{"id":201464,"date":"2017-06-26T16:56:57","date_gmt":"2017-06-26T20:56:57","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/mishandle-a-fraud-search-and-all-that-fine-evidence-could-be-for-nothing-new-york-times\/"},"modified":"2017-06-26T16:56:57","modified_gmt":"2017-06-26T20:56:57","slug":"mishandle-a-fraud-search-and-all-that-fine-evidence-could-be-for-nothing-new-york-times","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/mishandle-a-fraud-search-and-all-that-fine-evidence-could-be-for-nothing-new-york-times\/","title":{"rendered":"Mishandle a Fraud Search, and All That Fine Evidence Could Be for Nothing &#8211; New York Times"},"content":{"rendered":"<p><p>    When an investigation involves potential fraud, almost any    document or record could be related to it. Prosecutors often    need to show that transactions that appear to be legal were    misleading or deceptive, which might not be apparent on the    face of the documents. So the description in the warrant of    what the government can seize in a white-collar case is usually    quite broad, covering general categories of records and    computer files created over a substantial period of time, but    cannot be so vague that almost anything could be seized.  <\/p>\n<p>    The government obtained warrants to search Mr. Weys company,    New York Global Group, and his New York City apartment for    evidence that he used other companies and investors as part of    a plan to manipulate the shares of companies used for mergers    with China-based businesses. The warrants listed 12 categories    of documents that related to transactions with 220 individuals    and companies, including the seizure of computers and other    electronic devices that might contain records related to them.  <\/p>\n<p>    The key to any warrant that covers so much material is to    properly identify the specific crimes that were committed so    that there is some limitation on what types of records can be    seized. It was on this point that Judge Nathan found the    warrant in Mr. Weys case had failed.  <\/p>\n<p>    The primary flaw was that while the affidavit submitted by an    F.B.I. agent to a magistrate judge gave a    reasonable description of the crimes under investigation, that    document was not incorporated in the warrant, or even attached    to it, to establish the parameters for the search.  <\/p>\n<p>    Because there were no apparent limits to what could be seized,    the agents executing the warrants seemed to take just about    everything they could get their hands on. In particular, Judge    Nathan was troubled that agents took personal items with no    apparent connection to the investigation, like X-rays of family    members, childrens sports schedules, divorce papers, passports    and family photographs.  <\/p>\n<p>    In finding that the search violated the Fourth Amendment, the    judge pointed out that failure to reference the suspected    crimes would alone be enough to render the warrants    insufficiently particularized.  <\/p>\n<p>    The importance of including the crimes under investigation was    highlighted in another recent case, involving the appeal of    Ross W. Ulbricht, who once operated under the moniker Dread    Pirate Roberts. He was sentenced to life in prison for helping    set up and operate Silk Road, an anonymous online marketplace    used to sell drugs and broker other illegal services. Crucial    evidence came from his laptop, which was searched shortly after    his arrest in a public library in San Francisco in 2013.  <\/p>\n<p>    The warrant allowed agents to open every file to view the first    few pages of a document, and search terms could be used to scan    the laptops entire memory. In upholding the search, the United    States Court of Appeals for the Second Circuit in Manhattan        pointed out that files and documents can easily be given    misleading or coded names, and words that might be expected to    occur in pertinent documents can be encrypted; even very simple    codes can defeat a preplanned word search.  <\/p>\n<p>    While the description of what could be searched on Mr.    Ulbrichts laptop was broad, it was permissible under the    particularity requirement of the Fourth Amendment because the    affidavit outlining the crimes under investigation was    incorporated into the warrant, providing the necessary    limitations on what could be viewed. Although that meant a very    intrusive search that could include many personal documents,    the appeals court found that such an invasion of a criminal    defendants privacy is inevitable, however, in almost any    warranted search.  <\/p>\n<p>    Why did the government fail to meet this seemingly simple    requirement of incorporating the description of the crimes    under investigation in the warrant to search Mr. Weys office    and apartment? There is no good explanation for that mistake,    which led Judge Nathan to conclude that the warrants are  in    function if not in form  general warrants, the death knell    for any search.  <\/p>\n<p>    One way the government could have seized virtually everything    from Mr. Weys business and home would have been to offer    evidence in the warrant application that his operation was    completely fraudulent. Courts recognize that if a company is    thoroughly permeated by fraud, such as a boiler-room operation    or a bogus prescription drug dispensary, then any records    connected to it would constitute evidence.  <\/p>\n<p>    Although prosecutors made this argument to defend the seizure    from Mr. Wey, they could not overcome two hurdles. First, this    type of warrant is usually limited to a business rather than a    home, at least unless there is substantial evidence that the    home was really just an extension of the illegal operation.    There was nothing in the warrant application involving Mr.    Weys apartment that would indicate its primary use for that    purpose, even though his wife assisted his advisory business    from there.  <\/p>\n<p>    Second, Judge Nathan found that the government did not set    forth any evidence, explicit or implicit, that the scheme    either constituted just the tip of iceberg with respect to    fraudulent activity at Mr. Weys operation, or that the    claimed fraudulent activity infused the entire business.  <\/p>\n<p>    Perhaps the ultimate fallback in any case involving a flawed    search warrant is the claim that the agents acted in good    faith. The exclusionary rule is designed to deter governmental    misconduct, and the Supreme Court noted in     United States v. Peltier that where the official action    was pursued in complete good faith, however, the deterrence    rationale loses much of its force.  <\/p>\n<p>    That exception does not apply when a warrant is so clearly    flawed that no reasonable agent would rely on it. Judge Nathan    found that the warrants did not have any meaningful linkage to    the suspected criminal conduct and limited only, at the outer    boundaries, to some relationship to the owner\/occupant of the    premises being searched. Therefore, a claim of good faith to    salvage the fruits of an otherwise unlawful search could not be    supported, so the exclusionary rule required suppression of all    the evidence seized.  <\/p>\n<p>    I expect that the Justice Department will challenge the    decision because the suppressed evidence is at the heart of the    case against Mr. Wey. Although a defendant cannot appeal a    denial of a suppression motion until after a conviction,    the    Criminal Appeals Act authorizes prosecutors to seek review    of a decision granting such a motion so long as the United    States attorney certifies that the appeal is not for the    purpose of delay and the material would be substantial proof    of a fact material in the proceeding.  <\/p>\n<p>    Judge Nathans decision sends a clear message to agents and    prosecutors in white-collar-crime investigations to tread    carefully when using a search warrant to gather evidence.    Although a treasure trove of materials can be obtained this    way, failing to pay attention to the details of properly    writing and executing a warrant can have devastating    consequences for a case.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/06\/26\/business\/dealbook\/mishandle-a-fraud-search-and-all-that-fine-evidence-could-be-for-nothing.html\" title=\"Mishandle a Fraud Search, and All That Fine Evidence Could Be for Nothing - New York Times\">Mishandle a Fraud Search, and All That Fine Evidence Could Be for Nothing - New York Times<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When an investigation involves potential fraud, almost any document or record could be related to it. Prosecutors often need to show that transactions that appear to be legal were misleading or deceptive, which might not be apparent on the face of the documents. So the description in the warrant of what the government can seize in a white-collar case is usually quite broad, covering general categories of records and computer files created over a substantial period of time, but cannot be so vague that almost anything could be seized <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/mishandle-a-fraud-search-and-all-that-fine-evidence-could-be-for-nothing-new-york-times\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94879],"tags":[],"class_list":["post-201464","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/201464"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=201464"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/201464\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=201464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=201464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=201464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}