In Re Appeal of Application for Search Warrant

Dooley, J.

¶ 1. In this complaint for extraordinary relief, we are asked to determine whether a judicial officer has discretion to attach ex ante or prospective conditions to a search warrant. The State petitions this Court to strike ten such conditions pertaining to the search of a personal computer, seized by police as part of an identity theft investigation. The State contends that the conditions exceed the judicial officer’s authority under the Fourth Amendment and unnecessarily impede law enforcement’s ability to investigate crime. Two amici have filed briefs in opposition to the State’s petition, and they argue that the conditions are a valid exercise of the judicial officer’s authority and are necessary to protect personal privacy. We grant the petition in part and strike the condition abrogating the plain view doctrine. Because we conclude that the remaining conditions serve legitimate privacy interests, the petition is otherwise denied.

2. In December 2010, a Burlington Police Detective was assigned to investigate an identity theft case transferred from the New York State Police. In conjunction with the investigation, he applied for a warrant to search a home at 145 Pleasant Avenue in *57Burlington. The affidavit submitted in support of the warrant recites the following facts.

¶ 3. The crime was reported by a resident of New York. In an interview with the Vermont detective, the victim stated that someone had fraudulently attempted to apply for credit cards online using his name and identifying information and to change his address with the United States Postal Service. Based on this information, the detective contacted one of the banks involved and obtained the internet protocol (IP)1 address that was used to submit one of the fraudulent credit card applications. The bank also provided the information submitted in the online application, which listed the victim’s true name and social security number, but contained other information that was false, including an address of 145 Pleasant Ave., Burlington, Vermont, and an electronic mail address of gulfields@aol.com. Both police and motor vehicle records indicate that 145 Pleasant Avenue is occupied by Eric Gulfield.

¶ 4. From the internet service provider, the detective learned that at the time the fraudulent application was submitted online, the IP address used belonged to a subscriber listed at 134 Pleasant Avenue. The detective visited the location and observed that there was an open (unprotected by a password) wireless internet (WIFI) connection coming from 134 Pleasant Avenue. He determined that the signal was likely strong enough to access from 145 Pleasant Avenue. The detective interviewed the resident of 134 Pleasant Avenue and obtained permission to access the router log to determine if other computers had used the wireless connection. From this log, the detective discovered that the previous month the router was accessed several times by a computer with an assigned name of GulfieldProp-PC.

¶ 5. Based on the foregoing information, the detective applied for a warrant to search 145 Pleasant Avenue for “evidence of the crime of Identity Theft.” The application requested permission to seize records “in whatever form they are found,” including any computers or other electronic medium. An attachment described the property to be seized in more detail, including:

*58Any computers or electronic media, including hard disks, magnetic tapes, compact disks (“CD”), digital video disks (“DVD”), cell phones or mobile devices and removable storage devices such as thumb drives, flash drives, secure digital (“SD”) cards or similar devices, floppy disks and zip disks (hereinafter “MEDIA”) that were or may have been used as a means to commit the offense described on the warrant.

The application did not list one person as the target of the search; rather, it noted that multiple people were living in the target address and requested permission to seize electronic devices regardless of ownership. As justification, the affidavit explained that electronic information may be easily moved between different computers and other electronic storage devices.

¶ 6. Reciting general information about the large volume of information stored on a computer, the technical expertise required to search data that can be hidden, password protected, or encrypted, and the time involved in such a search, the application requested authorization to seize any computers for search off-site. The application further stated:

In some cases, it is possible for law enforcement officers and forensic examiners to conduct carefully targeted searches that can locate evidence without requiring a time-consuming manual search through unrelated materials that may be commingled with criminal evidence. In other cases, however, such techniques may not yield the evidence described in the warrant. Criminals can mislabel or hide files and directories, encode communications to avoid using key words, attempt to delete files to evade detection, or take other steps designed to frustrate law enforcement searches for information. These steps may require agents and law enforcement or other analysts with appropriate expertise to conduct more extensive searches, such as scanning areas of the disk not allocated to listed files, or peruse every file briefly to determine whether it falls within the scope of the warrant. In light of these difficulties, the [applicant] intends to use whatever data analysis techniques appear necessary to locate and retrieve the evidence ....

*59¶ 7. The judicial officer reviewing the request granted a warrant to search the residence and to seize electronic devices to be searched at an off-site facility for as long as reasonably necessary. In a separate order, however, the judicial officer stated only that “[t]he application to search the computer belonging to Eric Gulfield is granted,” and attached conditions: (1) restricting the police from relying on the plain view doctrine to seize any incriminatory electronic record not authorized by the warrant — that is, “any digital evidence relating to criminal matters other than identity theft offenses”; (2) requiring third parties or specially trained computer personnel to conduct the search behind a “firewall” and provide to State investigatory agents only “digital evidence relating to identity theft offenses”2; (3) requiring digital evidence relating to the offenses to be segregated and redacted from surrounding nonevidentiary data before being delivered to the case investigators, “no matter how intermingled it is”; (4) precluding State police personnel who are involved in conducting the search under condition (2) from disclosing their work to prosecutors or investigators; (5) limiting the search protocol to methods designed to uncover only information for which the State has probable cause; (6) precluding the use of specialized “hashing tools” and “similar search tools” without specific authorization of the court; (7) allowing only evidence “relevant to the targeted alleged activities” to be copied to provide to State agents; (8) requiring the State to return “non-responsive data” and to inform the court of this action; (9) directing police to destroy remaining copies of electronic data absent judicial authorization otherwise; and (10) requiring the State to file a return within the time limit of the warrant3 to indicate precisely what data were obtained, returned, and destroyed. Law enforcement conducted a search of the premises and seized, but did not search, a personal computer and an iPad.4

*60¶ 8. The State then filed a motion for extraordinary relief in this Court requesting that the Court strike the ex ante conditions from the warrant. In support of its petition, the State argues that the judicial officer lacked authority to impose ex ante restrictions on the search; that the conditions are unnecessary and impede legal development in the area of computer searches; and that the conditions impermissibly impede effective law enforcement investigation. The Defender General and the American Civil Liberties Union (ACLU)5 submitted briefs as amici curiae in opposition to the State’s petition.6 The ACLU argues that computers are fundamentally different from paper records or filing cabinets because of the vast volume of personal data stored in a computer and due to a computer’s unique ability to retain hidden and deleted information and to act as a portal to other remote storages of information. To protect privacy, the ACLU argues that the Fourth Amendment demands more stringent requirements to search electronic devices. The Defender General argues that such conditions are key to protecting privacy under Article 11 of the Vermont Constitution. Therefore, both amici contend that the conditions are necessary and not beyond the judge’s discretion in issuing a warrant.

I.

¶ 9. We first must address the jurisdictional grounds for this action. This is an original jurisdiction case instigated by the State’s direct petition for extraordinary relief. Extraordinary relief is a “flexible procedure” that is available when all other avenues are closed. In re Vt. Sup. Ct. Admin. Directive No. 17, 154 Vt. 392, 397, 579 A.2d 1036, 1039 (1990). Extraordinary relief is, however, limited to when “there is no adequate remedy by appeal” or by filing for extraordinary relief in the superior court. V.R.A.P. 21(b). In this case, there is no remedy by appeal because the State has no right of appeal from a judge’s decision to grant, but condition, a warrant request. See 13 V.S.A. § 7403 (limiting State’s *61ability to appeal in criminal cases to situations where prosecution has begun). The State argued that this is a rare case where extraordinary relief is appropriately brought in this Court in the first instance because the issue raised is a pure question of law that requires no factual development. Cf. In re Hill, 149 Vt. 86, 86, 539 A.2d 992, 993 (1987) (per curiam) (dismissing petition for extraordinary relief where issues could be dealt with in the course of litigation and on appeal if necessary).

¶ 10. The Defender General moved to dismiss the petition for lack of jurisdiction, arguing that there was no live controversy because the State’s contention of injury was speculative and that there were other available means for relief. The Defender General contended that the State should file its petition for extraordinary relief in the civil division in the first instance for further factual development. This Court denied the motion. We now reaffirm that denial. The petition for relief may be decided by this Court in the first instance given that the State is challenging the judicial officer’s authority to impose the conditions, as in the nature of a mandamus action, which is a purely legal question that requires no evidentiary analysis. See, e.g., State v. Saari, 152 Vt. 510, 514-15, 568 A.2d 344, 347 (1989).

¶ 11. Although we conclude that there is jurisdiction, we also emphasize that extraordinary relief in the nature of mandamus is a limited remedy. It is to be granted only when the State shows that the judge’s decisions “were usurpations of judicial power, clear abuses of discretion, or arbitrary abuses of power.” State v. Pratt, 173 Vt. 562, 563, 795 A.2d 1148, 1149 (2002) (mem.). Therefore, we must determine whether the judicial officer’s decision to impose ex ante restrictions was an abuse of power, clearly contrary to law.

II.

¶ 12. Having found jurisdiction, we consider the scope of this appeal. The central premise of the judicial officer who issued the warrant, a premise reiterated by amici, is that the State is bound by the warrant conditions, hereinafter referred to as instructions. In general, this is settled law: warrant instructions are binding so that a violation of them renders the search unconstitutional. United States v. Brunette, 76 F. Supp. 2d 30, 42 (D. Me. 1999) (“It is settled law that the search and seizure of evidence, conducted *62under a warrant, must conform to the requirements of that warrant”). Enforcing an issuing judicial officer’s directions ensures that the warrant requirement is meaningful and effective. See United States v. Leon, 468 U.S. 897, 914 (1984) (“[T]he preference for warrants is most appropriately effectuated by according ‘great deference’ to a magistrate’s determination.” (quoting Spinelli v. United States, 393 U.S. 410, 419 (1969))). Thus, for example, a failure to abide by the warrant’s time restrictions may be cause for suppression of evidence obtained in the search pursuant to the warrant. See Sgro v. United States, 287 U.S. 206, 211 (1932); United States v. Bedford, 519 F.2d 650, 655 (3d Cir. 1975) (“If the police were allowed to execute the warrant at leisure, the safeguard of judicial control over the search which the fourth amendment is intended to accomplish would be eviscerated.”).

¶ 13. The State argues, however, that this settled law does not apply to ex ante instructions — that is, instructions imposed with the warrant on how to execute the warrant. The instructions in this case are ex ante instructions. Essentially, the State’s position is that the requirements of the Fourth Amendment of the Federal Constitution and Chapter I, Article 11 of the Vermont Constitution do not extend to such instructions so that violation of these instructions would not itself make the search unconstitutional.7 Secondarily, the State argues that the judicial officer does not have the power to issue such instructions under Vermont law so they are invalid irrespective of the constitutional mandate.

¶ 14. The issues in this case are unlike the search and seizure questions that we have resolved in the past. The difference involves the nature of the constitutional guarantee, as a right of a citizen to be free from a search and/or seizure that does not comport with constitutional requirements. In the usual case, a criminal defendant argues that certain evidence to be used by the State was obtained in violation of the constitutional mandate and cannot be used against defendant in the criminal proceeding. *63Here, the issue is whether the judicial officer in approving a search warrant can add instructions to protect the privacy interests of the person to be searched. The issue has never been addressed directly by the U.S. Supreme Court and has rarely been addressed by lower federal courts or courts in other states.

¶ 15. While the State has argued briefly that Article 11 creates no greater power to issue ex ante instructions as part of the constitutional mandate, and the Defender General argues to the contrary urging us to ground our decision on the Vermont Constitution, this case is fundamentally about the reach of the Fourth Amendment. The judicial officer relied upon Fourth Amendment decisions in imposing the instructions, and the parties have relied upon Fourth Amendment decisions in their arguments to this Court. In part, this is because there are no state constitution precedents. To be sure, we have noted on many occasions that Article 11 “may offer protections beyond those provided by the Fourth Amendment,” State v. Roberts, 160 Vt. 385, 392, 631 A.2d 835, 840 (1993), and this case could involve a variation of this principle. Our first impression, however, is that this case is less about the scope of protections of a constitutional provision and more about the tools available to ensure that protection occurs. Thus, any holding we might ultimately make concerning the scope of Article 11 with respect to ex ante instructions will be based on a new analysis of the protections of that Article. In view of our disposition of the case under the Fourth Amendment, we decline to engage in such an analysis in this case.

¶ 16. Nor do we rest our decision on Vermont nonconstitutional law. While the State argued that Vermont law does not authorize a judicial officer to impose ex ante instructions, it addressed only Vermont Rule of Criminal Procedure 41. It argued that this criminal procedure rule does not authorize the magistrate to issue instructions on how the search shall be conducted. Although Rule 41 is relevant,8 neither it, nor the federal rule on which it is *64based, purport to completely define the scope of judicial power with respect to search warrants. Thus, we are not persuaded on this limited record that Vermont law supports the State’s argument and do not consider it further.

¶ 17. Before addressing the substantive claims of error raised, we briefly make three points that put our analysis in context and respond to one of the points made by the dissent. First, there are really two searches in this case — the first for the computer and the second of the computer. The first has occurred and is not in dispute; the issues relate solely to the second search. Second, the principal question before us is whether the warrant-issuing magistrate had the authority to issue the specific search instructions he did, not as the dissent suggests, whether imposing the instructions is necessary to comply with the Fourth Amendment or Chapter I, Article 11 of the Vermont Constitution. Third, the State has challenged the imposition (or effect) of the instructions in general. Assuming such instructions could be imposed and they are binding under either the federal or state constitution, the State has not argued that they were inappropriate in this case. We leave questions about the nature and extent of the magistrate’s discretion in this area to another day.

III.

¶ 18. We now proceed to the main question before us — whether a judicial officer issuing a warrant has the authority to *65place ex ante instructions on how a search may be conducted. We have stated the question broadly because the State has challenged the authority of the judicial officer to impose any ex ante instructions, not particularly those in this case.9 We also emphasize that the general question is one of authority, and not responsibility. No party or amicus is directly claiming that ex ante instructions are ever required, and we certainly do not hold so here.

¶ 19. Under the Fourth Amendment, people are protected “against unreasonable searches and seizures.” U.S. Const, amend. IV. This right is echoed in the Vermont Constitution, which protects people’s right to be “free from search or seizure.” Vt. Const, ch. I, art. 11. “Absent exceptional circumstances, the federal and state constitutions instruct executive officers to conduct searches pursuant to a warrant issued by an impartial magistrate.” State v. Quigley, 2005 VT 128, ¶ 11, 179 Vt. 567, 892 A.2d 211 (mem.). Warrants may not be granted “but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const, amend. IV; see Vt. Const, ch. I, art. 11 (requiring that warrants be supported by a “sufficient foundation” and with the items to be seized “particularly described”); see also United States v. Wuagneux, 683 F.2d 1343, 1349 (11th Cir. 1982) (interpreting particularity requirement to mean that “a description of property will be acceptable if it is as specific as the circumstances and nature of the activity under investigation permit”). As we set out above, this case poses the question of whether a judicial officer — in carrying out his or her role of safeguarding these Fourth Amendment and Article 11 rights — may include certain ex ante instructions in a search warrant such that violation of the instructions will make the search unconstitutional.

¶ 20. In creating the instructions, the issuing judicial officer explicitly relied on United States v. Comprehensive Drag Testing, Inc. (CDT I), 579 F.3d 989 (9th Cir. 2009) (en banc). That case arose out of a 2002 federal investigation into the Bay Area Lab Cooperative (Baleo), which the government suspected of providing illegal steroids to professional baseball players. That year, Major League Baseball and the Player’s Association agreed to test all *66players to determine if more than five percent of players tested positive for steroid use. Under the agreement, the results of the testing of individual players were to be kept confidential. The samples were collected by an independent business, Comprehensive Drug Testing, Inc. (CDT), and the tests were performed by a private laboratory, Quest Diagnostics, Inc. CDT retained the list of players and their respective test results while Quest kept the specimens.

¶21. As part of its Baleo investigation, the government developed probable cause to believe ten players tested positive for steroids. The government secured a grand jury subpoena to obtain all drug testing records and specimens in CDT’s possession. The players moved to quash this subpoena. The government also obtained a warrant authorizing a search of CDT. Although the warrant was limited to the records of the ten players for whom the government had probable cause, when the government executed the warrant, law enforcement seized and reviewed the drug testing records for hundreds of baseball players as well as other individuals. Litigation ensued challenging the government’s action. CDT and the players moved for return of property under Federal Rule of Criminal Procedure 41(g), and the players moved to quash the subpoena.

¶ 22. The motions were heard by three different district court judges who all ruled against the government, granting the motions to return property and quashing the subpoena. All “expressed grave dissatisfaction with the government’s handling of the investigation.” Id. at 994. On appeal, a panel of the United States Court of Appeals for the Ninth Circuit reversed two decisions, concluding that the government’s seizure did not violate the law. United States v. Comprehensive Drug Testing Inc., 473 F.3d 915 (9th Cir. 2006). The court then granted a rehearing en banc10 and upheld the district court orders, finding against the government. Following its detailed analysis of the case, the court included some “Concluding Thoughts” regarding the challenge of balancing law enforcement’s need “for broad authorization to examine electronic records” with the “serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant.” CDT I, 579 F.3d at 1004. *67Noting that it was best “if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment,” the court outlined a list of “guidance” for magistrates to employ when issuing warrants for search of electronic devices. Id. at 1006. This included: insisting the government waive reliance on the plain view doctrine; requiring segregation or redaction of data by an independent third party prior to release to investigators; requiring the government to use a search protocol designed to uncover only information for which there is probable cause; and mandating that the government destroy or return nonresponsive data. Id. CDT I emphasized the need for such restrictions to prevent government overreaching, as had occurred in that case, and to protect the privacy interests of third parties.

¶ 23. Dissatisfied, the government then moved for review by all twenty-one active judges of the Ninth Circuit, arguing that the search protocols announced in the decision were unnecessary to resolve the case, beyond the court’s authority, and harmful to ongoing government investigations. Brief for the United States in Support of Rehearing En Banc by the Full Court, CDT I, 579 F.3d 989 (9th Cir. 2009) (Nos. 05-10067, 05-15006, 05-55354). In response, the initial en banc decision was revised and replaced with United States v. Comprehensive Drug Testing, Inc. (CDT II), 621 F.3d 1162 (9th Cir. 2010) (en banc) (per curiam). While the revised decision retained the substantive analysis and legal outcome of CDT I, the guidelines were removed from the per curiam opinion, and instead were included in a concurrence. CDT II, 621 F.3d at 1180 (Kozinski, C.J., concurring). The instructions adopted by the judicial officer in this case are drawn from the guidelines that were set forth in CDT I and retained only in the concurring opinion in CDT II.

¶ 24. The State contends that the judicial officer in this case lacked authority to impose the instructions at issue. In the State’s view, rather than authorizing a search at a particular location or for particular items, the judicial officer was attempting to dictate how law enforcement must conduct its search. In making this argument, the State draws heavily on an article written by Professor Orin Kerr following CDT I. See O. Kerr, Ex Ante Regulation of Computer Search and Seizure, 96 Va. L. Rev. 1241, 1242 (2010). Professor Kerr argues that “ex ante restrictions on *68the execution of computer warrants are constitutionally unauthorized and unwise.” Id. He contends that ex ante restrictions are impermissible because they predetermine the reasonableness of a search — a matter that he contends is beyond a magistrate’s authority under the Fourth Amendment.11 According to this view, an issuing officer’s role is only to determine whether probable cause exists to search a given location, not to determine the manner in which a search may be conducted. Drawing on Professor Kerr’s argument, the State contends that the judicial officer exceeded the narrowly circumscribed role of an officer reviewing a warrant application and, thus, its instructions are not part of the constitutional mandate.

¶ 25. The permissibility of imposing the ex ante instructions on computer searches is a relatively novel question for courts generally.12 What tools are at the disposal of judicial officers in *69confronting the challenges presented by searches of electronic media is a real and important question. As one court succinctly put it: “Computers are simultaneously file cabinets (with millions of files) and locked desk drawers; they can be repositories of innocent and deeply personal information, but also of evidence of crimes. The former must be protected, the latter discovered.” United States v. Adjani, 452 F.3d 1140, 1152 (9th Cir. 2006). We are not called upon to decide today how these conflicting goals are best satisfied. Our question is not whether the judicial officer’s attempt to reconcile these objectives was recommendable, much less required. Our question is simply whether this attempt was such a clear abuse of authority as to merit our prohibition in the context of this petition for extraordinary relief.

¶ 26. In this light, we reject the State’s invitation to hold that all ex ante restrictions on the execution of a search warrant are universally of no effect in defining the constitutional requirement. Although the historical record is sparse at this point, we see no bright line that allows some conditions, but not ones that specify how law enforcement officials must conduct their search. Indeed, the evidence from Vermont suggests that such ex ante instructions have been used in the past. See discussion supra note 8.

¶ 27. We conclude that ex ante instructions are sometimes acceptable mechanisms for ensuring the particularity of a search. According to Professor Kerr’s argument, which the State would have us adopt, a judicial officer’s only concern ex ante should be with probable cause and particularity, not reasonableness. Kerr, supra, at 1290-91 (“[E]x ante assessment of probable cause and particularity serves a different function than ex ante assessment of how a search should be executed.”). Accepting arguendo that such a bright dividing line exists, ex ante instructions may be a way to ensure particularity. Even in traditional contexts, a judicial officer may restrict a search to only a portion of what was requested — a room rather than an entire house, or boxes with certain labels *70rather than an entire warehouse. In other words, some ex ante constraints — of the form “here, not there” — are perfectly acceptable. Warrant applications describing the proposed scope of a search are not submitted to the court on a take it or leave it basis.

¶28. Often the way to specify particular objects or spaces will not be by describing their physical coordinates but by describing how to locate them. This is especially true in the world of electronic information, where physical notions of particularity are metaphorical at best. Cf. J. Goldfoot, The Physical Computer and the Fourth Amendment, 16 Berkeley J. Crim. L. 112, 123 (2011) (“The initial decision to treat storage media as having sub-containers departs from physical moorings; after that departure, metaphors are necessary to apply physical rules to the new virtual world”). Although the details of computer searches are new and evolving, the need for a nonphysical concept of particularity is one that courts have already confronted. Warrants for electronic surveillance routinely set out “minimization” requirements — procedures for how and under what conditions the electronic surveillance may be conducted — in order to “affordü similar protections to those that are present in the use of conventional warrants authorizing the seizure of tangible evidence.” Berger v. New York, 388 U.S. 41, 57 (1967); see, e.g., Ricks v. State, 537 A.2d 612, 621 (Md. 1988) (describing specific minimization procedures such as when camera should be turned on and off and what could and could not be recorded in 22-page order granting warrant for video surveillance).

¶ 29. At this point, many jurisdictions have adopted statutes that not only permit, but require, that warrants for electronic surveillance include procedures for minimizing the capture of nonpertinent information. See, e.g., N.Y. Crim. Proc. § 700.30.7 (requiring that warrants contain “[a] provision that the authorization to intercept or conduct video surveillance . . . shall be conducted in such a way as to minimize the interception of communications or the making of observations not otherwise subject to eavesdropping or video surveillance”).13 These provisions in the warrants are ex ante conditions on how a search may be *71conducted, but we believe that they are well within the scope of a judicial officer’s role in ensuring that searches are targeted with sufficient particularity. The same reasoning applies with even more force in the computer context. In the digital universe, particular information is not accessed through corridors and drawers, but through commands and queries. As a result, in many cases, the only feasible way to specify a particular “region” of the computer will be by specifying how to search. We view such ex ante specification as an acceptable way to determine particularity.

¶ 30. Further, we do not agree that one can draw a categorical line between the probable cause inquiry and considerations of privacy. Professor Kerr’s argument suggests that consideration of the privacy interests of the person to be searched is ultimately irrelevant to a judicial officer issuing a warrant. See Kerr, supra, at 1290-92. But this picture is overly rigid, ignoring the fact that the relevant ex ante standards depend on the severity of the privacy infringement that is contemplated. A judicial officer might authorize a search of a person, including his pockets, without any particular basis for thinking that evidence will be found in the person’s pocket as opposed to elsewhere on his person. But that same officer might permissibly refuse to authorize a search of the person’s body cavities based on evidence of similar generality. See, e.g., United States v. Nelson, 36 F.3d 758, 760 (8th Cir. 1994) (holding that probable cause to search defendant’s “person” did not include probable cause to perform a body cavity search and that this case clearly exhibits “[t]he need to provide specificity in a warrant”). This is not because a person’s rectal cavity is, in any meaningful sense, a more “particular” or “specific” location than his left pocket,14 but because concerns for privacy inflect our understanding of probable cause and particularity.15

*72¶ 31. What we ask judicial officers to ensure, therefore, is not simply that there is a reason to believe evidence may be uncovered but that there is a reason that will justify an intrusion on a citizen’s privacy interest. The investigatory promise must justify the collateral exposure. See State v. Savva, 159 Vt. 75, 86, 616 A.2d 774, 780 (1991) (“Although criminal defendants may seek court review of searches and seizures, these after-the-fact challenges do not serve Article ll’s purpose of protecting the rights of everyone — law-abiding as well as criminal — by involving judicial oversight before would-be invasions of privacy.” (emphasis added)). It is therefore essential that a judicial officer be cognizant of the general type of invasion being proposed. Where the invasion is less, a judicial officer may be more willing to issue the warrant.

¶ 32. As a corollary, judicial officers may describe in general terms what sort of an invasion is authorized. See United States v. Banks, 540 U.S. 31, 36 (2003) (“[A] magistrate judge is acting within the Constitution to authorize a ‘no-knock’ entry.”); V.R.Cr.P. 41(c) (requiring that warrants “shall command the officer to search[] within a specified period of time”; that they shall be executed during the daytime “unless the warrant directs that it may be served at any time”; and that they shall “designate the court to which it shall be returned”); cf. Scott v. United States, 436 U.S. 128, 130 (1978) (contemplating “judicial authorization which required . . . minimization” of wiretap under 18 U.S.C. § 2518). To say this is not to deny that the ex ante perspective of the issuing officer is to some extent limited. Judicial officers should not micromanage the execution of the warrant. See Lo-Ji Sales, 442 U.S. at 326-27. And because the ex ante assessment is general, it will not foreclose ex post reassessment insofar as “the Magistrate could not have anticipated in every particular the circumstances that would confront the officers.” Richards, 520 U.S. at 396.16

*73¶ 33. It is a serious error, however, to infer from the fact that we must often evaluate ex post whether a search sufficiently-respected a citizen’s privacy to the conclusion that we can make no ex ante judgments about what sort of privacy invasions are and are not warranted. There is interplay between probable cause, particularity, and reasonableness that judicial officers reviewing a warrant application must consider in authorizing a form of privacy invasion. We therefore reject any blanket prohibition on ex ante search warrant instructions.

IV.

¶ 34. Having rejected a categorical prohibition on ex ante instructions, we examine the specific instructions imposed by the judicial officer in this case and consider whether each was an abuse of authority. For clarity in our analysis, we group the instructions into the following categories: the first — instruction (1) relating to the plain view doctrine; the second — instructions (2) , (3), and (4) requiring that the search be performed by third parties or police personnel segregated from the investigators and requiring that the information be segregated and redacted prior to disclosure; the third — instructions (5) and (6) requiring police to use focused search techniques and prohibiting the use of specialized search tools without prior court authorization; and the fourth — instructions (7), (8), (9), and (10) pertaining to the copying, destruction and return of data. We address each of these categories in turn.

A.

¶ 35. First, we consider instruction (1) related to the plain view doctrine. Generally, only the items specifically described in a search warrant may be seized by law enforcement officers. Under the plain view doctrine, however, “if police are lawfully in a position from which they view an object, if its incriminating character is immediately apparent, and if the officers have a *74lawful right of access to the object, they may seize it without a warrant.” Minnesota v. Dickerson, 508 U.S. 366, 375 (1993); see State v. Trudeau, 165 Vt. 355, 358, 683 A.2d 725, 727 (1996) (listing and applying requirements for plain view doctrine). This applies to items viewed during a warranted search. Thus, when law enforcement is conducting a search pursuant .to a warrant, police are authorized to seize objects not listed in the warrant as long as the object is viewed from a lawful vantage point, the incriminating nature of the object is obvious, and it may be seized from a lawful right of access. Horton v. California, 496 U.S. 128, 136-37 (1990).

¶ 36. The judge was apparently concerned about how, pursuant to a broad search warrant, the plain view doctrine could be used in this case to seize evidence from computers or other electronic devices that were unconnected to the identity fraud investigation. Therefore, borrowing from CDT I,17 the judge imposed the following instruction:

[T]he State cannot rely upon the “plain view doctrine” to seize any electronic records other than those authorized by this warrant. That is, any digital evidence relating to criminal matters other than the identity theft offenses, may not be seized, copied, or used in any criminal investigation or prosecution of any person.

The State challenges this instruction on the same basis as all the others — that the court had no authority to delineate how law enforcement should conduct the search. Amici argue that it is necessary to abrogate the plain view doctrine in cases involving searches of computers because otherwise the search will transform into a general search violating individuals’ privacy interests.18

*75¶ 37. For two main reasons, we find this first instruction unnecessary for privacy protection and inappropriate. It is unnecessary because instructions (2), (3) and (4), requiring the segregation of the search from the investigation and limiting the results of the search that can be shared, obviate application of the plain view doctrine. Investigatory personnel will never be in the position to view incriminating evidence unrelated to identity theft offenses.

¶ 38. Second, we conclude that it is beyond the authority of a judicial officer issuing a warrant to abrogate a legal doctrine in this way. “Judicial supervision of the administration of criminal justice in the . . . courts implies the duty of establishing and maintaining civilized standards of procedure and evidence.” McNabb v. United States, 318 U.S. 332, 340 (1943). This supervisory power does not, however, go so far as to allow a judicial officer to alter what legal principles will or will not apply in a particular case. This proposition was established in United States v. Payner, 447 U.S. 727 (1980), in which the trial court attempted to use its supervisory authority to suppress items seized in violation of a third party’s constitutional rights, thereby avoiding the established rules for Fourth Amendment standing. In reversing, the Supreme Court concluded that, if it accepted such use of the supervisory power, it “would confer on the judiciary discretionary power to disregard the considered limitations of the law it is charged with enforcing.” Id. at 737. In this case, allowing instruction (1) would confer on a judicial officer the authority to pick and choose what legal doctrines would apply to a particular police search. Because we do not believe that a judicial officer holds such authority, we conclude that the State’s petition for extraordinary relief must be granted with regard to instruction (1).

B.

¶ 39. Next, we turn to instructions (2), (3), and (4) requiring that the search be performed by third parties or trained computer personnel separate from the investigators and operating behind a firewall. The principal instruction on this topic reads in full:

Inspection and investigation of the subject computer must be done by either an independent third party or *76specially trained computer personnel who are not involved in the investigation while staying behind a firewall, that is, in the absence of other agents of the State, and subject to a ban on copying or communicating to any person or the State any information found on the subject computer other than digital evidence relating to identity theft offenses.

Further, the court directed that if segregated State investigators were used, they could not disclose information other than that related to the “identity theft offenses.” If private third parties were employed, the court required them to deliver only “digital evidence relating to the offenses being investigated” and to segregate and redact it from nonevidentiary data “no matter how intermingled.” These instructions are the heart of the court’s ex ante order.

¶ 40. Again, the State contends that the judicial officer had no authority to impose these instructions because it was an attempt to dictate how law enforcement should reasonably conduct the search. See Kerr, supra, at 1277. The ACLU argues that the separation and screening instructions are necessary to protect privacy by ensuring that investigations have independent sources and that police objectives do not become comingled. The Defender General contends that the segregation procedures protect privacy by providing “the mechanism to ensure that the State would not gain access to data that it had no probable cause to collect.” The Defender General also argues that the standard under the Vermont Constitution is more stringent than its federal counterpart because Article 11 requires that a search be conducted “in the least intrusive manner.” State v. Birchard, 2010 VT 57, ¶ 13, 188 Vt. 172, 5 A.3d 879.

¶ 41. The application for the warrant in this case requested incredibly broad authorization. The affidavit in support of the search warrant application says that in some cases searching for evidence relevant to the charged crime can involve “carefully targeted searches that can locate evidence without requiring a time-consuming manual search through unrelated materials.” It goes on to say, however, that in other cases these techniques will not yield all the relevant evidence because “[cjriminals can mislabel or hide files and directories, encode communications to avoid using key words, attempt to delete files to evade detection, or take *77other steps designed to frustrate law enforcement searches for information.” The affidavit asserts that the criminal’s steps “may require agents and law enforcement or other analysts with appropriate expertise to conduct more extensive searches, such as scanning areas of the disk not allocated to listed files, or peruse every file briefly to determine whether it falls within the scope of the warrant.” The affidavit also states that because electronic data can easily be moved to other computers within the house, law enforcement must search all computers, even those belonging to persons not suspected of committing a crime.

¶ 42. In short, the warrant application could not have requested a broader authorization: that is, to search all files in all ways on all computers in the house. See P. Ohm, Response, Massive Hard Drives, General Warrants, and the Power of Magistrate Judges, 97 Va. L. Rev. In Brief 1, 11 (2011) (“Computer search warrants are the closest things to general warrants we have confronted in the history of the Republic.”). Understandably, in the judicial officer’s view, the warrant application did not provide probable cause for such a wide ranging search. See United States v. Otero, 563 F.3d 1127, 1132 (10th Cir. 2009) (“The modern development of the personal computer and its ability to store and intermingle a huge array of one’s personal papers in a single place increases law enforcement’s ability to conduct a wide-ranging search into a person’s private affairs, and accordingly makes the particularity requirement that much more important.”).

¶ 43. The separation and screening instructions are the judicial officer’s attempt to remedy this lack of particularity. To accomplish this, the instructions require that only the particular information for which there is probable cause to search will be laid bare to police investigators. See Marron v. United States, 275 U.S. 192, 196 (1927) (“The requirement that warrants shall particularly describe the things to be seized makes general searches under them impossible and prevents the seizure of one thing under a warrant describing another.”). As opposed to exposing the'entire contents of the hard drive to the police, the procedures ensure that only those files that relate to the suspected criminal activity will be viewed. In lieu of a particular description of the relevant files, the conditions create a procedure for identifying the relevant files and exposing only them to police investigators.

*78¶ 44. The State and the dissent raise two general objections to the instructions. The first, particularly raised by the dissent, is that the instructions have improperly eviscerated the plain view doctrine. Post, ¶ 84. Although the practical consequences of the instructions may be comparable to an abrogation of the plain view doctrine, the mechanism is critically different. Abrogating the plain view doctrine would mean that investigating police officers could not seize evidence that they incidentally viewed. The screening procedures, in contrast, prevent such incidental police viewings from ever occurring. It is not an abrogation of the plain view doctrine to put in place safeguards against the police plainly viewing.19 By separating police investigators and third-party screeners, these instructions — almost by definition — ensure a particularity of the exposure to police while avoiding the abrogation of the plain view doctrine.

¶ 45. In making their argument, the dissent is treating the plain view doctrine as some form of right of law enforcement officials. The dissent refers to “frustrating]” and “interfering]” with the plain view doctrine. Post, ¶¶ 84, 100. In fact, the plain view doctrine has a very limited role in Fourth Amendment jurisprudence. It is related only to seizures, not to searches. Horton, 496 U.S. at 134 (stating that plain view is an “exception that is addressed to the concerns that are implicated by seizures rather than by searches”). The doctrine itself is concerned with the permissible actions of the investigator after he or she has seen the incriminating evidence, not before. As we said in State v. Birchard, the “plain-view doctrine comes into play as an exception only where an officer has observed the object in question.” 2010 VT 57, ¶ 27.

¶ 46. An examination of the U.S. Supreme Court cases that developed the doctrine make it clear that it was crafted to be a narrow exception to the warrant requirement, permissible only as a convenience. The primary development of the doctrine was in the plurality opinion in Coolidge v. New Hampshire, which made *79the practical rational underlying the doctrine clear: “Where, once an otherwise lawful search is in progress, the police inadvertently come upon a piece of evidence, it would often be a needless inconvenience, and sometimes dangerous — to the evidence or to the police themselves — to require them to ignore it until they have obtained a warrant particularly describing it.” 408 U.S. 443, 467-68 (1971) (emphasis added). The opinion noted the reasons for the warrant requirement and stated, in part, that allowing the seizure of evidence in plain view without a warrant would not interfere with a primary rationale for the warrant requirement that “those searches deemed necessary should be as limited as possible.” Id. at 467. It would not do so, the Court found, because the plain view doctrine “does not convert the search into a general or exploratory one.”20 Id.

¶ 47. Having established the compatibility of the plain view doctrine and the constitutional principles at stake, the plurality found the exception acceptable: “As against the minor peril to Fourth Amendment protections, there is a major gain in effective law enforcement.” Id. Later cases have recognized the same rationale. See Dickerson, 508 U.S. at 375 (“The warrantless seizure of contraband [that officers see in plain view during a valid search] is deemed justified by the realization that resort to a neutral magistrate under such circumstances would often be impracticable and would do little to promote the objectives of the Fourth Amendment”). We have explained the plain view doctrine as an “exception to the warrant requirement.” Trudeau, 165 Vt. at 358, 683 A.2d at 727.

¶ 48. It is difficult to imagine how we could frustrate a doctrine based on convenience to establish an exception to the warrant requirement. The rationale has nothing to do with a law enforcement officer’s access to evidence; it determines only whether the officer must obtain a warrant to seize evidence to which the officer has access. Thus, we cannot accept the argument that the instructions impermissibly abrogate the plain view doctrine.

¶ 49. Second, the State and the dissent argue that allowing the information to be viewed by any third party — even one behind a firewall so the information cannot be viewed by a law enforcement officer — eliminates any legitimate privacy interest. Post, *80¶ 90. Put another way, the issue is whether the conditions meaningfully advance privacy interests in a way that would justify their imposition on the State. Superficially, the answer is not obvious because a citizen’s private information is being exposed one way or another, be it to a police officer or a third-party analyst.21 The police investigators see only the particular files relevant to the investigated crimes, but other files will inevitably be viewed by the screener. If the information exposure is the same either way, one might argue that these instructions ultimately offer no real protection. See Douglas v. Windham Super. Ct., 157 Vt. 34, 39, 597 A.2d 774, 777 (1991) (explaining that this Court will grant a motion for extraordinary relief if, but only if, there is no ground for the trial court’s action).

¶ 50. What this argument fails to recognize, however, is that privacy concerns not only our interest in determining whether personal information is revealed to another person but also our interest in determining to whom such information is revealed. A more complex understanding of privacy — one not limited to mere concern with avoiding exposure altogether— will inevitably acknowledge that our interest in privacy is, at least in part, an interest in to whom information concerning us is exposed. See Nat’l Cable & Telecomms. Ass’n v. FCC, 555 F.3d 996, 1001 (D.C. *81Cir. 2009) (“It is widely accepted that privacy deals with determining for oneself when, how and to whom personal information will be disclosed to others.”); Stone v. State Farm Mut. Auto. Ins. Co., 185 P.3d 150, 155 (Colo. 2008) (“[Privacy] includes ‘the power to control what we shall reveal about our intimate selves, to whom, and for what purpose.’ ” (quoting Martinelli v. Dist. Ct. ex rel. City & Cnty. of Denver, 612 P.2d 1083, 1091 (Colo. 1980))); C. Fried, Privacy, 77 Yale L.J. 475, 482 (1968) (“It is not true, for instance, that the less that is known about us the more privacy we have. Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves.”); K. Karst, “The Files”: Legal Controls over the Accuracy and Accessibility of Stored Personal Data, 31 Law & Contemp. Probs. 342, 344 (1966) (“Meaningful discussion of privacy . . . requires the recognition that ordinarily we deal not with an interest in total nondisclosure but with an interest in selective disclosure.”); R. Parker, A Definition of Privacy, 27 Rutgers L. Rev. 275, 281 (1974) {“[PJrivacy is control over when and by whom the various parts of us can be sensed by others.”); D. Solove, Conceptualizing Privacy, 90 Cal. L. Rev. 1087, 1108-09 (2002) (“[E]quating privacy with secrecy . . . fails to recognize that individuals want to keep things private from some people but not others. . . . Secrecy as the common denominator of privacy makes the conception of privacy too narrow.”). In short, all exposures are not created equal.22

¶ 51. That exposure to one person may harm one’s privacy interests more than exposure to another person is a familiar feature of human experience. If an embarrassing or humiliating piece of personal information must.be revealed to someone, it is surely worse to have it revealed to the neighborhood busybody or *82to one’s boss than it is to have it revealed to a stranger. See Beaumont v. Brown, 257 N.W.2d 522, 531 (Mich. 1977) (“Communication of embarrassing facts about an individual to a public not concerned with that individual and with whom the individual is not concerned obviously is not a ‘serious interference’ with plaintiff’s right to privacy, although it might be ‘unnecessary’ or ‘unreasonable.’ An invasion of a plaintiffs right to privacy is important if it exposes private facts to a public whose knowledge of those facts would be embarrassing to the plaintiff.”), overruled in part on other grounds by Bradley v. Saranac Cmty. Sch. Bd. of Educ., 565 N.W.2d 650, 658 (Mich. 1997). Given that privacy interests are, in this way, deeply sensitive to the identification of the recipient of the information, and given that these interests are what undergird the warrant requirement in the first place, there is no reason that the warrant process should be barred from exhibiting a similar sensitivity.

¶ 52. The reason that we care about who receives the information is because what others know about us shapes our interactions with them. Exposure of embarrassing information to one’s neighbor or one’s boss is a greater injury because it may impair one’s relationships with those people. In contrast, exposure to a person who will not care or with whom one is unlikely to ever interact causes less harm, even if it may still be a source of reasonable discomfort. This is because one of our central privacy interests is relational — it concerns our ability to foster functional relationships with others. See Fried, supra, at 480-83 (arguing that privacy is important because it allows us to build relations of trust with others); see also State v. Geraw, 173 Vt. 350, 365, 795 A.2d 1219, 1230 (2002) (“Analysis of privacy expectations . . . requires an evaluation of the values intended to be protected by Article 11, such as the exchange of thoughts and ideas, personal trust between individuals, free expression and individuality . . . .”). Our interests in privacy have to do with relating to others on our own terms.

¶ 53. A citizen’s relationship with a police officer engaged in an investigation is asymmetric in power and laden with potential consequences. Unlike virtually any other person, an investigating police officer has the power to place a citizen at the mercy of the State. We have the greatest interest in keeping our private information from someone who could do the most damage with it. Moreover, the police officer is necessarily inquisitive. It is the *83detective’s job to be skeptical, probing, and sometimes even relentless. Finally, the police officer assigned to a case is, by definition, not a detached individual and therefore inevitably has a certain perspective.

¶ 54. As a result of all of these features, it is natural to view exposure to a third party — insofar as exposure is required at all — as less of a setback to one’s privacy interests than exposure to an investigating officer. In fact, the protections of the Fourth Amendment are built around the recognition that one’s relationship with a detached third party will be different than with an investigating officer. See Johnson v. United States, 333 U.S. 10, 13-14 (1948) (“The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime.”).

¶ 55. The recognition that exposure to a disinterested third party may be substantially less injurious than exposure to an interested party explains why we often rely upon third-party screening in other contexts. For example, third-party filtering or screening teams are frequently used to protect against the disclosure of privileged documents. See, e.g., Hicks v. Bush, 452 F. Supp. 2d 88, 103 (D.D.C. 2006) (allowing use of “filter teams” to protect attorney-client privilege with regard to mail seized from Guantanamo Bay detainees); United States v. Grant, No. 04 CR 207BSJ, 2004 WL 1171258 (S.D.N.Y. May 25, 2004) (endorsing government’s proposed “privilege team” to screen seized documents for privileged materials); United States v. Triumph Capital Grp., Inc., 211 F.R.D. 31, 43 (D. Conn. 2002) (“The use of a taint team is a proper, fair and acceptable method of protecting privileged communications when a search involves property of an attorney.”); United States v. Hunter, 13 F. Supp. 2d-574, 583 (D. Vt. 1998) (accepting the use of “screening procedure designed by the government” in order to “limit invasion of confidential or privileged or irrelevant material”).

¶ 56. Courts have also approved of the use of third parties to assist in executing searches where the assistance will help limit the search to the relevant material. See, e.g., Forro Precision, Inc. *84v. Int’l Bus. Mach. Corp., 673 F.2d 1045, 1054 (9th Cir. 1982) (approving of use of IBM employees in performing a search where “search warrant required that technical documents be identified”); see also Wilson v. Layne, 526 U.S. 603, 611 (1999) (approving of “the presence of the third parties” where their presence “directly aid[s] in the execution of the warrant”). The use of third parties can provide an intermediate option between straight disclosure and filtering by a special master or a court in camera. Cf., e.g., United States v. McClure, No. 10-028, 2010 WL 3523030, at *2 (E.D. La. Sept. 1, 2010) (“The subpoenaed documents at issue satisfy [the subpoena requirements] but only to the degree that they are probative .... To the extent that the requested information does not relate to [the case], the subpoena drifts in the direction of an impermissible ‘fishing expedition.’ Thus, an in camera evaluation would be appropriate to filter out information not probative . . . .”); Konle v. Page, 556 N.W.2d 380, 383 (Wis. Ct. App. 1996) (“Because tax returns will often contain material which is wholly irrelevant to the [case in question], we conclude that an in camera examination by the trial court is the best and proper procedure through which to filter such discovery demands.”). In all of these circumstances, it is never assumed that because the information will be revealed to some third party — be it a “filter team,” a computer expert, a special master, or a court in camera — the individual concerned retains no residual interests in nondisclosure.

¶ 57. Not surprisingly, courts and commentators have been drawn to these tools for the purposes of mitigating the invasiveness of computer searches. The judicial officer in this case was putting into effect these proposed legal innovations. See, e.g., CDT II, 621 F.3d at 1180 (Kozinski, C.J., concurring) (recommending that “[segregation and redaction of electronic data must be done either by specialized personnel or an independent third party”); J. Saylor, Note, Computers as Castles: Preventing the Plain View Doctrine from Becoming a Vehicle for Overbroad Digital Searches, 79 Fordham L. Rev. 2809, 2857 (2011) (advocating for a requirement that special masters be used “to segregate data that is within the scope of the warrant, while excluding non-relevant evidence unless it closely relates to the crime specified in the warrant or is contained in the same file as evidence that the warrant authorizes to be seized”); Recent Case, Fourth Amendment Plain View Doctrine En Banc Ninth Circuit *85Holds that the Government Should Waive Reliance on Plain View Doctrine in Digital Contexts, 123 Harv. L. Rev. 1003, 1010 (2010) (calling for a procedure in which “[designated computer personnel or a third party would perform a search of the entire hard drive” and “[a]ll responsive information would be culled”). In the computer search context, using a disinterested third party is a natural way to protect a person’s interest in who will view personal information.

¶ 58. The interest in who will view personal information is heightened when the information in question is not a single embarrassing fact but rather a vast array of private materials. Personal computers often store every aspect of a citizen’s personal life. See O. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 533 (2005) (“Computers are like containers in a physical sense, homes in a virtual sense, and vast warehouses in an informational sense.”). Without caution, searches of computers threaten to authorize police culling through more personal information than has ever been possible before. See Winick, swpra, at 78 (“[T]he massive storage capacity of modern computers creates a high risk of overbroad, wide-ranging searches and seizures.”).

¶ 59. Because modern computers contain a plethora of private information, exposing them to wholesale searches presents a special threat of exposing irrelevant but damaging secrets. Judge Kleinfeld of the Ninth Circuit puts the point vividly:

There are just too many secrets on people’s computers, most legal, some embarrassing, and some potentially tragic in their implications, for loose liberality in allowing search warrants. Emails and history links may show that someone is ordering medication for a disease being kept secret even from family members. Or they may show that someone’s child is being counseled by parents for a serious problem that is none of anyone else’s business. Or a married mother of three may be carrying on a steamy email correspondence with an old high school boyfriend. Or an otherwise respectable, middle-aged gentleman may be looking at dirty pictures. Just as a conscientious public official may be hounded out of office because a party guest found a homosexual magazine when she went to the bathroom at his house, people’s lives may be ruined because of legal but embarrassing *86materials found on their computers. And, in all but the largest metropolitan areas, it really does not matter whether any formal charges ensue — if the police or other visitors find the material, it will be all over town and hinted at in the newspaper within a few days.
. . . Sex with children is so disgusting to most of us that we may be too liberal in allowing searches when the government investigates child pornography cases. The privacy of people’s computers is too important to let it be eroded by sexual disgust.

United States v. Gourde, 440 F.3d 1065, 1077-78 (9th Cir. 2006) (Kleinfeld, J., dissenting). These possibilities do not mean that computers cannot be searched. But given the multiplicity and magnitude of the unanticipated injuries that might be inflicted by allowing exposure of an entire computer hard drive, it is understandable to seek precautions that might mitigate such injuries. And given that exposure of embarrassing information to a detached third party constitutes a lesser injury, we conclude that the use of third-party screeners is not so wholly without basis as to constitute an abuse of the judge’s discretion.

¶ 60. The State raises practical objections to these requirements. First, the State argues that ex ante instructions will have no practical effect because the reasonableness of any search will be determined ex post, in response to a motion to suppress, and as a result the instructions “cannot be enforced.” The whole point of instructions (2), (3), and (4) is to deny the State access to information outside the justification for the warrant and thus avoid disputes over whether such information can be used in a criminal case or otherwise. As we noted at the outset of this opinion, “It is settled law that the search and seizure of evidence, conducted under a warrant, must conform to the requirements of that warrant.” Brunette, 76 F. Supp. 2d at 42. The decision in Richards v. Wisconsin, upon which the State relies, stands only for the proposition that suppression might not be required where the noncompliance is based on an unanticipated circumstance, too urgent in nature for the warrant to be amended. 520 U.S. at 395-96 (accepting police decision not to knock and announce after already having' had door slammed in their face by suspect upon seeing uniformed individual).

*87¶ 61. We agree with the State that ex post review will always remain open, but this does not mean that the ex ante instructions are without legal significance. Indeed, our holding today is that there is no constitutional distinction between instructions on how a search will be conducted and other instructions that, for example, relate to when the search must occur. See V.R.Cr.P. 41(c) (warrant shall “command the officer to search[] within a specified period of time not to exceed 10 days”).

¶ 62. Second, the State argues that the requirement to use a noninvestigator to conduct the search “without the presence or input of the investigator may result in relevant evidence being missed.” In responding to this argument, we note that the State chooses the person(s) conducting the search and can ensure that the person(s) have the skill to recognize relevant evidence. Further, the concept of a firewall does not preclude the State from educating the person(s) conducting the search in the nature of the alleged crimes, as long as the person(s) conducting the search do not share extraneous information with the State investigator. We do not conclude that there is a practical defect in the condition.

¶ 63. Third, the State argues that the segregation requirement will prevent a dynamic investigation in which the search can be expanded based upon what information is uncovered. Again, we find that the State overstates the objection. Nothing in instruction (5) states that on receipt of information from the search, the criminal investigator cannot ask for additional searching specifying the relevance of additional evidence in light of what evidence was produced.

¶ 64. We therefore deny the request for extraordinary relief with regard to instructions (2), (3), and (4). This result is based largely on the broad authorization sought by the applicant law enforcement officer and the affidavit supporting that application. The judicial officer concluded that resorting to a neutral third-party screener may be the only way to provide meaningful privacy protections in the face of broad law enforcement requests like this one. See CDT I, 579 F.3d at 1007 (“In the end ... we must rely on the good sense and vigilance of our magistrate judges, who are in the front line of preserving the constitutional freedoms of our citizens while assisting the government in its legitimate efforts to prosecute criminal activity. Nothing we could say would substitute for the sound judgment that judicial officers must exercise in striking this delicate balance.”). We hold that such an order does *88protect a legitimate privacy interest and did not constitute a manifest abuse of discretion.

C.

¶ 65. Next, we turn to the instructions limiting the search techniques that police can employ and prohibiting the use of sophisticated searching software without prior court authorization. The judge directed police to use a search protocol “designed to uncover only the information for which the State has probable cause” by focusing on documents limited by: the time period relevant to the alleged criminal activity, key words, and specific file types. The judge also precluded use of sophisticated search techniques without prior authorization.23

¶ 66. Under the order, these instructions are imposed on the persons(s) who conduct the search under instruction (2) and were within the court’s power to ensure satisfaction of the probable cause and particularity requirements of the Fourth Amendment and Article 11. As noted, the warrant application sought to examine every file on every type of electronic media found at the location listed in the warrant, regardless of ownership. In the judicial officer’s view, this application did not provide probable cause for such a broad search without some further specification of the particular places to be searched and the particular items to be seized.

¶ 67. As we have already discussed, especially in a nonphysical context, particularity may be achieved through specification of how a search will be conducted. The purpose of the particularity requirement is to prevent general searches. Maryland v. Garrison, 480 U.S. 79, 84 (1987). By limiting the authorization to specific areas and specific things, the particularity requirement ensures that the search will be carefully tailored to its justifications and will not become a wide-ranging, exploratory search that the Fourth Amendment prohibits. See United States v. Carey, 172 F.3d 1268, 1272 (10th Cir. 1999) (“The Fourth *89Amendment requires that a search warrant describe the things to be seized with sufficient particularity to prevent a general exploratory rummaging in a person’s belongings.”). Particularity is measured in practical terms. United States v. Johnson, 541 F.2d 1311, 1313 (8th Cir. 1976) (per curiam) (explaining that standard to determine whether warrant describes place to be searched with sufficient accuracy “is one of practical accuracy rather than technical nicety”).

¶ 68. The warrant application here asserted the need for a broad, unconstrained search based on the investigating officer’s general contention that criminals often hide incriminating evidence by using nonidentifying titles, changing file extensions, and encryption or password protection. There was no information presented, however, that there was reason to believe the suspect in this case had used such techniques or even that those engaged in identity theft typically do so. Cf. Wolf v. State, 266 P.3d 1169, 1173-74 (Idaho Ct. App. 2011) (concluding there was sufficient probable cause to search computer hardware, software and electronic devices where affidavit explained officer’s experience in area of child exploitation and storage of child pornography on computers).

¶ 69. The application suggests, if not admits, that the broadest scope of search may not be necessary. The affidavit explains that in some cases the sought-after information can be found through targeted searches not requiring such exhaustive measures. Further, there was no attempt to limit the search based on the known details of the suspected crime such as the time-period, the victim, or the institutions involved in the suspected identity theft. See Otero, 563 F.3d at 1132-33 (concluding that warrant application to search computer failed to satisfy particularity required where search was not limited by date and crimes suspected); United States v. Clough, 246 F. Supp. 2d 84, 87 (D. Me. 2003) (holding warrant failed to meet particularity requirement where it contained “no restrictions on the search, no references to statutes, and no references to crimes or illegality”).

¶ 70. Given that narrowing the search could still accomplish recovery of the incriminating evidence which there was probable cause to believe would be found within the digital equipment seized, the court was within its discretion to reduce prehminarily the scope of the warrant. The judicial officer did not abuse his *90power by restricting law enforcement’s search to those items that met certain parameters based on dates, types of files, or the author of a document. See United States v. Rude, 88 F.3d 1538, 1551 (9th Cir. 1996) (concluding that “the specification of dates, individuals, and the [particular] corporation, along with a reasonably precise delineation of the type of records sought, satisfied the specificity requirement”).

¶ 71. This was especially appropriate where the State proposed no limiting instructions of its own. The State fails to demonstrate that such limits were overly particular or otherwise untenable. In fact, such limits are essential to meet the particularity requirement of the Fourth Amendment, especially in cases involving record searches where nonresponsive information is intermingled with relevant evidence. Hunter, 13 F. Supp. 2d at 582-83 (concluding that particularity requirement was satisfied where records to be seized were identified “by time period and by the individual, entity, or property involved”); Commonwealth v. McDermott, 864 N.E.2d 471, 487 (Mass. 2007) (concluding that warrant was sufficiently particular where category limited by time frame and nature of items to be seized).

¶ 72. We recognize that instructions (5) and (6) are less necessary when the search is conducted by persons segregated behind a firewall from State investigators. Nevertheless, they can be an additional safeguard to guarantee that the search conducted by the segregated persons is not too broad. Indeed, the State in its brief recognized such a need when it observed that “the forensic examiner is as likely or unlikely to conduct an illegal general search of the computer as the investigator.” We conclude that their imposition was within the judicial officer’s discretion.

¶ 73. Again, the State raises a practical objection that the judicial officer will not have the expertise to review search protocols under instruction (6) and that limitations on search protocols are unworkable because of the dynamic nature of a search. All the instruction calls for is that the persons conducting the search, prior to using hash protocols or similar search tools, educate the judicial officer on the need for these methods and obtain approval. Just as a judicial officer is expected to expeditiously respond to a search warrant request, we can expect timely response to a request to employ special search protocols. We also believe that the judicial officer can be educated on the purpose and method of any search tool, such as to responsibly exercise the oversight responsibility.

*91¶ 74. Absent grounds to conclude that a judicial officer acted arbitrarily, we will not second-guess the judicial officer’s discretionary judgment in the context of a motion for extraordinary relief. See Richardson v. City of Rutland, 164 Vt. 422, 424, 671 A.2d 1245, 1247 (1995) (explaining that extraordinary relief in the nature of mandamus is a limited remedy to correct “ ‘an arbitrary abuse of . . . power’ ” (quoting Couture v. Selectmen of Berkshire, 121 Vt. 359, 361, 159 A.2d 78, 80 (1960))). The State is not persuasive in its claims that the limits will unduly hamper detection of crime. The equipment is seized and secured in the State’s possession. After exhausting its search options as permitted by the conditions of particularity, nothing precludes the State from seeking a new warrant to employ more sophisticated search techniques or a more probing analysis of the electronic media based on the results — or frustration — of their initial search, providing probable cause remains. The State’s request for extraordinary relief from these instructions is therefore denied.

D.

¶ 75. Finally, we address those instructions pertaining to the copying, return, and destruction of property. The judicial officer set instructions requiring that: (1) only responsive information could be copied; (2) nonresponsive data should be returned and the court informed; (3) copies must be destroyed absent judicial authorization otherwise; and (4) the return should specify the information seized, returned, and destroyed.

¶ 76. These instructions would hardly seem novel if imposed on law enforcement at the initial search phase. It goes without saying that law enforcement officers are empowered to seize and copy only items that are responsive to a warrant and, in turn, to inventory the items seized and return this list to the court. Indeed, under the Rules of Criminal Procedure, law enforcement officers conducting a search are required to give the person from whom property is taken “a receipt.” V.R.Cr.P. 41(d). The officer must also make and file with the court a return, including a written inventory of the property taken. Id. The rule allows a grieved individual to move for return of property seized illegally. V.R.Cr.P. 41(e).

¶ 77. In this case, the unique aspect of these instructions arises because the warrant authorized law enforcement to seize *92electronic medium to be searched off-site. As we noted initially, we are really dealing with two searches here. Apparently, the judicial officer wished to emphasize that although the State was authorized to search off-site, this did not provide authority for the State to retain indefinitely all electronic data and law enforcement was still required to return or destroy nonresponsive data as well as to notify the court of the items retained and returned. Given that the judicial officer’s instructions essentially echo the requirements of Rule 41, we conclude that it was within the officer’s power to impose them.

¶ 78. In reaching our conclusion, we do not conclude that instruction (7) or (8) prevents the segregated search persons from imaging the computer hard drive and other electronic storage media so that the computer and media can be returned to its owner. That procedure gives the State full search capacity while minimizing the interference with the activities of the computer owner. It was used in this case.

¶ 79. Instruction (7) prohibits giving copies of extraneous information to State investigation agents. It does not prohibit the persons conducting the search from making copies or images for their own use as long as they are destroyed, as provided in instruction (9).

¶ 80. Nor do we read instruction (9) as prohibiting the maintenance of evidence for appeals, post-conviction relief and civil liability, as the State claims. In circumstances where the State can show that digital information should be kept for a specific reason — for example, for an appeal of a dispute over the validity of or compliance with ex ante instructions — the instruction authorizes the State to seek a judicial authorization to delay destruction. Otherwise, the overall procedure leaves a sufficient record for future proceedings.

¶ 81. Finally, we reject the State’s argument that instruction (10) imposes an arbitrary time limit on the search, even though the search may take a long, indeterminate time to finish. Although instruction (10) authorizes the judicial officer to impose a time limit in the warrant on completing the search and filing a return, the warrant itself imposes no time limit and authorizes the analysis be conducted “as long as reasonably necessary.” Under these circumstances, the State’s argument is premature. In any event, we reiterate that there are two searches here and just as the applicable criminal rule can impose a time limit on the initial *93search of the dwelling, see V.R.Cr.P. 41(c), the magistrate can impose a time limit on the second.

¶ 82. In sum, we conclude that the judicial officer did not contravene his power in imposing instructions concerning the manner of the law enforcement’s search of the computer to satisfy the probable cause and particularity demands of the warrant requirement. However, we hold there was no authority to preclude law enforcement’s seizure of items in plain view.

The petition for extraordinary relief is granted in part, and condition (1) is stricken from the warrant. In all other respects, the petition is denied.

As defined in the detective’s affidavit, an IP address is a unique numeric series assigned to each computer connected to the internet. It specifically identifies that computer so that internet traffic may be properly directed to and from that computer. See Kleffman v. Vonage Holdings Corp., 232 P.3d 625, 627 (Cal. 2010) (defining IP address).

We interpret this restriction to mean that the person(s) conducting the search may provide digital evidence relating to any identity theft offenses, not only that involving the specific identified New York victim.

In this case, the warrant authorized the police to take “as long as reasonably necessary” to search the items seized.

According to the State, the computer was imaged and subsequently returned; however, because the iPad could not be imaged it has been retained by the Burlington Police Department. It is unclear whether the iPad is included in the phrase “the computer belonging to Eric Gulfield” in the order, and neither side has *60addressed the iPad in the presentations to this Court. Accordingly, we have not specifically addressed the iPad.

The amicus brief referred to herein as the ACLU brief was submitted on behalf of three organizations: the ACLU Foundation, the ACLU Foundation of Vermont, and the Electronic Frontier Foundation.

Because the investigation is ongoing, no charges have been filed in this case and thus there is no defendant to oppose the State’s petition.

The State phrases its argument in different ways. It has briefed them under the general heading that the magistrate exceeded his authority in issuing the instructions. Neither the Federal nor the Vermont Constitution purports to regulate whether a judicial officer can issue binding instructions on how a search can be conducted. Phrased this way, the question is one of Vermont nonconstitutional law. We have rephrased the question consistent with the substance of the State’s argument.

More relevant is 24 V.S.A. § 293, which addresses the powers and responsibilities of a sheriff, and by cross-reference all other law enforcement officers in Vermont. The statute was enacted in 1787 and has stood since then essentially without amendment, as seen in the history noted following the statute. The statute provides that the sheriff “shall serve and execute lawful writs, warrants and processes directed to him, according to the precept thereof!’ Id. (emphasis added). A precept in this context is a warrant “issued by an authorized person demanding *64another’s action.” Black’s Law Dictionary 1215 (8th ed. 2004). We take it to mean the command — as opposed to the authorization — contained in a warrant; in other words, it 'is the magistrate’s instruction. The construction issue raised by § 293 is whether the ex ante search instructions represent a valid precept, essentially as understood from the Vermont common law.

There is currently no statutory law on the power of the issuing magistrate. Early statutes referred the question back to the common law. Thus, the law as compiled in the Revised Statutes of 1840 stated that “Justices [of the Peace] may issue all writs, warrants and precepts, necessary to carry into effect the powers granted to them, and where no form therefor is prescribed by statute, they shall frame one in conformity with the principles of law and the usual course of proceedings of courts in this state.” R.S. ch. 26, § 61. Although the Legislature provided many forms for writs and precepts, it never provided one for a search warrant. Henry Harmon in his treatise on the Common Law and Equity Procedure suggests a form for a warrant to enter a dwelling house to search for stolen goods. H. Harman, The Principles of Common Law and Equity Procedure: A Manual of Court Procedure § 163 (1912). The warrant specifies that if the sheriff finds the described property, he shall “bring the said [goods and chattels] so found, forthwith before me at [my office].” This appeal’s to be a form of ex ante precept.

The State does argue that certain of the instructions are inappropriate, and we have addressed these arguments after consideration of the main question.

The en banc decision was issued by a court of nine judges, roughly half of those on the court.

In support, Professor Kerr relies on four Supreme Court decisions that he claims demonstrate that magistrates do not have authority to dictate how a reasonable search must be conducted and any attempt to do so will have no effect. United States v. Grubbs, 547 U.S. 90, 97 (2006) (concluding that Fourth Amendment does not require triggering condition for anticipatory warrant be particularly described because constitution “does not set forth some general ‘particularity requirement’”); Richards v. Wisconsin, 520 U.S. 385, 395 (1997) (affirming ability of magistrate to issue no-knock warrant, but holding that no-knoek entry was reasonable under circumstances even when warrant for such was not granted in advance); Lo-Ji Sales, Inc. v. New York, 442 U.S. 319, 326-27 (1979) (holding that magistrate’s participation in search of adult bookstore to determine if materials were obscene violated Fourth Amendment’s requirement of neutral and detached magistrate); Dalia v. United States, 441 U.S. 238, 256-57 (1979) (concluding wiretap warrant need not include specific authorization to enter target premises because “it is generally left to the discretion of the executing officers to determine the details of how best to proceed with the performance of a search”). As discussed more fully below, we do not view these cases as supporting the conclusion drawn by Professor Ken-. What they do support are two more modest conclusions: that ex ante evaluation by a judicial officer cannot wholly supplant ex post assessment of law enforcement conduct and that hard and fast rules about what a warrant must and must not include are generally frowned upon.

While some courts have addressed whether certain ex ante parameters are required, few courts have addressed whether such conditions are a permissible exercise of authority. See In re Search of 3817 W. West End, 321 F. Supp. 2d 953, 957 (N.D. Ill. 2004) (“[W]hen deciding to issue a warrant that would involve the seizure and subsequent search of a home computer, a magistrate judge has the authority to require the government to set forth a search protocol that attempts to ensure that the search will not exceed constitutional bounds.”). In advocating for their advisability, the per curiam opinion in CDT I and the concurring opinion in CDT II clearly presuppose that such conditions may permissibly be imposed, but *69the court never directly addressed the challenge raised by Professor Kerr’s article and by the State’s brief. Several commentators have advocated for the use of ex ante conditions in computer searches. See, e.g., S. Brenner & B. Frederiksen, Computer Searches and Seizures: Some Unresolved Issues, 8 Mich. Telecomm. & Tech. L. Rev. 39, 82-84 (2002) (advocating the use of search protocols for computer warrants); R. Winick, Searches and Seizures of Computers and Computer Data, 8 Harv. J.L. & Tech. 75, 102-14 (1994) (encouraging the use of search protocols to regulate computer searches and seizures).

Because of debate over applying contemporary Fourth Amendment analysis to computer searches, some have suggested that Congress address the issue through legislation. See, e.g., Goldfoot, supra, at 161 (noting that policy concerns of computer searches could be addressed through legislative rules like the specialized rules for wiretaps); E. Silbert & B. Chilton, (Giga)bit by (Giga)bit: Technology’s *71Potential Erosion of the Fourth Amendment, Crim. Just., Spring 2010, at 4, 11; K. Nakamaru, Note, Mining for Manny: Electronic Search and Seimre in the Aftermath of United States v. Comprehensive Drug Testing, 44 Loy. L.A. L. Rev. 771, 801-04 (2011).

Although illustrative, intense invasions of bodily privacy are not essential to the point. A judicial officer might plausibly demand that a handbag be described particularly and yet not demand particularity as to which acre of an open field is to be searched. Particularity is not defined in purely physical terms but in terms of how human behavior delineates zones of privacy.

This is a correlate of the accepted proposition that particularity and reasonableness are functionally related. See, e.g., United States v. Burgess, 576 F.3d 1078, 1094 (10th Cir. 2009) (“A warrant may permit only the search of particularly *72described places and only particularly described things may be seized. As the description of such places and things becomes more general, the method by which the search is executed become more important — the search method must be tailored to meet allowed ends. And those limits must be functional.”).

One argument advanced both in the State’s brief and in Professor Kerr’s article is the idea that allowing ex ante restrictions will prevent the evolution of the law. See Kerr, supra, at 1293 (“[E]x ante restrictions prevent the development of ex post rules of reasonableness that appellate courts must create to account for the *73new environment of computer search and seizure.”). Given that ex post review is not foreclosed, and we are not imposing a requirement that a judicial officer issue any ex ante requirements, we see little reason to accept the premise of this argument. But even if this were not true, we are not persuaded that setting ground rules prior to a search is inferior to raising them after the search was conducted in the context of a request to suppress relevant evidence. As this case demonstrates, review of the ex ante conditions is available.

In fact, even the CDT cases do not go as far as recommending abrogation of the plain view doctrine. CDT I instructed magistrates to urge the government to waive reliance on plain view, but did not suggest that a magistrate has authority under the Fourth Amendment to actually preclude the government from seizing an object over which an individual has no privacy interest. CDT I, 579 F.3d at 1006.

Amici base their argument on what they deem are certain unique attributes of electronic media, including: the large volume of information contained on electronic devices, especially that of a highly personal nature; the ability to retrieve items the user may not have intended to save or attempted to delete; and the connectivity of electronic devices. See, e.g., United States v. Flyer, 633 F.3d 911, 918 (9th Cir. 2011) (explaining how government can retrieve deleted information from unallocated space on computer); Burgess, 576 F.3d at 1090 (noting the “unique *75ability” of electronic devices such as “laptop computers, hard drives, flash drives or even cell phones” to contain “vast amounts of diverse personal information”).

Nor, for example, would restrictions on misleading advertising count as abrogating the principle of caveat emptor. Nor, for that matter, would a nursery school putting in place precautions against students losing their belongings be an abrogation of the “finders-keepers” doctrine. In each case, the restrictions don’t eliminate the doctrine; they simply attempt to prevent situations calling for its application to arise as frequently.

The circumstances here suggest that this characterization may have been optimistic.

The illusory appeal of this argument — that there is no privacy interest at stake insofar as there mil be exposure to someone — may derive in part from an analogy to eases in which one’s expectation of privacy is extinguished by voluntary disclosure to a third party. But coerced exposure is altogether different from voluntary disclosure. It is true that, when someone transmits information or places information in public view, that person is often deemed to have abandoned any legitimate expectation of privacy. See Smith v. Maryland, 442 U.S. 735, 743-44 (1979) (“This Court consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.”). It does not follow, however, that a coerced exposure of information to a third party destroys all legitimate expectations of privacy. See Fraternal Order of Police v. City of Philadelphia, 812 F.2d 105, 118 (3d Cir. 1987) (“The fact that protected information must be disclosed to a party who has a particular need for it. . . does not strip the information of its protection against disclosure to those who have no similar need.”). Whereas a voluntary exposure involves a person choosing to lower his or her expectation of privacy, a coerced exposure involves no such choice. To hold otherwise would be to conclude that, because the information is going to be exposed to someone contrary to the subject’s expectations, the expectation of privacy disappears, and, with it, the constitutional protection. The State cannot bootstrap its way into extinguishing any expectations of privacy because it is justified in trespassing upon that expectation.

The United States Supreme Court has itself acknowledged the inadequacy of the contrary conception of privacy. In United States Department of Justice v. Reporters Committee for Freedom of the Press, 489 U.S. 749 (1989), the Court held that disclosure of FBI rap sheets in response to a Freedom of Information Act request could constitute an unwarranted invasion of personal privacy despite the fact that the information in the rap sheets had been publicly disclosed previously. The Court recognized that “there are few facts that are not at one time or another divulged to another,” and that privacy often depends on “the degree of dissemination.” Id. at 763. The Court then stated, “Recognition of this attribute of a privacy interest supports the distinction, in terms of personal privacy, between scattered disclosure of the bits of information contained in a rap sheet and revelation of the rap sheet as a whole.” Id. at 764.

For example, the judge precluded law enforcement from employing “sophisticated hashing tools.” These tools are often used in specialized investigations to identify flies containing child pornography. As another court explained: “A hash value and signature analysis of files on a computer hard drive creates a ‘fingerprint’ of each file on the computer. Once generated, those hash values can be compared to the hash values of files known or suspected to contain child pornography.” State v. Bellar, 217 P.3d 1094, 1112 n.12 (Or. Ct. App. 2009).