USA v. Greene et al
Filing
703
Initial Report and Recommendation
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF ALASKA
3:09-CR-00053-TMB-DMS-02
UNITED STATES OF AMERICA,
Plaintiff,
INITIAL REPORT AND
RECOMMENDATION REGARDING
DEFENDANT’S MOTION TO
SUPPRESS EVIDENCE [Doc. 304]
v.
SABIL MUMIN MUJAHID (D-2),
Defendant.
I. MOTION PRESENTED
Defendant Sabil Mujahid is charged in this multi-defendant case with a variety of crimes.
Of the forty-one counts in the Second Superceding Indictment, found at Docket 83, all but six
apply to him. Most of the charges against Defendant Mujahid involve allegations of sex
trafficking of children and adults and promotion of prostitution. Mujahid is also charged with a
child pornography offense, conspiracy to commit tax fraud, and identity theft.
Some of the evidence against Mujahid comes from the execution of three search warrants:
1)
Search Warrant 3:09-MJ-00033-JDR, issued on March 4, 2009, which authorized
the search of Mujahid’s residence at 2405 East 50th Avenue, Apt. #2, Anchorage,
Alaska (hereafter Search Warrant-33).
2)
Search Warrant 3:09-MJ-00032-JDR, issued on March 4, 2009, which authorized
the search of Mujahid’s vehicle, a four-door black Mercedes with the license plate
number ENF194 (Search Warrant-32); and
3)
Search Warrant 3:09-MJ-00048-DMS, issued on March 25, 2009, which
authorized the search of Sidney Greene’s (a co-defendant in this case) residence at
900 South Klevin Street, Apt. #1, Anchorage, Alaska (hereafter Search Warrant48).
Mujahid argues that all alleged child pornography pictures, all records related to tax offenses, and
1
all records related to identify theft that were seized pursuant to these three warrants and used to
support the child pornography count and the tax fraud and identity theft counts against him
should be suppressed. He argues that suppression is warranted because the seizure of such
evidence exceeded the scope of the warrant and because the warrant was executed in the manner
of a general warrant when the agents took all computer equipment from the places searched and
conducted a general search of the equipment.
The Government filed an opposition at Docket 332. It argues that Mujahid does not have
standing to challenge the search of Greene’s residence pursuant to Search Warrant-48. It also
argues that pornographic photographs are within the scope of the warrant. It also argues that the
seizure of a black bag found in Greene’s home was proper because it contained financial,
identification, and business records that were within the scope of the warrant and the fact that the
bag contained other incriminating information to support additional charges is not grounds to
suppress that evidence. Finally, it argues that the computer searches were valid, pointing out that
the case Mujahid relies on, United States v. Comprehensive Drug Testing, Inc., 579 F.3d 989 (9th
Cir. 2009) (hereafter CDT I) was superceded on September 13, 2010 by United States v.
Comprehensive Drug Testing, Inc., 621 F.3d 1162 (9th Cir. 2010) (hereafter CDT II) and that the
searches comply with the law in any event.
An evidentiary hearing was held on November 20, 2010 to take evidence about what
exactly was seized. During the hearing, it was discovered that a fourth search warrant related to
the case existed that had not been received by the defense. That warrant was 3:09-MJ-00201JDR, issued on December 16, 2009 (hereafter referred to as Search Warrant-201). It authorized
the search of computers and electronic storage devices seized by the officers pursuant to the three
2
warrants listed above. Mujahid was allowed to review Search Warrant-201 and submit any
supplemental briefing or motion in relation to that search warrant. Mujahid filed his supplement
at Docket 525. In it, he argues that Search Warrant-201 was tainted by the improper seizure and
search of computers and electronic media. He argues that the agents improperly engaged in a
generalized search of the computers and electronic storage devices, which was beyond the scope
of the earlier warrants, and then used information obtained from those improper searches to get a
search warrant after the fact. He also argues that any evidence obtained pursuant to Search
Warrant-201 should be suppressed as a remedy for the Government’s discovery violation.
The Government submitted a supplemental response at Docket 548. In that response, the
Government argues that the earlier warrants were not too general and that they properly allowed
for the seizure and search of computers seized. Furthermore, it argues that the affidavit in
support of Search Warrant-201demonstrates that probable cause for the warrant was not based on
information learned from a prior search of the computers. It also asserts that there has not been a
discovery violation but that if there was one, it was not intentional and no prejudice has resulted.
II. SEARCH WARRANTS– ITEMS TO BE SEIZED
The search warrants involved in this motion all authorized the agents to search for and
seize a list of items set forth in Attachment B. Attachment B is substantially the same in Search
Warrant-33, Search Warrant-32, and Search Warrant-48. It authorized law enforcement to search
for evidence of a violation of:
Title 18 United States Code 1952 Interstate and foreign travel or transportation in
aid of racketeering enterprises [and Title 18 United States Code Conspiracy]:
a)
Any and all items related to commercial sex acts (prostitution) including,
but not limited to: condoms, sex toys, sexual lubricants, sexually
suggestive clothing, sexually suggestive pictures, bedding, PDA’s, pagers,
3
b)
c)
d)
e)
f)
g)
h)
j)1
credit cards, cameras, videos, identification documents, guns, currency,
client or customer lists, email addresses, escort licenses, lists of rules,
ledgers, journals, notebooks, items indicating payment for commercial sex
acts, medical records related to prostitution activities, medication and
medical supplies relating to prostitution activities, including but not
limited to contraceptives, anti-inflammatory medications, and antibiotics.
Any and all evidence of financial transactions related to prostitution
operations, including but not limited to: monies, checks, checkbook
registers, books, ledgers, bank account records, bank transaction receipts,
wire transfer records, currency, financial transfers, purchases, invoices,
receipts, airline tickets, records of expenditures, correspondence, files, and
safe deposit box records. All credit cards, credit card statements, or
handwritten notes that appear to depict credit card numbers or
transactions.
All cellular telephones believed to belong to [Mujahid or Greene], . . .
All photographs and video related to the prostitution businesses including
pictures of Mujahid and/or Greene with other women or girls previously
identified as associated with the escort businesses, or pictures of said
females or pictures of either of the above depicting individuals in a sexual
manner.
All non-commercially produced video tapes and all video recoding
equipment.
All digital cameras and SD cards or other electronic storage media used to
save digital photo images.
Any documents relating to Recruiter #2 and Recruiter #1 to include, but
not limited to, names, addresses, telephone numbers, correspondence, and
photographs.
Any documents or items tending to show occupancy, ownership,
possession or control, including but not limited to utility receipts,
mortgage or rent receipts, lease, rental or sale agreements or contracts,
credit cards or credit card receipts, letters, other correspondence, and bills
related to [property to be search]. . . .
Any and all evidence of prostitutes, recruiters, employees or other person
associated with the prostitution business described in this warrant, to
include but not limited to Seductions Escort Service and internet postings.
Such evidence is to include but is not limited to: all identification cards
(both valid and false identification cards/documents), luggage tags,
suitcases, paperwork, diaries, journals, photographs, correspondence, and
other belongings.
1
In Search Warrant-48 (the search warrant for Greene’s residence) this paragraph is
actually labeled subparagraph i) and not j). The warrants for Mujahid’s property included an
additional paragraph that is not of relevance here.
4
k)2
All computer hardware capable of collecting analyzing, creating,
displaying, converting, storing, concealing, or transmitting any of the
items referred to in paragraphs a, b, c, d, e, f, g, h, and j or information in
electronic, magnetic or optical formats. . . .
(Doc. 305-1 at 4-5; Doc. 305-4 at 11-12; Doc. 305-5 at 6-7).
The affidavit by Special Agent Jolene A. Goeden supported each search warrant. The
Affidavit contained a recitation of facts regarding a Federal Bureau of Investigation (FBI) and
Anchorage Police Department (APD) investigation of Defendants Sidney Greene and Sabil
Mujahid on suspicion of prostitution, sex trafficking, and related racketeering enterprises. The
affidavit described Greene’s business activities, Sabil Mujahid’s business activities, property and
vehicles associated with the suspects, alleged victim accounts of the suspects’ activities, and
information that connected Greene and Mujahid’s prostitution businesses. It then described what
items could be located in the places to be searched that would constitute evidence of the
suspected crime of prostitution, sex trafficking, and related racketeering enterprises. (Doc. 305-1,
Doc. 305- 3, Doc. 305-5).
III. DISCUSSION
A. Mujahid’s Standing to Challenge the Search Warrants
Fourth Amendment rights cannot be asserted vicariously. Rakas v. Illinois, 439 U.S. 128,
133-34 (1978). In order to have a viable Fourth Amendment claim, the person asserting his or her
rights must have a legitimate expectation of privacy. Id. at 143 (citing Katz v. United States, 389
U.S. 347, 353 (1967)). The defendant bears the burden of establishing his legitimate expectation
2
In Search Warrant-48 (the search warrant for Greene’s residence) this paragraph is
actually labeled subparagraph j) and not k). The warrants for Mujahid’s property included an
additional paragraph that is not of relevance here
5
of privacy. Rawlings v. Kentucky, 448 U.S. 98, 104 (1980); United States v. Zermeno, 66 F.3d
1058, 1061 (9th Cir. 1995). To demonstrate a legitimate expectation of privacy, the person must
show that he or she has a subjective expectation of privacy in the area searched that society is
prepared to recognize as objectively reasonable. Smith v. Maryland, 442 U.S. 735, 740 (1979);
United States v. Ziegler, 474 F.3d 1184, 1189 (9th Cir. 2007).
It is undisputed that Mujahid had a legitimate expectation of privacy in his home and his
vehicle. Thus, he can clearly challenge Search Warrant-33 and Search Warrant-32. But
Mujahid’s ability to challenge any search that occurred in Greene’s residence is in dispute. The
Government correctly asserts that there is no coconspirator exception to the standing rule and each
defendant must demonstrate that his or her own expectation of privacy was violated by the police
conduct at issue. United States v. Lingenfelter, 997 F.2d 632, 636 (9th Cir. 1993).
It is also clear that Mujahid does not assert that he had a legitimate expectation of privacy
in Greene’s residence as a whole. Mujahid’s assertion of privacy related to Greene’s residence is
on narrower grounds. He argues that he had a legitimate expectation of privacy in one of the bags
seized and searched in Greene’s residence, and thus he argues he can challenge any search of that
bag even though it was stored in Greene’s residence.
Mujahid had an expectation of privacy in any of closed containers that he stored in
Greene’s residence. See United States v. Davis, 332 F.3d 1163, 1167 (9th Cir. 2003) (“A person
has an expectation of privacy in his or her private, closed containers and does not forfeit that
expectation of privacy merely because the container is located in a place that is not controlled
exclusively by the container's owner.”) (internal quotations omitted). Mujahid took the stand
during the evidentiary hearing to demonstrate that one of the containers found in Greene’s home, a
6
black travel bag, that contained various paperwork was actually his and stored in Greene’s house
with an expectation that it remain private. (Tr. at 5-8). This Court concludes that the bag was in
fact Mujahid’s and that it was closed and stored in Greene’s residence with the expectation that it
would remain private. The Government argued during the hearing that Mujahid waived his
expectation of privacy in the black bag based on recorded phone calls that were played during the
hearing. This Court concludes that the recordings did not clearly demonstrate that Mujahid
waived his expectation of privacy in the black bag. Therefore, Mujahid can challenge the seizure
of documents from the black bag as being outside of the scope of Search Warrant-48.
B. Particularity of the Warrants
In his supplemental memorandum at Docket 525, Mujahid mentions that the first three
search warrants were too general in nature—that is, they lacked particularity. The Court will
address the issue of particularity generally, even though the Court believes Mujahid’s particularity
argument is more specifically geared toward the warrants’ broad authorization to seize and search
electronic media.
A warrant must be specific to prevent law enforcement officers from conducting general,
exploratory searches at their discretion. United States v. Adjani, 452 F.3d 1140, 1147 (9th Cir.
2006). However, the level of specificity required is not a precise formula but rather depends on
the particular circumstances and the type of evidence sought. United States v. Hill, 459 F.3d 966,
973 (9th Cir. 2006). “A warrant describing a category of items is not invalid if a more specific
description is impossible. ” Id. (citing United States v. Spilotro, 800 F.2d 959, 963 (9th Cir.
1986)). “Specificity has two aspects: particularity and breadth. Particularity is the requirement
that the warrant must clearly state what is sought. Breadth deals with the requirement that the
7
scope of the warrant be limited by the probable cause on which the warrant is based.” Hill, 459
F.3d at 973 (quoting United States v. Towne, 997 F.2d 537, 544 (9th Cir. 1993)). In other words,
when reviewing challenges to a warrant’s specificity, courts consider one or more of the following
factors:
(1) whether probable cause exists to seize all items of a particular type described in
the warrant; (2) whether the warrant sets out objective standards by which executing
officers can differentiate items subject to seizure from those which are not; and (3)
whether the government was able to describe the items more particularly in light of
the information available to it at the time the warrant was issued.
Adjani, 452 F.3d at 1148 (internal quotations omitted). “While a search warrant must describe
items to be seized with particularity sufficient to prevent a general, exploratory rummaging in a
person’s belongings, . . . it need only be reasonably specific, rather than elaborately detailed, . . .
and the specificity required varies depending on the circumstances of the case and the type of
items involved.” United States v. Rude, 88 F.3d 1538, 1551 (9th Cir. 1996) (internal quotation
marks and citations omitted).
In this case, the items listed in Attachment B to the three search warrants are sufficiently
particular in that nothing listed is vague in nature. The officers executing the warrants could tell
from the warrant what types of things were approved for seizure. See United States v. SDI Future
Health, Inc., 568 F.3d 684, 702 (9th Cir. 2009). In this case, the Search Warrant itself contains
an overarching limitation in that it specifies the criminal activity suspected, racketeering. See
United States v. Bridges, 344 F.3d 1010, 1016-17 (9th Cir. 2003) (“The Fourth Amendment
requires search warrants to state with reasonable particularity what items are being targeted for
search or, alternatively, what criminal activity is suspected of having been perpetrated.”); Adjani,
452 F.3d at 1148 (upholding a warrant’s specificity in part because the warrant’s affidavit, which
8
the court found to be adequately incorporated into the search warrant itself, began by limiting the
search for evidence of a specific crime); United States v. Spilotro, 800 F.2d 959, 964 (9th Cir.
1986) (“Reference to a specific illegal activity can, in appropriate cases, provide substantive
guidance for the officer’s exercise of discretion in executing the warrant.”). The Search Warrant
then gives examples of the types of racketeering evidence the agents are authorized to seize. The
examples provide guidance about what specific racketeering crimes Defendant Mujahid is
suspected of having committed because the specific items are clearly related to prostitution. Thus,
in this case, the search warrants on their face limit the agents to seizing evidence of racketeering
related to commercial sex acts and prostitution. It so happens that evidence of this type of crime
is broad-reaching but that does not mean the warrant lacks particularity. The specific items of
evidence authorized for seizure are not vague, especially given the nature of the investigation and
the type of evidence that would be involved.
C. Search of the Electronic Storage Devices and Seizure of Documents Stored Within
1. Broad authorization to search computers and electronic storage devices
The three warrants challenged in this motion also allow the agents to seize computers and
electronic storage devices that could contain documents and evidence. Defendant Mujahid argues
that the search warrants were overbroad in allowing computers and other storage media to be
seized wholesale and without adequate search protocols and limitations. In his original motion,
he cites to CDT I in support of his argument.
The CDT cases arose out of a federal investigation into steroid use by professional
baseball players. During the investigation, the government developed probable cause to believe
that ten players had tested positive for steroids. As a result, the government obtained various
9
search warrants and subpoenas for records and data located in the facilities of Comprehensive
Drug Testing, Inc., which ran the drug testing program for Major League Baseball, and Quest
Diagnostics, which performed the lab tests on the urine samples of the baseball players.
The CDT I en banc opinion arose from the government’s appeal of three separate district
court rulings granting CDT’s various motions to quash subpoenas and return property pursuant to
Rule 41. The facts and procedural history underlying the case are complex and will not be set
forth in this report. In summary, the Ninth Circuit upheld the various lower court decisions,
which had ruled against the government. The Ninth Circuit used the opportunity to discuss the
issue of privacy as it relates to computer storage of data. In CDT I, the court directed magistrate
judges be vigilant in following the Ninth Circuit’s guidance when issuing a warrant to examine a
computer hard drive or other electronic storage medium or when a search could result in the
seizure of a computer. Its guidance consisted of five specific protocols:
1.
2.
3.
4.
5.
Magistrates should insist that the government waive reliance upon the plain view
doctrine in digital evidence cases. . . .
Segregation and redaction must be either done by specialized personnel or an
independent third party. . . . If the segregation is to be done by government computer
personnel, it must agree in the warrant application that the computer personnel will
not disclose to the investigators any information other than that which is the target of
the warrant.
Warrants and subpoenas must disclose the actual risks of destruction of information
as well as prior efforts to seize that information in other judicial fora. . . .
The government's search protocol must be designed to uncover only the information
for which it has probable cause, and only that information may be examined by the
case agents. . . .
The government must destroy or, if the recipient may lawfully possess it, return
non-responsive data, keeping the issuing magistrate informed about when it has done
so and what it has kept. . . .
CDT I, 579 F.3d 989 at 1006.
After this motion was filed, the Ninth Circuit superceded CDT I by issuing CDT II. In
10
CDT II the Ninth Circuit did not change the outcome of the first en banc decision in CDT I. It
did, however, remove the five protocols from the majority opinion. Based on CDT II, the five
protocols listed above are not mandatory limitations that must be placed in every search warrant
dealing with the search and seizure of computers and related hardware. However, the Ninth
Circuit still cautioned law enforcement and lower courts about the risks involved in broad
authorization to search electronic storage devices. It noted that over-seizing is an inherent part of
computer seizures and that judicial officers will have to be more vigilant “in striking the right
balance between the government’s interest in law enforcement and the right of individuals to be
free from unreasonable searches and seizures.” CDT II, 621 F.3d at 1177. Based on CDT II, a
judge reviewing a warrant application has the authority to place, and should consider placing,
limitations on searches of computers in order to make sure the searches are constitutionally
reasonable. CDT II, 621 F.3d at 1175-77; see also United States v. Payton, 573 F.3d 859, 864
(9th Cir. 2009) (“We believe that it is important to preserve the option of imposing [search]
conditions when they are deemed warranted by judicial officers authorizing the search of
computers.”).
Mujahid argues that the three warrants challenged in this motion allow general searches
because they authorize the wholesale seizure and search of computers without any sort of
screening process to protect intermingled data that does not fall within the scope of the warrant.
Mujahid correctly asserts that the search warrants did not have search protocols. But searching
protocols are not required, and so this Court cannot find them to be defective based on technical
requirements, but the Court must still consider whether the authorization for a broad search of
computers and electronic storage devices without screening protocols or other conditions was
11
reasonable given the investigation detailed in the supporting affidavit.
Looking at the facts of this case, the search warrants were reasonable in their scope given
the allegations set forth in the warrants’ supporting affidavits. In this case, there was probable
cause to believe that Mujahid’s and Greene’s computers were actually instrumentalities of the
crime because the affidavit details how computers and other digital devices were used to further
the alleged prostitution businesses being investigated. The affidavit also described how evidence
related to the prostitution businesses was expected to be stored on electronic storage devices. The
agents were not searching computers and other storage devices that were known or expected to
have large amounts of protected, third-party information stored inside of them. Also, as required
under United States v. Hill, 459 F.3d 966 (9th Cir. 2006), and United States v. Tamura, 694 F.2d
591 (9th Cir. 1982), Agent Goeden’s affidavit explained to this Court why it was impractical and
infeasible to search the computers on site, and thus the agents received prior authorization to
remove all electronic storage devices from the places searched.
2. Seizure of items outside of the scope of the warrant during search of computers
Mujahid argues that the agents initially searching the computers and devices seized
pursuant to the three warrants obtained information outside the scope of the warrant—evidence of
tax fraud and identity theft—when searching on those computers. Nothing in the record
demonstrates that the agents in fact observed and seized evidence from the computers and storage
devices that was outside the scope of the warrant upon their initial search. Even if they had, that
does not require the Court to suppress all evidence obtained from the search of Greene’s home or
his computers, just those items outside the scope. Tamura, 694 F.2d at 597. And, in this case, the
Court does not have anything on the record to delineate what specific evidence was taken from the
12
computers outside of the scope of the warrant. A general assertion that all tax documents should
be suppressed is not specific enough, given the record shows some tax documents were seized in
paper form and given that nothing on the record demonstrates what documents were alleged to
have been seized from the computers. Thus, even if the Court thought the search was too broad
and resulted in seizure of items outside of the scope of the warrant, which it does not, it could not
issue a blanket ruling that all tax evidence needs to be suppressed. The Court would need more
specific information.
Furthermore, the agents obtained a subsequent search warrant in order to search the seized
computers—Search Warrant-201. That warrant allowed agents to search the computers and
digital storage devices for evidence related to tax fraud and identity theft. Thus, any tax
documents found on the computers were seized pursuant to a separate warrant supported by
probable cause. At the hearing, the defense asserted that it had never received that warrant in
discovery. The Court provided Mujahid time to review the warrant and submit more motions or
briefing as necessary. Mujahid submitted his supplemental argument at Docket 525 and argued
that the warrant was tainted by the impermissibly broad search initially conducted by agents. He
argues that agents observed evidence of tax fraud and identity theft when searching the computers
pursuant to the first three warrants and then used that illegally gained information to get the
subsequent warrant. Upon review of the affidavit in support of Search Warrant-201, it does not
appear to be based on any information gleaned from the officers’ initial search of the computers.
It does not discuss what, if anything, was observed on the computers. Instead, it appears that all
the supporting facts in the application are from paper documents seized during the execution of
the prior warrants and from information learned from subsequent tax investigations. Therefore,
13
even if the Court were to conclude that the original search was too broad under the Fourth
Amendment (which it does not), it cannot conclude that all tax fraud and identity theft evidence
on the computers and electronic storage devices should be suppressed. That evidence was
obtained pursuant to a subsequent warrant supported by probable cause and independent of any
information taken from the original search of the computers. United States v. Ramirez-Sandoval,
872 F.2d 1392, 1396 (9th Cir. 1989) (describing the independent source exception to the
exclusionary rule as one that allows admission of evidence not derived in any way from the illegal
conduct).
3. Good faith exception
This Court also notes that even if the search warrants authorized an unreasonably broad
search given the Ninth Circuit’s CDT opinions, the exclusionary rule would not apply based on
the good faith exception set forth in United States v. Leon, 468 U.S. 897 (1984). Under Leon,
even if a search warrant is found to be in violation of the Fourth Amendment, the exclusionary
rule does not apply to suppress the evidence seized by officers acting in reasonable reliance on
that search warrant, if it was issued by a detached and neutral magistrate. Id. at 920-22. In other
words, if the officers relied in good faith on the warrant’s validity, courts do not suppress the
evidence obtained pursuant to that warrant. Clark, 31 F.3d at 835. “For the good faith reliance
exception to apply, the officers must have relied on the search warrant in an objectively
reasonable manner.” United States v. Crews, 502 F.3d 1130, 1136 (9th Cir. 2007). The search is
per se unreasonable—i.e., Leon’s good faith exception does not apply— in four circumstances:
(i) where an affiant misleads the issuing magistrate or judge by making a false
statement or recklessly disregarding the truth in making a statement; (ii) where the
magistrate or judge wholly abandons her judicial role in approving the warrant,
14
acting only as a ‘rubber stamp’ to the warrant application rather than as a neutral and
detached official; (iii) where the warrant is facially deficient in detail as to the place
to be searched or the things to be found [so] that the officers could not reasonably
presume it to be valid; or (iv) where the affidavit upon which the warrant is based is
so lacking in indicia of probable cause that no reasonable officer could rely upon it
in good faith.
Crews, 502 F.3d at 1136 (citing Leon, 468 U.S. at 923-26). In this case, none of the four
circumstances set forth above are present. Thus, Leon’s good faith exception would apply and
suppression would not be warranted.
4. Discovery sanction
As a side argument, Mujahid contends that all the evidence taken from the computers
pursuant to Search Warrant-201 should be suppressed because the Government failed to turn that
warrant over in a timely fashion. This Court ordered all discovery to be produced by February 9,
2010. Mujahid asserted that he never received the warrant. There is nothing on the record to
suggest that the Government acted in bad faith in regards to this warrant. See United States v.
Finley, 301 F.3d 1000 (9th Cir. 2002) (stating that exclusion of evidence is a harsh remedy for a
discovery violation unless that violation was willful or motivated by a desire to obtain a tactical
advantage). Furthermore, the issue was identified in November of 2010, about one year before the
set trial date. There was plenty of time for Mujahid to review the warrant and present any pre-trial
litigation regarding that warrant. Indeed, the Court gave Mujahid additional time to present any
follow-up arguments or briefing related to that warrant. Thus, there was no prejudice to his
defense. See United States v. Baker, 10 F.3d 1374, 1398 (9th Cir. 1998) (recognizing that a court
should look at the feasibility of curing the prejudice with a continuance when deciding on a
remedy for a discovery violation), overruled on other grounds. Suppression of evidence derived
15
from Search Warrant-201 is not required or justified in this situation.
D. Seizure of Photographs
Mujahid argues that the agents executing the warrant went beyond the scope of the search
warrants when they seized alleged child pornography photographs. He therefore asserts that the
evidence supporting Counts 32-34 should be suppressed. First, this Court notes that Counts 33
and 34 are charges against Greene only. They do not relate to Mujahid. Second, this Court has
already recommended that most of the child pornography evidence seized from Greene’s home be
deemed within the scope of the warrant. The District Court adopted that recommendation.
Therefore, the only evidence at issue is the child pornography evidence supporting Count 32. The
agents had authority to seize sexually suggestive photographs within paragraph a) of Attachment
B. Mujahid has not argued that the child pornography photograph constituting the basis for the
charge is not sexually suggestive. Indeed, he did not submit the specific evidence into the record
and instead just generally argued that anything supporting a child pornography charge is outside
the warrant. But just because a sexually suggestive photograph, which is within the scope of the
warrant, may also happen to be evidence of child pornography does not make the seizure improper
even though the warrant application did not mention child pornography. Adjani, 452 F.3d at 115051 (upholding the introduction of certain emails in support of a conspiracy charge when those
emails were within the scope of the warrant and just happened to also support a conspiracy charge
that was not expressly contemplated in the warrant).
E. Seizure of Documents in Black Bag
Mujahid challenges the seizure of some documents located inside his black bag. He
argues that any tax documents in that bag should not have been seized because they were not
16
listed items in Search Warrant-48. The Government introduced the documents retrieved from that
black bag into evidence during the November 19 hearing. Those documents were admitted as
Government Exhibit 3. Agent Goeden testified about each document and whether the person
linked to that document was known to be associated with the alleged prostitution enterprise at the
time of the seizure.
This Court has closely reviewed Attachment B of Search Warrant-48. Paragraph i) of
attachment B allowed the agents to search for evidence related to prostitutes, recruiters,
employees, or other persons associated with the prostitution business described in the warrant. It
listed some examples of what that evidence could entail. Those examples were identification
cards and documents (both valid and false), luggage tags, suitcases, paperwork, diaries, journals,
photographs, correspondence, and other belongings. But the warrant also made clear that this was
a non-exhaustive list. Any evidence that could be used to identify prostitutes, recruiters,
employees, and other people associated with the prostitution business was within the scope of the
search warrant. Unlike the paragraph d), which only allowed the agents to seize photographs of
Greene or Mujahid with women or girls “previously identified as associated with the escort
business,” paragraph i) does not contain such a limitation.
Paragraph a) of Attachment B allowed the agents to seize all items related to commercial
sex acts. The listed examples included identification documents, client lists, ledgers, notebooks,
and medical records. Again, the specific examples were a non-exhaustive list. In addition,
paragraph b) of Attachment B allowed the agents to seize any and all evidence of financial
transactions related to prostitution operations. The list of examples in paragraph b) included bank
account records, financial transfers, invoices, receipts, records of expenditures, correspondence,
17
and files.
This Court has closely reviewed the documents in the black bag to see if they fit within the
three paragraphs of Attachment B. This Court concludes that the seizure of the whole bag was
proper because it was like a file of papers that contained evidence reasonably within the scope of
the warrant. As noted above, paragraph b) allowed agents to seize files that were evidence of
financial transactions related to the prostitution operations. Based on pictures of the black bag
that were submitted during the evidentiary hearing as Defendant’s Exhibit E, upon opening the
bag, there were a few plainly visible items: a stamp with Mujahid’s name on it; a letter from the
social security administration; and an envelope from a tax preparation company, H&R Block.
Therefore, someone opening it would have known that this was Mujahid’s bag that had some tax
and identification documents inside. This Court finds that Mujahid’s tax documents are financial
documents related to the prostitution business, especially given the fact that he was one of the
main suspects being investigated for operating a sex trafficking business and given the fact that
tax documents provide evidence about financial transactions and income. Upon opening the bag
and seeing the few items on top of the stack of papers, the agents knew there was evidence
reasonably within the scope of the search warrant inside the bag, and therefore seizure of the
whole bag was proper because it was one bag of documents that this Court considers to have been
a single file containing financial documents related to the business and the other documents did
not need to be separated out before seizure. See United States v. Beusch, 596 F.2d 871, 876-77
(9th Cir. 1979) (noting that as long as a single file or ledger appears at the time of the search to
contain some evidence reasonably related to the purposes and within the scope of the warrant, the
officers did not need to separate every paper within that file and holding that suppression was not
18
required where agents seized a single file and two ledgers, each of which contained multiple pages
of information some of which was covered by the warrant).
This Court also concludes that even looking at the documents related to the tax offenses
inside the black bag individually, they all were within the scope of the warrant. Some of the
documents found inside the bag simply have handwritten notations on them with names and
identifying numbers such as a birth date, or a phone number, or a social security number. Such
documents were clearly within paragraph i) and a) of Attachment B to Search Warrant-48 because
they were reasonably considered identification documents or possible client lists.
Some of the documents inside the bag were letters or other correspondence related to
social security issues. Again, these documents were related to identification of prostitutes,
recruiters, or people associated with the business and thus were reasonably within the scope of the
warrant under paragraph i). The purpose of paragraph i) was to allow the agents to seize evidence
that identifies who could have been involved as a prostitute, recruiter, or otherwise. Indeed, the
language of paragraph i) did not contain the limitation that only identification evidence related to
people previously identified as involved in the business could be seized. Therefore, as long as the
evidence could reasonably have been considered evidence that identifies people who were
involved, it was within the scope of the warrant. The fact that a suspected sex trafficker had
multiple social security documents associated with a handful of different women in his possession
mades it reasonable for the agents to have considered such documents to be evidence of people
involved in the business.
Some of the documents in the black bag were official tax documents, such as tax returns or
Internal Revenue Service forms related to earned income credit. As stated above, this Court
19
concludes that any of Mujahid’s tax documents are clearly within the scope of the warrant as the
agents could have reasonably considered such documents evidence of financial transactions
related to the suspected prostitution business. As for the tax documents located in the bag not
associated with Mujahid or Greene, this Court finds that these documents are also within the
scope of the warrant under paragraph i) because they are evidence of people associated with the
prostitution business. As was the case with the social security documents, the fact that Mujahid
has tax filings of a variety of women in his possession while being suspected of trafficking
women and girls, makes it reasonable for the agents to have seized such documents as falling
within the purpose and scope of the warrant, specifically paragraph i). Such tax documents
would likely help the agents identify who was involved in the suspected prostitution business.
Even if the District Court were to disagree that all tax documents in Exhibit 3 were within
the scope of the warrant, based on Agent Goeden’s testimony, this Court notes that many of the
tax documents were associated with people who were previously identified by the agents as being
involved in the business. This Court believes that those documents, like Mujahid’s tax
documents, still fall within the search warrant under paragraph b) because the agents could have
reasonably considered those tax returns and documents to be evidence of financial transactions
related to the prostitution business. Thus, if the District Court were to disagree with this Court’s
conclusion that the bag as a whole could be seized or that all the tax documents located inside the
bag could be seized for identification purposes, this Court would recommend that the only
documents falling outside the scope of Search Warrant-48 are the tax documents of people not
previously identified as being associated with the business. There are only a few of those
documents: the tax return for H.E. found at Exhibit 3, SW03-00000891; the tax documents
20
located at Exhibit 3, SW03-00000923 – 00000925; the tax return for A.L. found at Exhibit 3,
SW03-00000930, and the tax return for M.L found at Exhibit 3, SW03-00001003.
V. CONCLUSION
Based on the foregoing, this Court respectfully recommends that Defendant Mujahid’s
Motion to Suppress Evidence be DENIED.
DATED this 7th day of September, 2011, at Anchorage, Alaska.
/s/ Deborah M. Smith
DEBORAH M. SMITH
United States Magistrate Judge
Pursuant to D.Ak.L.M.R. 6(a), a party seeking to object to this proposed finding and
recommendation shall file written objections with the Clerk of Court no later than CLOSE
OF BUSINESS, September 16, 2011. Failure to object to a magistrate judge’s findings of
fact may be treated as a procedural default and waiver of the right to contest those findings
on appeal. McCall v. Andrus, 628 F.2d 1185, 1187-89 (9th Cir. 1980), cert. denied, 450
U.S. 996 (1981). The Ninth Circuit concludes that a district court is not required to
consider evidence introduced for the first time in a party’s objection to a magistrate judge’s
recommendation. United States v. Howell, 231 F.3d 615 (9th Cir. 2000). Objections and
responses shall not exceed five (5) pages in length, and shall not merely reargue positions
presented in motion papers. Rather, objections and responses shall specifically designate
the findings or recommendations objected to, the basis of the objection, and the points and
authorities in support. Response(s) to the objections shall be filed on or before CLOSE
OF BUSINESS, September 23, 2011. The parties shall otherwise comply with provisions
of D.Ak.L.M.R. 6(a).
Reports and recommendations are not appealable orders. Any notice of appeal
pursuant to Fed.R.App.P. 4(a)(1) should not be filed until entry of the district court’s
judgment. See Hilliard v. Kincheloe, 796 F.2d 308 (9th Cir. 1986).
21
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?