UNITED STATES OF AMERICA v. DMITRIJ HARDER

 

Crim. No. 15-1

 

UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

 

2016 U.S. Dist. LEXIS 181556

 

 

April 18, 2016, Filed

 

CORE TERMS: email, search warrants, suppression, seized, attachment, seizure, probable cause, electronic, suppress, interview, privileged, notice, fruit, com, inter alia, internet, provider, money laundering, privileged communications, attorney-client, consulting, searched, dmitrij, harder, gmail, grand jury, warrant applications, privileged information, citations omitted, impermissibly

 

COUNSEL:  [*1] For DMITRIJ HARDER, Defendant: STEPHEN LACHEEN, LEAD ATTORNEY, LACHEEN DIXON WITTELS & GREENBERG LLP, PHILADELPHIA, PA; IAN M. COMISKY, BLANK ROME, LLP, PHILADELPHIA, PA; MATTHEW DAVID LEE, FOX ROTHSCHILD LLP, PHILADELPHIA, PA.

 

For USA, Plaintiff: ADAM L. SMALL, LEAD ATTORNEY, U.S. Department of Justice, National Security Division, Washington, DC; JASON DEAN LINDER, LEAD ATTORNEY, U.S. DEPT OF JUSTICE, WASHINGTON, DC; MICHELLE MORGAN, LEAD ATTORNEY, U.S. ATTORNEY'S OFFICE, PHILADELPHIA, PA; LEO R. TSAO, U.S. DEPARTMENT OF JUSTICE, WASHINGTON, DC.

 

JUDGES: Paul S. Diamond, J.

 

OPINION BY: Paul S. Diamond

 

 OPINION

 

ORDER

The grand jury has charged Defendant Dmitrij Harder with conspiracy to violate the Foreign Corrupt Practices and Travel Acts, substantive violations of the FCPA and Travel Act, conspiracy to commit international money laundering, substantive violations of the international money laundering statute, and aiding and abetting. (Doc. No. 1, Cts. 1-14); 18 U.S.C. § 371; 15 U.S.C. § 78dd-2; 18 U.S.C. § 1952; 18 U.S.C. § 1956(h), (a)(2)(A); 18 U.S.C. § 2. On December 15, 2015, the grand jury returned a Superseding Indictment with the same counts and several wording changes. (Doc. No. 62.)

The Government alleges that from 2007 to 2009, Defendant conspired to pay and conceal some $3.5 million in bribes [*2]  to Tatjana Sanderson, the sister of European Bank of Reconstruction and Development officer Andrej Ryjenko. These payments, which Defendant funneled through Chestnut Consulting Group (his company), were intended to obtain EBRD business and favorable EBRD treatment for two of Defendant's Russian clients: Irkustsk Oil and Gas Company and Vostok Energy.

On October 16, 2015, Defendant filed a Motion to Suppress statements he made to the authorities after he flew into New York's Kennedy Airport from overseas. (Doc. No. 38.) On December 10, 2015, I conducted a suppression hearing. (Doc. No. 74.)

On March 1, 2016, Defendant filed a second Motion to Suppress, this time asking me to exclude from trial emails obtained from Google and 1&1 pursuant to October 15, 2010 search warrants. (Doc. No. 79.) The Government has responded. (Doc. No. 102.) I held a suppression hearing on March 21, 2016. (Doc. No. 116, Suppress. Hr'g Tr.) On March 29, 2016, Defendant submitted a Supplement in Support of his Motion, which included a Declaration from Stephanie C. Chomentowski, an attorney for Defendant. (Doc. No. 118, Ex. A.)

At the conclusion of the March 21 hearing, I announced that I would deny the Defendant's [*3]  Motion respecting his statements at JFK and issue findings and conclusions. See Fed. R. Crim. P. 12(d). Those issued on April 15, 2016. (Doc No. 123.) At this same hearing, I also announced my tentative decision to deny the instant Email Suppression Motion, subject to reviewing Defendant's supplemental submission. Having reviewed the submission, I will deny Defendant's Motion.

 

I. Factual Findings

During the March 21 hearing, the Government called FBI Special Agent Vickie Humphreys, whose testimony I credit. I find that the Government has proven the following facts by a preponderance of the evidence. Fed. R. Crim. P. 12(d); United States v. Lowe, 791 F.3d 424, 432 n.4 (3d Cir. 2015).

In October 2010, in connection with its investigation of Defendant, the Government prepared search warrants directed at two internet service providers--Google and 1&1 Internet--pursuant to the Stored Communications Act (enacted as Title II of the Electronic Communications Privacy Act). See 18 U.S.C. § 2703(a)-(c); (Doc. No. 116, Suppress. Hr'g Tr. at 8-9.). FBI Special Agent Stephen R. Gray signed the supporting affidavits, relying on, inter alia, witness statements, bank records, emails, and related documents to make out probable cause. Gray also relied on information obtained from the FBI's February 2010 interview of Defendant at [*4]  JFK Airport (during which it learned Defendant's company email account: dharder@chestnut-consulting.com).

On October 15, 2010, then Magistrate Judge Restrepo approved the two search warrant applications. (Tr. at 8.) Additionally, on the Government's Motion, Judge Restrepo sealed the supporting affidavits. Each warrant also had an "Attachment A," listing "Property to Be Searched." Attachment A to the Google Warrant listed the "Property to Be Searched" as information associated with the email accounts dmitrij.harder@gmail.com (Defendant's email address) and aryjenko@gmail.com (Ryjenko's email address). (Doc. No. 79 at Ex. A, Attach. A.) Attachment A to the 1&1 warrant listed the "Property to Be Searched" as information associated with Defendant's company email account dharder@chestnut-consulting.com. (Id. at Ex. B, Attach. A.)

Each warrant also had an "Attachment B," listing "Items to be Seized." Attachment B provided that any seized item "constitute[] fruits, evidence and instrumentalities of violations of 15 U.S.C. § 78dd-1 et seq. (Foreign Corrupt Practices Act), 18 U.S.C. § 1343 (Wire Fraud), 18 U.S.C. § 1957 (Money Laundering), 18 U.S.C. § 371 (Conspiracy), 18 U.S.C. § 1001 (False Statements), and 31 U.S.C. § 5314 (FBAR)," involving Dmitrij Harder, Andrey Ryjenko, Tatjana Sanderson (the [*5]  Subjects) since February 1, 2007 . . . ." (Doc. No. 79, Exs. A, B, Attachs. B.) In Attachment B, the Government further limited the seizure to information pertaining to the following seven matters:

 

1) Communications between the Subjects;

2) Communications between the Subjects and employees of Chestnut Consulting Group, Inc. or Dmitrij Harder;

3) Communications between the Subjects and EBRD employees;

4) Communications between the Subjects and officers, employees, or agents of several enumerated Russian energy companies;

5) Communications between the Subjects and financial institutions at which the Subjects banked during the course of the scheme;

6) Communications relating to payments to or from the Subjects to facilitate the scheme; and

7) Records relating to who created, used, or communicated with the account or identifier, including records about their identities and whereabouts.

 

(Doc. No. 79, Exs. A, B, Attachs. B.)

Special Agent Humphreys served the Google warrant by fax on October 15, 2010 and served the 1&1 Warrant in person on October 18, 2010. (Tr. at 9.) Within some ten days of receipt, both companies had complied with the warrants and produced the entirety of the requested email accounts. [*6]  (Id.) Defendant alleges that the Google emails spanned 2006 to 2010, and that 1&1 emails spanned 2007 to 2010. (Doc. No. 79 at 7.) The Google production included thirteen emails or attachments between Defendant and his counsel, Stephen Lacheen. (Id.; Doc. No. 118, Ex. A at 2.) It also included 631 emails between Defendant and his former attorney, Sergei Bespalov, of which Defendant alleges "approximately two dozen" constituted attorney client communications. (Id.) Although the Google production apparently also included four emails between Defendant and another former attorney, Dmitrij Filippov, Defendant does not claim privilege respecting these emails. Finally, the Google production included emails between Ryjenko and his counsel. (Doc. No. 79 at 7.) Taken together, the search warrants yielded some 11,919 records (emails and attachments). (Doc. No. 118-1, Decl. at 1.)

On October 28, 2010, the FBI shared the search warrant returns with the City of London Police, which was also investigating Ryjenko and Sanderson. (Doc. No. 102 at 4; Tr. at 9.) The FBI kept a copy of the search warrant returns but did not review them. (Tr. at 11.) Shortly after, a City of London Police detective informed [*7]  the FBI that he had seen the header of an email containing potentially privileged information and then stopped reading. (Doc. No. 102 at 4, Tr. at 10.) In response, the Government instituted a segregation and filter process to ensure that its review of the seized documents conformed to the warrant's requirements and did not otherwise violate attorney-client privilege. (Doc. No. 102 at 4; Tr. at 9-10.)

To further this objective, on December 14, 2010, the FBI submitted a request to a computer forensics laboratory to segregate potentially privileged emails. (Id.) The laboratory returned non-privileged emails to the FBI in February 2011. (Id.) Accordingly, the FBI Agents' subsequent (and only) review of the warrant returns was limited to non-privileged documents. (Tr. at 12-13.)

Once the FBI received the screened returns, Agent Humphreys conducted targeted searches for documents "between or among Mr. Harder, Mr. Ryjenko, and Ms. Sanderson and . . . certain key points of the investigation where deals were being solidified, [and] payments were anticipated coming to Chestnut Consulting." (Tr. at 13.) The Government's review of the seized communications thus required it to "identify and seize [*8]  the more limited set of documents that constitute evidence of crimes within the scope of Attachment B." (Doc. No. 102 at 12.) Additionally, Agent Humphreys limited her review to communications occurring after February 1, 2007. (Tr. at 13.) Once she completed her initial targeted review, Agent Humphreys did not again look at the documents. (Id. at 14.)

To date, the Government has produced all the search warrant returns to Defendant. (Id.) On September 14, 2015, Defendant's Counsel contacted both Google and 1&1 requesting information pertaining to their responses to the warrants, including a request for: 1) the physical location of seized data, and 2) an explanation for why they did not notify Defendant of the seizure. (Doc. No. 79, Ex. D.) Neither Google nor 1&1 responded.

Defendant now moves to suppress the documents the Government obtained from Google and 1&1. (Doc. No. 79.)

 

II. Legal Standard

The Government must show by a preponderance of the evidence the reasonableness of each individual act constituting a Fourth Amendment search and seizure. See United States v. Ritter, 416 F.3d 256, 261 (3d Cir. 2005).

A magistrate judge's initial probable cause determination is entitled to "great deference." Id.; United States v. Conley, 4 F.3d 1200, 1205 (3d Cir. 1993) ("[T]he duty of a reviewing court is simply to ensure that the magistrate [*9]  had a substantial basis for . . . conclud[ing] that probable cause existed.") (citing Illinois v. Gates, 393 U.S. 410, 419 (1969) (internal citations omitted)). Additionally, "the exclusionary rule does not necessarily apply every time a Fourth Amendment violation occurs." United States v. Wright, 625 F. App'x 99, 102 (3d Cir. 2015). Rather, suppression is appropriate only where police behavior is "deliberate, reckless, or grossly negligent." Id.; see also Herring v. United States, 555 U.S. 135, 140, 129 S. Ct. 695, 172 L. Ed. 2d 496 (2009) ("[Suppression] has always been our last resort, not our first impulse.") (further citations omitted).

 

III. Conclusions of Law

Defendant argues that the search warrants were impermissibly overbroad, and that as a result, the Government seized information outside the warrant's scope, including privileged emails. Defendant also argues that the warrants were deficient because: 1) they lacked probable cause; 2) Judge Restrepo lacked authority to approve them; and 3) the Government failed to comply with notification requirements. I do not agree.

 

a. Scope and Overbreadth

A valid search warrant "must contain, either on its face or by attachment, a sufficiently particular description of what is to be seized." Bartholomew v. Pennsylvania, 221 F.3d 425, 429 (3d Cir. 2000). As it did here, the Government often shows particularity by attaching to the warrant the list of items to be seized. See United States v. Wright, 493 F. App'x 265, 267 (3d Cir. 2012) ("It is common for applicants to fill [*10]  in these sections by writing, "See ATTACHMENT A" or "See ATTACHMENT B." Attachment A is normally a description of the property to be searched, and Attachment B is normally a listing of the items to be searched for or seized."). The Third Circuit has acknowledged that during the execution of a sufficiently particular warrant, it is "certain that some innocuous documents will be examined, at least cursorily, in order to determine whether they are, in fact, among those papers authorized to be seized." United States v. Stabile, 633 F.3d 219, 234 (3d Cir. 2011) (citations omitted). As such, a cursory examination of non-responsive documents during the execution of a valid warrant does not violate the Fourth Amendment. Id.

Here, in Attachment B to each warrant, the Government detailed precisely the items to be seized, including only those documents relating to, inter alia, the alleged EBRD bribery and money laundering schemes. The warrants further required that any seized emails involve the Subjects and pertain to seven enumerated categories. (Doc. No. 79, Exs. A & B, Attachs. B (identifying relevant communications and records.).) Both warrants also included a temporal limitation on the emails to be seized: from February 1, 2007 forward. These requirements more [*11]  than suffice to identify the relevant period, constrain the reviewing agents' discretion, and limit the warrants' scope.

Defendant nonetheless argues that the warrants were deficient because they lacked "search protocols." He relies on a suggestion in a concurring Ninth Circuit opinion that warrant applications for electronic seizures include search protocols to prevent investigating agents from "examining or retaining any data other than that for which probable cause is shown." United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1179 (9th Cir. 2010) (Kozinski, C.J., concurring). The en banc majority in Comprehensive Drug Testing did not impose such a requirement, however. Indeed, courts that have addressed the issue--including the Third Circuit--have not followed Judge Kozinski's suggestion. See, e.g., Stabile, 633 F.3d at 234 (permitting the seizure and subsequent off-site search of six hard drives pursuant to a search warrant lacking an ex ante search protocol); United States v. Brooks, 427 F.3d 1246, 1251 (10th Cir. 2005) (search warrant need not "contain a particularized computer search strategy"); United States v. McNamara-Harvey, No. CRIM.A. 10-219, 2010 U.S. Dist. LEXIS 106141, 2010 WL 3928529, at *4 (E.D. Pa. Oct. 5, 2010) (rejecting Defendant's overbreadth argument based on Comprehensive Drug Testing); United States v. Bowen, 689 F. Supp. 2d 675, 681 (S.D.N.Y. 2010) ("[W]e join . . . several other federal courts in holding that the Fourth Amendment does not require a search warrant to [*12]  specify computer search methodology."), aff'd sub nom., United States v. Ingram, 490 F. App'x 363 (2d Cir. 2012); United States v. Fumo, No. CRIM.A. 06-319, 2007 U.S. Dist. LEXIS 80543, 2007 WL 3232112, at *6 (E.D. Pa. Oct. 30, 2007) ("[S]earch protocols and keywords do not mark the outer bounds of a lawful search; to the contrary, because of the nature of computer files, the government may legally open and briefly examine each file when searching a computer pursuant to a valid warrant."). Defendant's reliance on Comprehensive Drug Testing is thus unpersuasive.

Defendant next argues that the warrants were facially invalid because the Government did not provide the underlying sealed affidavits to Google or 1&1. (Doc. No. 102.) I disagree. The Government was not required to provide the sealed affidavits to Google and 1&1 because neither company was required to conduct a detailed search of the seized accounts. Rather, the Third Circuit and sister circuits have repeatedly upheld the two-step process the Government employed here for executing search warrants for electronically stored information.

In Stabile, for instance, the Third Circuit approved the Government's off-site search of six seized hard drives because the "practical realities of computer investigations preclude on-site searches." 633 F.3d at 234. The Stabile Court recognized that [*13]  electronic-based searches--which are "time consuming and require trained forensic investigators"--necessarily cannot be "rushed by a cursory on-site search." Id. The Third Circuit thus found reasonable the Government's initial seizure of large amounts of potentially non-responsive data, followed by a subsequent off-site filtering and search of those data. Id. Plainly, the Stabile Court's approval of this two-step process applies not only to the seizure of physical electronics (e.g., computers and hard drives) but also to that of electronic data (e.g., email accounts); see also Fed. R. Crim. P. 41(e)(2)(B) (permitting a "later review of the media or information [including electronically stored information] consistent with the warrant").

Because the seizure of electronic data necessarily requires two steps--the internet service provider produces all potentially responsive data, and an independent technician then segregates and reviews that data to ensure warrant compliance--any failure to provide Google and 1&1 with the underlying affidavits did not violate the Fourth Amendment. In these circumstances, providing the affidavits to the providers would have been pointless. See, e.g., United States v. Bach, 310 F.3d 1063, 1065-66 (8th Cir. 2002) ("According to Yahoo!, when executing warrants, technicians [*14]  do not selectively choose or review the contents of the named account . . . Yahoo!'s execution of the search warrant in this case did not violate [Defendant's] Fourth Amendment rights); United States v. Grimmett, 439 F.3d 1263, 1270 (10th Cir. 2006); United States v. Evers, 669 F.3d 645, 652 (6th Cir. 2012); United States v. Scully, 108 F. Supp. 3d 59, 95 (E.D.N.Y. 2015) ("[E]very case of which we are aware that has entertained a suppression motion relating to the search of an email account has upheld the Government's ability to obtain the entire contents of the email account to determine which particular emails come within the search warrant."); In the Matter of a Warrant for All Content & Other Info. Associated with the Email Account xxxxxxx gmail.com Maintained at Premises Controlled By Google, Inc., 33 F. Supp. 3d 386, 395 (S.D.N.Y. 2014) ("Google Warrant") ("Not surprisingly, courts have routinely rejected arguments made in the course of suppression motions that a warrant should have required a third party to conduct searches of electronic information."). In sum, the warrants' execution was thus proper and reasonable.

Finally, relying on United States v. Ganias, Defendant argues that the Government's retention of all seized emails (privileged or otherwise) warrants suppression. 755 F.3d 125 (2d Cir. 2014); (Doc. No. 79 at 20-22). In Ganias, the Second Circuit held that the Government's seizure and retention for two and a half years of Defendant's personal records, which were plainly outside the [*15]  warrant's scope, violated the Fourth Amendment when the Government used the warrant returns to develop probable cause in an unrelated investigation. Id. at 141.

Here, the circumstances are wholly dissimilar. Agent Humphreys testified that she has not re-reviewed the search warrant returns since her initial 2011 review. (Tr. at 14.) Rather, the Government has retained the returns for proper purposes including, inter alia, authentication. (Doc. No. 102 at 19); see, e.g., Scully, 108 F. Supp. 3d at 101 ("[T]he Government states that any such emails are being retained for authentication purposes only and will not be used in future criminal investigations. Accordingly, consistent with Ganias, suppression is not an appropriate remedy for the alleged improper retention."); see also Google Warrant, 33 F. Supp. 3d at 398 ("[W]e recognize that the Government has a need to retain materials as an investigation unfolds for the purpose of retrieving material that is authorized by the warrant"). Ganias thus provides no support for the result Defendant urges.

The warrants were thus sufficiently particular and were not overbroad. Accordingly, I will deny suppression on these grounds.

 

b. Privilege

Defendant argues that the Government's failure to provide the sealed affidavits to Google and 1&1 impermissibly [*16]  resulted in the production of privileged information. Defendant thus requests a "hearing into who had access to the privileged communications" and the appointment of a special master for document review because "it appears that the FBI and not the DOJ reviewed" the purportedly tainted documents. (Doc. No. 79 at 19-20.) I will deny these requests, which appear intended to delay Defendant's trial needlessly.

Defendant apparently does not understand that the FBI is part of the Department of Justice. His suggestion that there was something improper about the FBI review of this material thus makes no sense. In any event, as I have discussed, the Government has adequately described its extensive efforts--including the establishment of an independent forensics filter team--to segregate potentially privileged information. (Doc. No. 102 at 4, n.1.) Moreover, Agent Humphreys testified credibly that no agent at the DOJ reviewed the search warrant returns before they were screened for potentially privileged communications. (Tr. at 12.) I am thus satisfied that the Government employed proper procedures to exclude emails that were privileged or otherwise outside the warrants' scope, including emails [*17]  between Defendant and Mr. Lacheen or Mr. Filippov. See, e.g., In re Search of Elec. Commc'ns in the Account of chakafattah gmail.com at Internet Serv. Provider Google, Inc., 802 F.3d 516, 530 (3d Cir. 2015) (approving of a similar privilege review procedure).

Nor has Defendant shown that he entitled to suppression based on the Government's purported review of privileged communications, including approximately "two dozen" emails between Defendant and his former attorney, Sergei Bespalov. (Doc. No. 118 at 2.) Although Defendant perfunctorily suggests that the Government seized voluminous privileged information, he has made no showing that the Government actually reviewed these communications, much less did so deliberately or in bad faith. (Doc. No. 118 at 2); cf. United States v. Voigt, 89 F.3d 1050, 1066 (3d Cir. 1996) (an intrusion into the attorney-client relationship, standing alone, is not per se prejudicial; a claim of outrageous government conduct premised on intrusion into attorney-client relationship is cognizable only if the defendant can show deliberate action causing actual and substantial prejudice); see also United States v. Trombetta, No. CR 13-227-01, 2015 U.S. Dist. LEXIS 154748, 2015 WL 7289407, at *2 (W.D. Pa. Nov. 16, 2015). Quite to the contrary, Agent Humphreys credibly testified that she may have reviewed "one or two" emails between Defendant and Bespalov (which [*18]  did not appear privileged), and that the Government went to great lengths to ensure proper segregation of potentially privileged material. (Tr. at 20.)

Assuming, arguendo, the Government viewed even a few privileged communications, this de minimis "intrusion" does not warrant the wholesale suppression of the approximately 11,919 records at issue. As Agent Humphreys explained, the Government subpoenaed Chestnut Consulting Group (Defendant's company), seeking documents respecting the EBRD investigation. (Id.) In response and without asserting privilege, Chestnut disclosed responsive emails between Defendant and Bespalov that Agent Humphreys also reviewed. (Tr. at 20); see Westinghouse Elec. Corp. v. Republic of Philippines, 951 F.2d 1414, 1429 (3d Cir. 1991) (disclosures in response to DOJ subpoena waived attorney-client privilege). Moreover, Bespalov testified during the grand jury proceedings as to, inter alia, his communications with Defendant, and I anticipate that Bespalov will testify at trial. See In re Grand Jury Subpoena, 745 F.3d 681, 690 (3d Cir.) (upholding ruling requiring Bespalov to testify before the grand jury based on an application of the crime-fraud exception to attorney-client privilege), cert. denied sub nom., Corp. & Client v. United States, 135 S. Ct. 510, 190 L. Ed. 2d 361 (2014); see In re Grand Jury Subpoena, No. 10-127, 2013 U.S. Dist. LEXIS 8127 , 2013 WL 228115 (E.D. Pa. Jan. 18, 2013). In these circumstances, it is apparent that the Government would have inevitably learned [*19]  of any information it purportedly viewed in emails between Defendant and Bespalov, thus vitiating any prejudice to Defendant. Accordingly, the drastic remedy of suppression is not required. See, e.g., Voigt, 89 F.3d at 1066; United States v. Squillacote, 221 F.3d 542, 556-560 (4th Cir. 2000) ("Appellants complain only about the manner by which the government executed the warrant, a complaint that is inadequate to justify the severe remedy of blanket suppression . . . [W]e do not believe that suppression of any evidence derived from the privileged conversations would be proper in this case, given that the privilege is a testimonial or evidentiary one, and not constitutionally-based.")

Finally, to the extent Defendant asks me to suppress any fruits of the Government's review of the privileged emails, I decline to do. See United States v. Marashi, 913 F.2d 724, 731 n.11 (9th Cir. 1990) ("[N]o court has ever applied the [fruit of the poisonous trees] theory to any evidentiary privilege and . . . we have indicated we would not be the first to do so.") (emphasis in original); cf. Nickel v. Hannigan, 97 F.3d 403, 409 (10th Cir.1996) (refusing to suppress fruits of a seized privileged communication); United States v. Lefkowitz, 618 F.2d 1313, 1318 n. 8 (9th Cir.1980) ("Because we reject . . . [Defendant's] argument that the marital privileges are somehow constitutionally grounded in, among other locations, the Fourth Amendment, we doubt that a secondary source of information obtained [*20]  through information protected by the confidential marital communications privilege would in any way be 'tainted.'").

Defendant is thus not entitled to suppression on this ground.

 

c. Probable Cause

Defendant argues that the warrants lacked probable cause "in the first instance." (Doc. No. 79 at 1, 17.) Defendant also argues that the affidavits supporting the warrant applications were based on purportedly illegally obtained information, namely the alleged custodial interrogation of Defendant at JFK Airport. (Id.at 18.) Defendant thus requests a "taint hearing" to determine whether the Government relied on illegally obtained information in its search warrant applications. (Doc. No. 79 at 10, 18.) I will deny Defendant's request.

In his supporting affidavits, Agent Gray detailed extensive probable cause that Defendant participated in, inter alia, complex bribery and money laundering schemes. The affidavits relied on, inter alia: a whistleblower report that Defendant bribed Ryjenko; banking records reflecting bribes; contracts between Defendant and its clients for "success fees"; interviews suggesting that neither Defendant nor Sanderson provided the bona fide consulting services they claimed [*21]  to have provided; and an EBRD report finding that Defendant bribed Ryjenko. Agent Gray's affidavits thus amply made out probable cause, even without considering Defendant's statements during the JFK interview.

In any event, Defendant's argument respecting the JFK interview mistakenly assumes that the interview was illegal. I have already rejected this argument. (Doc. No. 123.) Accordingly, because the Airport interview was proper, the Government did not improperly rely on it in establishing probable cause for the email search warrants.

Finally, assuming, arguendo, the Airport interview was improper under the Fifth Amendment, Defendant is still not entitled to suppression of its physical fruits. See United States v. Patane, 542 U.S. 630, 634, 124 S. Ct. 2620, 159 L. Ed. 2d 667 (2004) (plurality opinion) (a failure to provide Miranda warnings does not require suppression of the physical fruits of the suspect's unwarned but voluntary statements); see also United States v. Latz, 162 F. App'x 113, 118 (3d Cir. 2005) (same); United States v. DeSumma, 272 F.3d 176, 180-81 (3d Cir. 2001) (same). Accordingly, even assuming, arguendo, the JFK interview was improper (which it was not), Defendant has still not shown that I must suppress the fruits of that interview.

 

d. The Magistrate Judge's Authority

Defendant argues that Judge Restrepo impermissibly issued warrants to be executed in another district. (Doc. No. [*22]  79 at 23-24.) Defendant argues that this violated Rule 41, requiring the Government to obtain search warrants in the district where the items will be seized. Fed. R. Crim. P. 41(b)(1) ("A magistrate judge with authority in the district . . . has authority to issue a warrant to search for and seize a person or property located within the district."). I disagree.

Defendant ignores the SCA's plain language, authorizing a court to issue search warrants for electronic communications provided the issuing court has jurisdiction over the offense under investigation. 18 U.S.C. § 2703(a);see United States v. Noyes, No. 1:08-CR-55-SJM-1, 2010 U.S. Dist. LEXIS 130041, 2010 WL 5139859, at *9 n.9 (W.D. Pa. Dec. 8, 2010). This Court certainly had jurisdiction over this offense based on Defendant's alleged criminal conduct in this District.

Defendant also ignores extensive case law permitting out-of-district electronic search warrants pursuant to the SCA. See, e.g., United States v. Bansal, 663 F.3d 634, 662 (3d Cir. 2011) ("[Defendant] contends that Rule 41(b), which limits a Magistrate Judge's jurisdiction to the District in which he or she sits, trumps ß 2703(a). We, along with other courts to consider the question, reject that contention."); United States v. Berkos, 543 F.3d 392, 398 (7th Cir. 2008) ("Rule 41(b) deals with substantive judicial authority--not procedure--and thus does not apply to ß 2703(a)."); Scully, 108 F. Supp. 3d at 83 ("[Section] 2703(a) authorizes electronic search warrants by a federal magistrate [*23]  judge that extend outside his or her district . . . the plain terms of Section 2703, considered with Rule 41, dictate this result."). Rule 41 thus provides no ground for suppression.

 

e. Notification

Defendant argues that the Government failed to inform him that it had seized his emails and so violated Rule 41. (Doc. No. 79 at 22-23.) He further argues that because it did not obtain a court order pursuant to 18 U.S.C. § 2705, the Government impermissibly directed Google and 1&1 to withhold notification of the Government's seizure. Again, I disagree.

The Government is not required to inform a defendant when it seizes his emails pursuant to the SCA. See 18 U.S.C. § 2703 (law enforcement may require disclosure of electronic communications "without required notice to the subscriber or customer, if [it] obtains a warrant issued . . . by a court of competent jurisdiction."); see also Bansal, 663 F.3d at 662-63 ("The plain text of Rule 41 . . . requires notice only "to the person from whom, or from whose premises, the property was taken."). Indeed, the Third Circuit has explicitly rejected that notice is necessary when the Government provides the internet service provider with a copy of the warrant, as it did here. See id. ("Because [Defendant] does not deny that the warrant was provided [*24]  to the internet service providers upon whom the search warrants were executed, we conclude that notice was properly made in this case."); see also In re U.S., 665 F. Supp. 2d 1210, 1221 (D. Or. 2009) ("In this third party context, the Fourth Amendment notice requirement is satisfied when a valid warrant is obtained and served on the holder of the property to be seized, the ISP.").

Defendant next argues without factual basis that because the Government failed to obtain a protective order barring Google and 1&1 from disclosing the seizures, it could not properly direct the providers to withhold notice of the seizures. Apart from supposition, Defendant has offered no evidence suggesting that the Government so instructed Google and 1&1. Indeed, the warrants do not mention any such instruction. Moreover, Agent Humphreys testified credibly that the FBI did not instruct either Google or 1&1 to withhold notice to Defendant. (Tr. at 9.) Defendant has thus not shown that the Government acted improperly concerning notification.

 

f. Standing

Finally, to the extent that Defendant seeks suppression of Ryjenko's emails, he lacks standing to do so. See United States v. Stearn, 597 F.3d 540, 551 (3d Cir. 2010) ("To invoke the Fourth Amendment's exclusionary rule, a defendant must demonstrate that his own Fourth Amendment rights were violated by the challenged [*25]  search or seizure." (citation omitted)). Defendant has not shown that he has a reasonable expectation of privacy in Ryjenko's emails. Accordingly, Defendant is not entitled to suppression of the Google production relating to aryjenko@gmail.com.

 

IV. Conclusion

The Government has shown that the Google and 1&1 warrants comported with the Fourth Amendment. Moreover, the Government's application for and execution of the warrants fully complied with the law governing electronic seizures. Accordingly, I will deny Defendant's Motion.

AND NOW, this 18th day of April, 2016, upon consideration of Defendant's Motion to Suppress (Doc. No. 79), the Government's Opposition (Doc. No. 102), and all related submissions, and after a suppression hearing, it is hereby ORDERED that Defendant's Motion to Suppress Emails Obtained from Google and 1&1 Internet is DENIED.

AND IT IS SO ORDERED.

/s/ Paul S. Diamond

Paul S. Diamond, J.