant failed to address both concerns that courts consider when determining whether a warrant satisfies the particularity requirement of the Fourth Amendment." Id. {¶ 66} In judging the validity of a warrant we are limited to the information that was presented to the magistrate which, in cases without a hearing, confines our analysis to the four corners of the warrant affidavit. Castagnola at ¶ 39; State v. Bean, 13 Ohio App.3d 69, 71 (6th Dist.1983). Here the warrant affidavit set forth the facts known to the police that justified the suspicion that evidence of a crime might be found at Yahoo!, Inc. ("Yahoo") as follows: [The target of another investigation, on] Tuesday, September 20, 2011, [posted an advertisement on Craigslist:] "trade young 4 young (Columbus) I have a really young lover looking to find another guy who has the same to share. Mine is 4ft5in, 70lbs blonde, very little hair and has only been with me. If u are interested send pics, stats of yours and if I like we might do some trading. Or I can give benefits to u.No questions asked. I'm clean whaite and safe." *** No. 14AP-812 24 One of the replies to the target was on 9/27/11 @ 1:56 PM which was an email from jackflash75@yahoo.com to the target expressing interest in sharing his 13 y.0. daughter with the [target]. "Jack Flash" attached a photograph of a young white juvenile female standing next to a birthday cake with the number "13" on the cake. "Jack Flash" and the target exchanged several follow-up emails between each other from 1:56 PM and 3:17 PM. One email from "Jack Flash" stated: "mine is 4'9 and she weighs about 80lbs. shes a very good girl and very accommodating. do you have a pic of yours i could see? and where in columbus are you? id love to play" This description matched that of the earlier noted photograph sent by "Jack Flash" to the target. (Sic passim.) (State's Ex. B at 2-3.) Based on this information, Detective Hunt sought and obtained a warrant to search Yahoo and seize, "any and all emails including opened, unopened, sent, forwarded, deleted [as to] the email account of Jack Flash," as well as information regarding "other email accounts." Id. at 2. {¶ 67} Like computers, e-mail accounts "can store a large amount of information" and thus, as is true of computer searches, " 'there is a greater potential for the "intermingling" of documents and a consequent invasion of privacy when police' " seek to search through a person's e-mails. Castagnola at ¶ 81, quoting United States v. Walser, 275 F.3d 981, 986 (10th Cir.2001). Consequently, "[o]fficers must be clear as to what it is they are seeking" and avoid seizing or searching "types [of e-mails] not identified in the warrant." Id. Applying the reasoning set forth by Castagnola to this case, the warrant sought and obtained by Detective Hunt was insufficiently particular to satisfy constitutional requirements. The warrant affidavit presented evidence that "Jack Flash" had responded to an advertisement one afternoon in September 2011 that appeared to propose the exchange of juvenile children for sexual purposes. The affidavit presented no evidence to suggest that "Jack Flash" had followed through on the trade or that the would- be crime actually materialized past the planning stages, nor did it present any evidence No. 14AP-812 25 that "Jack Flash" had ever attempted such a trade before.3 "Jack Flash's" description of a girl as "very accommodating" implied that he had some experience with her willingness to engage in sexual behavior. (State's Ex. A at 6.) But the affidavit did not explain why evidence of "Jack Flash's" sexual activities with this girl would be contained in e-mails, let alone explain the need to seize every e-mail "opened, unopened, sent, forwarded, [or] deleted" from "Jack Flash's" e-mail account regardless of subject, sender, or recipient for the entire history of the account's existence or why information about "other email accounts" would be pertinent. (State's Ex. B at 2.) {¶ 68} In short, like the warrant in Castagnola, the warrant here does not "guide and control" the judgment of the executing officer in what to seize (because it essentially commands the officer to seize everything), and the category as specified is too broad in that it includes items that should not be seized (thousands of unrelated and irrelevant private communications). Castagnola at ¶ 79, citing United States v. Upham, 168 F.3d 532, 535 (1st Cir.1999); United States v. Kow, 58 F.3d 423, 427 (9th Cir.1995). This warrant, which purported to authorize the seizure of literally every e-mail to pass through the jack.flash75 account for the entire duration of the account's existence, irrespective of sender, recipient, or subject, was the quintessential "general, exploratory rummaging in a person's belongings." Coolidge at 467. {¶ 69} The State argues that the broad scope of the warrant was justified by the need to determine "whether, when, how often, and with whom 'Jack Flash' had offered up the girl for sex in the past, and any other children involved." (State's Brief at 9.) However, the concept that "Jack Flash" had ever "offered up [this] girl for sex in the past, and any other children," is post hoc speculation unsupported at its inception by an evidentiary basis. Id. at 9. The affidavit contains no factual information that "Jack Flash" had used e-mail to offer this girl or any other children for sex before, and the affiant did not offer an opinion based on a factual reason to suspect that he had. (State's Ex. B at 2.) {¶ 70} Warrants issue upon probable cause, and the basis for probable cause is fact, not speculation. Miller v. Sanilac Cty., 606 F.3d 240, 248 (6th Cir.2010), quoting Henry v. United States, 361 U.S. 98, 102 (1959) (defining probable cause as "when 'the facts and circumstances * * * warrant a prudent [person] in believing that an offense has 3 Shaskus apparently did not actually have a daughter and stated he had no idea who the girl was in the No. 14AP-812 26 been committed.' "). The speculation that the State proposes to indulge is little different from arguing that there is probable cause to search the house of a suspected burglar for the loot of other, different burglaries on the theory that if a burglar has committed one burglary, he must have committed others. {¶ 71} The reasons supporting probable cause must be contained in the warrant affidavit. It is not sufficient to offer them for the first time (such as in a suppression hearing or an appellate brief) long after the warrant has been executed. Castagnola at ¶ 39; Bean at 71. Only by post hoc speculation could one conclude from the warrant affidavit that "Jack Flash's" e-mails (other than e-mails related by time, senders, or subjects, to the conversation that justified the search warrant) would show evidence of other crimes. (State's Ex. B at 2-3.) {¶ 72} The State argues that the warrant was justified by the need to determine the identity of the girl in the photograph and the need to determine "Jack Flash's" identity. I acknowledge that it was important to the investigation to attempt to discern the identity of "Jack Flash" and his purported "daughter." However, "Jack Flash's" identity (and the identity of his "daughter") could have been readily ascertained by requesting records from Yahoo regarding the IP address and identity of the owner of the e-mail account. In fact, in addition to the request for "all emails," the warrant specifically sought exactly those records from Yahoo. It was through "Jack Flash's" IP address, not his e-mails, that the residence was located. Courts have discouraged the practice of using the search for background investigative facts as a justification for searches beyond the scope of probable cause. Ford at 576; United States v. Srivastava, 476 F. Supp.2d 509, 514 (D.Md.2007). {¶ 73} Even assuming the validity of the State's basis for a warrant authorizing a broader search of the e-mails, the scope of the warrant was still too broad. In United States v. Abboud, 438 F.3d 554, 575-76 (6th Cir.2006), the United States Sixth Circuit Court of Appeals found a warrant was overbroad where it sought records from a six-year time span when the facts in the affidavit only evidenced a check-kiting scheme spanning three months. Id. (ultimately finding the error was harmless). The Sixth Circuit has moreover explained, "[f]ailure to limit broad descriptive terms by relevant dates, when such dates are available to the police, will render a warrant overbroad." Ford at 576. picture with the cake and "13" candle. (State's Ex. A at 7.) No. 14AP-812 27 {¶ 74} In this case the evidence for the search warrant consisted of one conversation related to a Craigslist advertisement between two persons on the afternoon of September 27, 2011. Yet, the warrant authorized the search and seizure of "all emails" regardless of date, subject, sender, or recipient, "opened, unopened, sent, forwarded, [or] deleted," and it even authorized the collection of records relating to "other email accounts." (State's Ex. B at 2.) Depending on the age of the jack.flash75 account, the warrant could have authorized the seizure of decades of e-mail. The record does not reflect how old the jack.flash75@yahoo.com address was, but it is undisputed that "well over 3,000 emails" were seized. (State's Ex. C at 5.) In the "well over 3,000 emails" the police found just one culpable conversation involving child pornography in March 2009— two and one-half years before the Craigslist conversation that purported to justify the search. Id. {¶ 75} The majority notes that the officer somewhat limited his examination of the e-mails by examining only those that had attachments. (Majority decision at ¶ 14.) The majority also states that, "federal courts have approved search warrants allowing access to the entire contents of an email account 'in order to conduct a search for emails within the limited categories contained in the warrant.' " (Emphasis added.) (Majority decision at ¶ 43, quoting In re A Warrant for All Content & Other Info. Associated with the Email Account xxxxxxx@Gmail.com Maintained at Premises Controlled by Google, Inc., 33 F.Supp.3d 386, 394 (S.D.N.Y.2014)). However, I would respectfully view those observations as a whole as a proverbial red herring, because Shaskus' case does not involve a large volume of e-mails that were copied and then reviewed according to limitations set forth in a warrant, but rather, a large volume of e-mails seized with no such limitations in the warrant. {¶ 76} I acknowledge that in the context of electronic records, the police may sometimes end up with a copy of an account because perhaps a third-party custodian (like Yahoo) will not wish to search through the e-mail account itself in order to identify materials implicated by a limited warrant even though authorized to do so. But regardless of whether Yahoo or any other similarly situated custodian makes a copy of the entire account, makes a copy of part of the account, or invites the police on-site to inspect material in its data center, in order to be constitutionally valid, the warrant must still direct the police as to what material to search and seize as evidence. The mere fact that No. 14AP-812 28 the nature of electronic records dictates that they reside with a third party and that it is sometimes more practical to search a copy in the police station rather than search the original at the data center, does not mean that the warrant authorizing and limiting the search is relieved of the particularity requirements of the Fourth Amendment. As the Sixth Circuit Court of Appeals in Ford, put it, "[f]ailure to limit broad descriptive terms by relevant dates, when such dates are available to the police, will render a warrant overbroad." Id. at 576. In other words, where, as here, the police know what time-frame is involved, they cannot constitutionally ignore the limits of probable cause and instead seek and act on a warrant with unlimited broad descriptive terms. Because if a warrant is based on probable cause as to a limited time frame but authorizes unlimited search and seizure, it is overbroad. {¶ 77} The evidence seized (e-mails and attachments) during the search of Yahoo was appropriately suppressed. See United States v. Wong Sun, 371 U.S. 471, 487-88 (1963). The trial court was also justified in suppressing the evidence found on Shaskus' computer during the search of his residence. The warrant to search Shaskus' residence authorized a search of "a computerized information system" to discover "evidence of the commission of the criminal offenses of Pandering Obscenity Involving a Minor, 2907.32 R.C.; Illegal Use of a Minor in Nudity Oriented Material, 2907.323 R.C.; Disseminating Matter Harmful to Juveniles, 2907.31 R.C.; [and] Endangering Children, 2991.22 R.C. " (State's Ex. C at 1.) {¶ 78} The motivator for the search of Shaskus' house and computer was finding child pornography, extended from the original suspicion that Shaskus had a daughter whom he was attempting to trade for sex. The pornography found on Shaskus' computer was "fruit of the poisonous tree." It was found during a search of computer equipment and supported by the child pornography evidence obtained in the unconstitutionally overbroad search of Yahoo. Id. at 487-88. As the Supreme Court of Ohio held: The exclusionary rule reaches not only primary evidence obtained as a direct result of an illegal search or seizure, but also evidence later discovered and found to be derivative of an illegality, or "fruit of the poisonous tree." Nardone v. United States (1939), 308 U.S. 338, 60 S.Ct. 266, 84 L.Ed. 307. The reason for the rule is the concern that if derivative evidence were not suppressed, police would have an incentive to violate constitutional rights in order to secure admissible derivative No. 14AP-812 29 evidence even though the primary evidence secured as a result of the constitutional violation would be inadmissible. See Katz, Ohio Arrest, Search and Seizure (3 Ed.1992), Section 2.07. Justice Frankfurter explained in Nardone, "To forbid the direct use of methods thus characterized but to put no curb on their full indirect use would only invite the very methods deemed 'inconsistent with ethical standards and destructive of personal liberty.'" Nardone, supra, at 340, 60 S.Ct. at 267, 84 L.Ed. at 311. State v. Carter, 69 Ohio St.3d 57, 67 (1994). {¶ 79} The majority decision does not reach the State's good-faith argument, because it reverses the trial court's decision. That argument should be addressed, because of its tendency to be used incorrectly to excuse an unconstitutional search and seizure in violation of the Fourth Amendment. The State argues that the police relied in good faith on warrants to search both Yahoo and Shaskus' home and computer. That is, the State contends that an exception to the exclusionary rule arises because the officers relied in good faith on the warrants, and the evidence therefore should not have been excluded. Id.; United States v. Leon, 468 U.S. 897 (1984). {¶ 80} However, the "good faith" exception to the exclusionary rule set forth in Leon does not operate where "a warrant [is] so facially deficient -- i.e., in failing to particularize the place to be searched or the things to be seized -- that the executing officers cannot reasonably presume it to be valid." Id. at 923; see also, e.g., Gritten at ¶ 20. Here, the Yahoo warrant purported to authorize the seizure of "any and all emails" for the entire account history irrespective of sender, recipient, or subject and whether the e-mails were "opened, unopened, sent, forwarded, [or] deleted," and it even extended to the collection of records relating to "other email accounts." (State's Ex. B at 2.) Absent evidence of pervasive, continuous, and long-standing use of this and other e-mail accounts for criminal activity, this warrant was facially overbroad; it was so much so that Detective Hunt (who was the affiant and thus knew that the evidence justifying the warrant consisted of a single suspicious conversation on a single afternoon between just two persons) could not have reasonably presumed it to be valid. {¶ 81} With respect to the warrant to search Shaskus' computer and home, the Supreme Court has held, "[t]he good-faith exception does not apply where a search warrant is issued on the basis of evidence obtained as a result of an illegal search." Carter No. 14AP-812 30 at 68. Were the rule otherwise, an officer could violate the United States Constitution to obtain incriminating evidence, "launder" that evidence by presenting it to a magistrate in order to obtain a warrant for a further search, and then rely on the good faith of officers executing the warrant to avoid the exclusion of incriminating evidence found pursuant to the warrant search. See Nardone v. United States, 308 U.S. 338, 340-41 (1939); see also, e.g., Murray v. United States, 487 U.S. 533, 540 (1988); Carter at 67. {¶ 82} For the reasons set forth in this dissent, I would overrule the State's sole assignment of error and affirm the judgment of the trial court. _____________________