United States v. Steven Vincent Smith , 935 F.3d 1279 ( 2019 )


Menu:
  •          Case: 17-14915   Date Filed: 08/28/2019   Page: 1 of 56
    [PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________
    No. 17-14915
    ________________________
    D.C. Docket No. 2:16-cr-00203-KOB-JEO-1
    UNITED STATES OF AMERICA,
    Plaintiff - Appellee,
    versus
    JAMES RYAN TAYLOR,
    Defendant - Appellant.
    ________________________
    No. 18-11852
    ________________________
    D.C. Docket No. 4:16-cr-00312-VEH-JHE-1
    UNITED STATES OF AMERICA,
    Plaintiff - Appellee,
    versus
    Case: 17-14915       Date Filed: 08/28/2019       Page: 2 of 56
    STEVEN VINCENT SMITH,
    Defendant - Appellant.
    ________________________
    Appeals from the United States District Court
    for the Northern District of Alabama
    ________________________
    (August 28, 2019)
    Before TJOFLAT and NEWSOM, Circuit Judges, and ANTOON, * District Judge.
    NEWSOM, Circuit Judge:
    James Taylor and Steven Smith are the latest in a long line of child-
    pornography consumers to argue that the evidence of their crimes should be
    suppressed because the warrant that led to its discovery—issued by a magistrate
    judge in the Eastern District of Virginia but purporting to authorize a nationwide,
    remote-access computer search—violated the Fourth Amendment. By our count,
    we become today the eleventh (!) court of appeals to assess the constitutionality of
    the so-called “NIT warrant.” Although the ten others haven’t all employed the
    same analysis, they’ve all reached the same conclusion—namely, that evidence
    discovered under the NIT warrant need not be suppressed. We find no good
    * Honorable John Antoon II, United States District Judge for the Middle District of Florida,
    sitting by designation.
    2
    Case: 17-14915     Date Filed: 08/28/2019   Page: 3 of 56
    reason to diverge from that consensus here, but the case nonetheless calls for
    careful consideration, as it implicates several important issues.
    As an initial matter, did the NIT warrant violate Federal Rule of Criminal
    Procedure 41(b), which specifies where and in what circumstances a magistrate
    judge may issue a warrant—and relatedly, if the warrant did violate Rule 41(b),
    was that violation of constitutional magnitude? We hold that because the
    magistrate judge’s actions exceeded not only Rule 41(b) but also her statutorily
    prescribed authority under the Federal Magistrates Act, 28 U.S.C. § 636(a)—which
    circumscribes the scope of a magistrate judge’s jurisdiction—the warrant was void
    ab initio, rendering any search purporting to rely on it warrantless and thus
    presumptively unlawful under the Fourth Amendment.
    That leads us to the question of remedy, which we take in two parts: First, is
    exclusion required—without regard to the reasonableness of the officers’
    reliance—where, as here, the warrant was void from the outset, as Taylor and
    Smith urge? Or, as the government contends, should a void warrant be treated no
    differently from other defective warrants, such that the good-faith exception to the
    exclusionary rule can still apply? We hold that, because the exclusionary rule is
    concerned solely with deterring culpable police misconduct—and not at all with
    regulating magistrate judges’ actions—void and voidable warrants should be
    3
    Case: 17-14915    Date Filed: 08/28/2019    Page: 4 of 56
    treated no differently; accordingly, an officer’s reasonable reliance on the former,
    like the latter, can provide the basis for applying the good-faith exception.
    Second, even if the good-faith exception can apply when an officer relies on
    a void warrant, should the exception apply in the particular circumstances of this
    case? We hold that the officers’ warrant application here adequately disclosed the
    nature of the technology at issue and the scope of the intended search, that the
    officers reasonably relied on the magistrate judge’s determination that the search
    was permissible, and, accordingly, that the good-faith exception applies in this
    case.
    I
    A
    We begin with a bit of context. In the normal world of web browsing, an
    internet service provider—Comcast or AT&T, for example—assigns an IP address
    to every computer that it provides with internet access. An IP address is a unique
    numerical identifier, tantamount to a computer’s name. (OK, in the laptop era it’s
    slightly more complicated than that, because the “name” changes as the computer
    moves around and connects to different service providers’ networks—but you get
    the picture.) Websites can log IP addresses to keep track of the computers that
    visit, in essence creating a digital guest book. Internet browsing, therefore, isn’t
    quite as private as most people think—it’s actually pretty easy, for instance, for
    4
    Case: 17-14915       Date Filed: 08/28/2019        Page: 5 of 56
    law enforcement to find out who visited what sites, when, and for how long simply
    by subpoenaing IP-address logs from service providers.
    Not so when it comes to the “dark web,” the part of the internet “only
    accessible by means of special software, allowing users and website operators to
    remain anonymous or untraceable.” Blog.OxfordDictionaries.com. 1 “The Onion
    Router”—usually abbreviated “Tor”—is one such software program. Tor, which
    was the brainchild of the U.S. Navy but has since been released to the public,
    works by routing a user’s webpage requests through a series of computer servers
    operated by volunteers around the globe, rendering the user’s IP address essentially
    unidentifiable and untraceable. In the words of the folks who currently administer
    the “Tor Project,” a Massachusetts-based § 501(c)(3) organization responsible for
    maintaining Tor, you might think of what Tor does as “using a twisty, hard-to-
    follow route in order to throw off someone who is tailing you—and then
    periodically erasing your footprints.” 2
    1 See also Ahmed Ghappour, Searching Places Unknown: Law Enforcement Jurisdiction on the
    Dark Web, 69 Stan. L. Rev. 1075, 1087 (2017) (“The dark web is a private global computer
    network that enables users to conduct anonymous transactions without revealing any trace of
    their location.”).
    2 See Lee Matthews, What Tor Is, and Why You Should Use It to Protect Your Privacy, Forbes
    (Jan. 27, 2017 2:30 p.m.), https://www.forbes.com/sites/leemathews/2017/01/27/what-is-tor-and-
    why-do-people-use-it/#3186d5387d75 (last visited Aug. 27, 2019); see also Tor Project,
    https://2019.www.torproject.org/projects/torbrowser.html.en (“[Tor] prevents somebody
    watching your Internet connection from learning what sites you visit, it prevents the sites you
    visit from learning your physical location, and it lets you access sites which are blocked.”) (last
    visited Aug. 27, 2019).
    5
    Case: 17-14915    Date Filed: 08/28/2019    Page: 6 of 56
    As you can imagine, Tor has plenty of legitimate uses—think military and
    law-enforcement officers carrying out investigations, journalists seeking to
    maintain anonymity, and ordinary citizens researching embarrassing topics. As
    you can also imagine, Tor has spawned—and effectively enables—a cache of
    unsavory sites for black-market trading, child-pornography file-sharing, and other
    criminal enterprises. This is so because, in addition to allowing users to access
    public websites without leaving a trail, Tor also hosts a number of so-called
    “hidden services,” i.e., sites accessible only through Tor. You can’t just Google a
    hidden service; rather, a user can access one of these Tor-specific sites only by
    knowing its exact URL address. Most Tor-site addresses comprise a random
    jumble of letters and numbers followed by the address “.onion”—in place, say, of
    “.com” or “.org”—and are shared via message-board postings on the regular
    internet or by word of mouth.
    The hidden-service page at issue here, “Playpen,” was a child-pornography-
    distribution site accessible only through Tor. At the time the FBI began
    monitoring Playpen, the site contained more than 95,000 posts, had 160,000
    members, and hosted up to 1,500 visitors per day. The FBI monitored the site for
    several months until, based on a foreign-government tip, it found and arrested the
    administrator. Rather than shuttering Playpen immediately, the FBI covertly took
    6
    Case: 17-14915    Date Filed: 08/28/2019    Page: 7 of 56
    control of the site and began operating it out of a government server in Newington,
    Virginia, hoping to snare more users.
    As a means of ferreting out Playpen visitors whose identities were masked
    by Tor, the FBI sought to deploy government-created malware—specifically, a
    computer code called the Network Investigative Technique (“NIT”)—that would
    transmit user information back to the FBI. Here’s how the NIT worked: When a
    Playpen user downloaded images from a Tor-based site, the NIT would essentially
    “hitchhike” along, invade the host computer, and force it to send to the FBI
    (among other information) the computer’s IP address, the computer’s host name,
    and the username associated with the computer. Based on that information, the
    FBI could identify the user’s internet service provider and the computer affiliated
    with the account that accessed Playpen, thereby unmasking the user and providing
    probable cause for the FBI to seek a warrant to seize computers and hard drives.
    B
    To effectuate this plan, FBI Agent Douglas Macfarlane submitted a search-
    warrant application to a magistrate judge in the Eastern District of Virginia,
    requesting authorization to deploy the NIT. The application wasn’t a model of
    clarity or precision, particularly regarding the issue that most concerns us here—
    namely, the geographic scope of the requested search authority. In the case
    caption, the application described the “property to be searched”—seemingly
    7
    Case: 17-14915    Date Filed: 08/28/2019    Page: 8 of 56
    without territorial restriction—as “COMPUTERS THAT ACCESS
    upf45jv3bziuctml.onion,” which we now know to be associated with Playpen. Just
    below, however, in the body, the application asserted a reasonable belief that
    evidence of child-pornography-related crimes was contained on property “located
    in the Eastern District of Virginia.” As part of the same statement—regarding the
    “property to be searched”—the application referred to an “Attachment A.”
    Attachment A in turn stated that the NIT was “to be deployed on the computer
    server . . . operating the [Playpen] website” and specified that the server was
    “located at a government facility in the Eastern District of Virginia.” Attachment
    A then went on to state, though, that the goal of deploying the NIT was to obtain
    information from “[t]he activating computers . . . of any user or administrator who
    logs into [Playpen] by entering a username and password.”
    As is often the case, the NIT application also referenced an attached
    affidavit. Agent Macfarlane’s affidavit summarized the applicable law, explained
    numerous technical terms of art, and described Tor and the “Target Website”—i.e.,
    Playpen. On page 29 of 31, under the bolded heading “SEARCH
    AUTHORIZATION REQUESTS,” the affidavit stated, for the first time expressly,
    that “the NIT may cause an activating computer—wherever located—to send to a
    8
    Case: 17-14915       Date Filed: 08/28/2019       Page: 9 of 56
    computer controlled by or known to the government” certain information,
    including the IP address and host name. 3
    A magistrate judge in the Eastern District of Virginia signed the warrant and
    the FBI deployed the NIT.
    C
    Not long thereafter, NIT-transmitted data revealed to the FBI that a certain
    Playpen user was linked to a computer with the host name “RyansComputer.”
    After the user accessed several images of child pornography, the FBI sent an
    administrative subpoena to the user’s internet service provider and discovered that
    the IP address associated with the computer was assigned to James Taylor in
    Birmingham, Alabama. A magistrate judge in the Northern District of Alabama
    then authorized a search warrant for Taylor’s residence, where the FBI seized
    Taylor’s laptop, hard drive, and USB drive. After analyzing the hardware twice,
    the FBI found what it was looking for.
    Steven Smith’s Playpen activities were discovered in a nearly identical way.
    As in Taylor’s case, the NIT revealed that someone had used Smith’s computer
    and IP address to log into Playpen. Based on the NIT data, the FBI subpoenaed
    3 The warrant also explained that the NIT would send the following information: the unique
    identifier that distinguishes the data on the host computer from that of other computers, the type
    of operating system the host computer is running, whether the NIT has already been downloaded
    to the host computer, an active operating system username, and a Media Access Control address.
    9
    Case: 17-14915     Date Filed: 08/28/2019   Page: 10 of 56
    records from an internet service provider and used that information to secure a
    warrant from a magistrate judge in the Northern District of Alabama, allowing
    officers to search Smith’s residence in Albertville, Alabama. The search revealed
    child-pornography images on a thumb drive. After arresting Smith, the officers
    obtained a search warrant for his office and seized his work computer, which also
    contained child pornography.
    Taylor and Smith were charged with receiving child pornography under 18
    U.S.C. § 2252A(a)(2) and with possessing and accessing child pornography with
    the intent to view it under 18 U.S.C. § 2252A(a)(5)(B) & (b)(2). They both moved
    to suppress the evidence against them, asserting, as relevant here, that the NIT
    warrant violated the Fourth Amendment, Federal Rule of Criminal Procedure
    41(b), and the Federal Magistrates Act, 28 U.S.C. § 636(a), and, accordingly, that
    the seized images should be suppressed as fruit of the poisonous tree. The district
    court in each case denied the motion to suppress. Both courts agreed that the NIT
    warrant violated the Fourth Amendment—and was thus void—but declined to
    suppress the evidence on the ground that the searches, and the resulting seizures,
    fell within the good-faith exception to the exclusionary rule. Both defendants
    appealed, and their cases were consolidated for review and decision.
    10
    Case: 17-14915       Date Filed: 08/28/2019      Page: 11 of 56
    II
    All here agree that the NIT’s extraction and transmission of Taylor’s and
    Smith’s information was a “search” within the meaning of the Fourth Amendment.
    U.S. Const. amend. IV. 4 All likewise agree that no exigency or other exception
    exempted the FBI from the usual requirement to obtain a search warrant. See
    United States v. Cooks, 
    920 F.3d 735
    , 741 (11th Cir. 2019) (“[W]arrantless
    searches are presumptively unreasonable, ‘subject only to a few specifically
    established and well-delineated exceptions.’” (quoting Katz v. United States, 
    389 U.S. 347
    , 357 (1967))). There, the agreement ends. The parties vigorously dispute
    whether the NIT warrant was valid and, if not, whether (and to what extent) that
    fact should bear on the admissibility of the evidence found. Accordingly, we are
    faced with the following issues, each with its own twists and turns: (1) Did the NIT
    warrant violate Federal Rule of Criminal Procedure 41(b) and, if so, did it likewise
    4 That Taylor and Smith used Tor to download child pornography is important because it takes
    this case out of third-party-doctrine land. See Smith v. Maryland, 
    442 U.S. 735
    (1979). Instead
    of traveling along the equivalent of “public highways” (by browsing the open internet) or leaving
    the equivalent of a calling card at each website visited (as with a normal internet search), Tor
    users purposefully shroud their browsing, such that they have a reasonable expectation of privacy
    in their online “movements.” See United States v. Davis, 
    785 F.3d 498
    , 507 (11th Cir. 2015)
    (explaining that the Fourth Amendment’s protections apply where an individual has exhibited “a
    subjective expectation of privacy” that society recognizes as reasonable (citation omitted)).
    11
    Case: 17-14915       Date Filed: 08/28/2019       Page: 12 of 56
    violate the Fourth Amendment? And (2) if the NIT warrant did run afoul of the
    Fourth Amendment, does the exclusionary rule apply? 5
    A
    1
    Federal Rule of Criminal Procedure 41(b), titled “Venue for a Warrant
    Application,” both outlines the situations in which a magistrate judge may issue a
    warrant for a search within her district and specifies the more limited
    circumstances in which she may issue a warrant for a search outside her district.
    With respect to the former, Rule 41(b)(1) states that “a magistrate judge with
    authority in the district . . . has authority to issue a warrant to search for and seize a
    person or property located within the district.” Fed. R. Crim. P. 41(b)(1). It is
    undisputed, though, that the NIT warrant sought authority to search for information
    outside the territorial confines of the Eastern District of Virginia. And the parties
    agree that, for present purposes, Rule 41(b)(4)—which authorizes “tracking
    device” warrants—is the only provision that could have empowered the magistrate
    judge to authorize the specific out-of-district search in this case. That rule permits
    a magistrate “to issue a warrant to install within the district a tracking device” to
    5 In reviewing a district court’s denial of a motion to suppress, we review factual findings for
    clear error and the application of law to those facts de novo. United States v. Ramirez, 
    476 F.3d 1231
    , 1235 (11th Cir. 2007). Where, as here, the facts are undisputed, we simply review the
    legality of a search de novo. United States v. Phillips, 
    834 F.3d 1176
    , 1179 (11th Cir. 2016).
    12
    Case: 17-14915       Date Filed: 08/28/2019       Page: 13 of 56
    “track the movement of a person or property located within the district, outside the
    district, or both.” Fed. R. Crim. P. 41(b)(4) (emphasis added). 6 Accordingly, the
    NIT warrant complies with Rule 41(b) only if we conclude that it was issued in
    accordance with subsection (b)(4). 7
    We find two mismatches—one formal (but telling) and the other substantive.
    Initially, as a matter of form, although the government now defends the NIT
    warrant on a tracking-device basis, it conspicuously didn’t seek the warrant under
    Rule 41(b)(4). Tracking-device warrants issued under subsection (b)(4) are
    generally requested pursuant to a specialized “Application for a Tracking
    Warrant.” 8 Here, though, the FBI seems to have sought the NIT warrant under
    Rule 41(b)(1)’s general provision for warrants authorizing in-district searches. The
    warrant application’s cover sheet represented that the FBI wished to search
    property “located in the Eastern District of Virginia,” and neither the application
    nor the accompanying affidavit mentioned the term “tracking device” or otherwise
    indicated that the application sought authorization under subsection (b)(4). The
    6 As it turns out, Rule 41(b) has since been amended to add a provision—subsection (b)(6)—for
    remote electronic searches of the sort at issue in this case. See infra Section II.B.2.
    7No court of appeals has found that the NIT warrant fits within the tracking-device exception,
    although this argument has persuaded a few district courts. See United States v. Taylor, 250 F.
    Supp. 3d 1215, 1222–23 (N.D. Ala. 2017) (compiling district and appellate court holdings on
    NIT-warrant searches).
    8 See, e.g., Administrative Office of U.S. Courts, Criminal Forms AO 102 (2009) & AO 104
    (2016), http://www.uscourts.gov/forms/criminal-forms (last visited Apr. 26, 2019).
    13
    Case: 17-14915    Date Filed: 08/28/2019    Page: 14 of 56
    government’s revisionism on appeal—invoking Rule 41(b)(4) to defend what was,
    by all accounts, a Rule 41(b)(1) application—undermines its position that the
    Rule’s tracking-device provision sanctions the NIT warrant.
    Moreover, and in any event, we reject the government’s tracking-device
    argument on the merits. For Rule 41 purposes, a “tracking device” is “an
    electronic or mechanical device which permits the tracking of the movement of a
    person or object.” 18 U.S.C. § 3117(b); see also Fed. R. Crim. P. 41(a)(2)(E)
    (explaining that “‘[t]racking device’ has the meaning set out in 18 U.S.C. §
    3117(b)”). The government contends that the NIT constitutes a tracking device
    because “just as a GPS tracker attached to a car will send a receiver coordinates or
    other signals with locational information, the NIT augmented the content of
    Playpen and sent locational information back to a government-controlled
    computer.” Br. of Appellee at 15.
    We disagree. The NIT didn’t reveal “locational information” at all—it
    didn’t even send a locational snapshot, let alone the type of ongoing, GPS-
    coordinate transmissions that would “permit[] the tracking of the movement of a
    person or object” within the meaning of Rule 41(b)(4). Rather, the NIT performed
    a one-time extraction of non-locational information—including a computer’s IP
    address, username, and other identifying material—which it transmitted to the FBI.
    Of course, the identifying information that the NIT extracted and sent was then
    14
    Case: 17-14915        Date Filed: 08/28/2019        Page: 15 of 56
    traced to a physical address using an internet service provider’s records, but only in
    the same way that a person’s name might be traced to a physical address using a
    phone book. In other words, that the FBI eventually used the NIT-transmitted
    information to discover additional facts that, in turn, enabled it to then determine a
    Playpen user’s location in no way transformed the initial information transmittal
    into “tracking.” 9
    To be clear, it’s not just that the NIT isn’t exactly a tracking device—it’s
    that it’s exactly not a tracking device. A GPS tracker stuck to the bottom of a car
    can’t tell you the car’s make and model, its owner, or its place of registration—but
    it can tell you whether the car is parked at Starbucks or cruising down I-20. By
    contrast, the NIT malware can and did transmit the equivalent of a computer’s
    name, to whom it was registered, and other identifying information—but it didn’t
    (and couldn’t) reveal whether the computer was at the owner’s home or office, at
    Starbucks, or in the car on the move. In short, while a tracking device transmits
    9 The government also points out that the NIT was deployed from a computer in the Eastern
    District of Virginia—which, it says, is the equivalent of a tracking device being “installed within
    the district.” But a GPS tracker that is physically attached to an item within the territorial
    confines of a particular district is clearly “install[ed] within” that district. By contrast, the NIT
    software, although deployed and activated from a government computer in the Eastern District of
    Virginia, was not “installed within” that district—it was installed on suspects’ computers outside
    of the district.
    15
    Case: 17-14915        Date Filed: 08/28/2019       Page: 16 of 56
    location but not identifying information, the NIT sent identifying information but
    not location. 10
    To sum up, we hold that the NIT is not a “tracking device” within the
    meaning of Federal Rule of Criminal Procedure 41(b), and we reject the
    government’s post hoc attempts to classify it as such. Because the NIT warrant
    was not authorized by any of Rule 41(b)’s applicable subsections, the warrant
    violated the Rule.
    2
    So, what effect? While constitutional violations may merit suppression—
    more on that later—mere “technical noncompliance” with a procedural rule results
    in the exclusion of evidence only when (1) “there was ‘prejudice’ in the sense that
    the search might not have occurred or would not have been so abrasive if the rule
    had been followed,” or (2) “there is evidence of intentional and deliberate
    disregard of a provision in the Rule.” United States v. Williams, 
    871 F.3d 1197
    ,
    1203 (11th Cir. 2017) (citation omitted).
    Which do we have here—a constitutional violation or just a technical one?
    The government says that the violation in this case was merely technical because
    10If the term “tracking device” included every gadget capable of acquiring and transmitting
    information that could somehow, in some way, aid in identifying a person’s location, the term
    would be unimaginably broad, including any phone or camera capable of sending a photo, as
    images of buildings, street signs, or other landmarks can surely be used to identify a location.
    16
    Case: 17-14915     Date Filed: 08/28/2019   Page: 17 of 56
    Rule 41(b) is just a venue provision—it has nothing to do with a magistrate’s
    power or jurisdiction. The government points out, for instance, that as of 2016,
    Rule 41(b) is no longer titled “Authority to Issue a Warrant,” but rather “Venue for
    a Warrant Application.” See Fed. R. Crim. P. 41(b). And, the argument goes, if
    Rule 41(b) is an ordinary venue provision, a breach of its provisions would not rise
    to the level of a constitutional violation.
    Fair enough. As we’ve recently been at pains to emphasize—following the
    Supreme Court’s lead—not every mandatory proclamation or prohibition creates a
    jurisdictional bar, and we are loath to “jurisdictionalize” issues unnecessarily. See,
    e.g., Orion Marine Constr., Inc. v. Carroll, 
    918 F.3d 1323
    , 1328–29 (11th Cir.
    2019); Sec’y, U.S. Dep’t of Labor v. Preston, 
    873 F.3d 877
    , 881–82 (11th Cir.
    2017). Here, though, jurisdiction is squarely in play: While Rule 41(b) itself may
    address only venue, the statute behind the rule—the Federal Magistrates Act, 28
    U.S.C. § 636—imposes clear jurisdictional limits on a magistrate judge’s power.
    Section 636(a) states that magistrate judges “shall have within [their] district[s]”
    the “powers . . . conferred . . . by law or by the Rules of Criminal Procedure.” 28
    U.S.C. § 636(a)(1) (emphasis added). Because no one contends that any law or
    Rule other than Rule 41(b) gave the magistrate judge the authority to issue the NIT
    warrant in this case, when the magistrate issued the warrant outside of Rule 41(b)’s
    ambit, she necessarily transgressed the limits of her jurisdiction.
    17
    Case: 17-14915    Date Filed: 08/28/2019    Page: 18 of 56
    We aren’t breaking any new ground here. As now-Justice Gorsuch
    explained during his tenure on the Tenth Circuit, § 636(a) “expressly—and
    exclusively—refers to the territorial scope of a magistrate judge’s power to
    adjudicate” and, further, is “found in Title 28 of the U.S. Code—the same title as
    the statutes that define a district court’s jurisdiction.” United States v. Krueger,
    
    809 F.3d 1109
    , 1122 (10th Cir. 2015) (Gorsuch, J., concurring). Or, as the Ninth
    Circuit put it, “federal magistrates are creatures of [§ 636(a)], and so is their
    jurisdiction.” N.L.R.B. v. A-Plus Roofing, Inc., 
    39 F.3d 1410
    , 1415 (9th Cir. 1994);
    see also United States v. Hazlewood, 
    526 F.3d 862
    , 864 (5th Cir. 2008) (“In the
    Federal Magistrates Act, 28 U.S.C. § 636, Congress conferred jurisdiction to
    federal magistrate[]judge[s].”). Thus, as § 636(a) is the sole source of a magistrate
    judge’s warrant authority, a warrant issued in defiance of its jurisdictional
    limitations is void—“no warrant at all.” 
    Krueger, 809 F.3d at 1118
    (Gorsuch, J.,
    concurring).
    To be fair, Krueger was an easier case—there, a magistrate judge in one
    district purported to authorize a search in an adjacent district, in which she clearly
    had no jurisdiction. The magistrate judge here, by contrast, issued a warrant
    purporting to allow a search of computers “wherever located”—which, of
    necessity, included her own district. But the fact that the warrant in its overbreadth
    happened to sweep in the Eastern District of Virginia along with the rest of the
    18
    Case: 17-14915        Date Filed: 08/28/2019       Page: 19 of 56
    nation doesn’t cure the fact that it was issued outside of the magistrate judge’s
    statutorily prescribed (and proscribed) authority in the first place. Indeed, the idea
    that a warrant may be issued partially from a place of statutorily-granted authority
    and partially from the great beyond (with one foot inside and one foot outside the
    lines, so to speak) strikes us as nonsensical. Rather, it seems to us that a magistrate
    judge must act either pursuant to the authority granted her by statute or not, and
    thus have the authority either to issue a warrant (in toto) or not. 11
    Because the NIT warrant was void at issuance, the ensuing search was
    effectively warrantless and therefore—because no party contends that an exception
    to the presumptive warrant requirement applies here—violative of the Fourth
    Amendment. Accord United States v. Werdene, 
    883 F.3d 204
    , 214 (3d Cir.), cert.
    denied, 
    139 S. Ct. 260
    (2018); United States v. Horton, 
    863 F.3d 1041
    , 1050 (8th
    11 Nor do we see a persuasive case for “severing” the NIT warrant, so to speak, along
    jurisdictional lines—such that it might be deemed valid in the Eastern District of Virginia, even
    if invalid everywhere else, and thus not void ab initio and in toto (to really pour on the Latin).
    We are aware, of course, that several courts have held that a warrant can be severed along what
    might loosely be called subject-matter lines—i.e., with respect to probable cause or particularity.
    See, e.g., United States v. George, 
    975 F.2d 72
    , 79 (2d Cir. 1992) (“When a warrant is severed
    (or redacted) the constitutionally infirm portion—usually for lack of particularity or probable
    cause—is separated from the remainder and evidence seized pursuant to that portion is
    suppressed; evidence seized under the valid portion may be admitted.”). But the flaws in the two
    situations, it seems to us, are fundamentally different. Subject-matter severance addresses an
    error made by a properly empowered official; the error that plagues the NIT warrant is more
    fundamental—it implicates the magistrate judge’s power to act in the first instance.
    19
    Case: 17-14915       Date Filed: 08/28/2019       Page: 20 of 56
    Cir. 2017), cert. denied, 
    138 S. Ct. 1440
    (2018); United States v. Henderson, 
    906 F.3d 1109
    , 1116 (9th Cir. 2018), cert. denied, 
    139 S. Ct. 2033
    (2019). 12
    B
    So the search carried out under the NIT warrant violated not just Rule 41 but
    also the Fourth Amendment. But again: What effect? At last we come to the
    question at the heart of the remedy that Taylor and Smith seek. Can the good-faith
    exception to the exclusionary rule apply in a situation like this, where officers rely
    on a warrant that is later determined to have been void ab initio? And more
    specifically, does the good-faith exception apply in the particular circumstances of
    this case?
    1
    The “exclusionary rule”—which operates to bar the admission of evidence
    obtained in violation of the Fourth Amendment—appears nowhere in the
    Constitution’s text. It is, the Supreme Court has said, not “a personal
    12The government also contends—in nearly identical terms in both cases—that “[b]ecause the
    search of Taylor’s [and Smith’s] computer[s] would have been valid if a magistrate judge in the
    Northern District of Alabama had signed the NIT Warrant, any Rule 41(b) violation did not
    cause [them] prejudice” and suppression is not necessary. Br. of Appellee at 34 (emphasis
    added) (Taylor); see also Br. of Appellee at 29 (Smith). “Taylor [and Smith] suffered no more
    of an intrusion of [their] privacy,” the government contends, “than [they] would have if the FBI
    had searched [their] computer[s] under a valid warrant.” Br. of Appellee at 31 (Taylor); see also
    Br. of Appellee at 28 (Smith). No. Had the magistrate judge in the Eastern District of Virginia
    acted within her jurisdiction, the warrant could not have extended to Alabama and the FBI would
    not have identified Taylor or Smith, nor would it have had probable cause to apply for a second
    warrant to search their homes.
    20
    Case: 17-14915       Date Filed: 08/28/2019       Page: 21 of 56
    constitutional right,” but rather a “judicially created” remedy, whose purpose is to
    “deter future Fourth Amendment violations” and “compel respect for the
    constitutional guaranty.” Davis v. United States, 
    564 U.S. 229
    , 236–37, 238
    (2011) (citation omitted). This remedy, however, doesn’t follow automatically;
    society must swallow the “bitter pill” of suppression when necessary, 
    id. at 238,
    but only when the “benefit” of exclusion outweighs its “substantial social costs,”
    Illinois v. Krull, 
    480 U.S. 340
    , 352–53 (1987). The dual pillars of the exclusion
    decision, the Supreme Court recently emphasized, are deterrence and culpability:
    “Police practices trigger the harsh sanction of exclusion only when they are
    deliberate enough to yield ‘meaningfu[l]’ deterrence, and culpable enough to be
    ‘worth the price paid by the justice system.’” 
    Davis, 564 U.S. at 240
    (alteration in
    original) (quoting Herring v. United States, 
    555 U.S. 135
    , 144 (2009)); see also 
    id. (suppression not
    warranted because officer did not act “deliberately, recklessly, or
    with gross negligence”).
    The good-faith exception is a “judicially created exception to this judicially
    created rule.” 
    Id. at 248.
    13 In United States v. Leon, the Supreme Court explained
    13Although “good faith” is most often framed as an “exception” to the exclusionary rule, it is
    probably more accurately described as a reason for declining to invoke the exclusionary rule in
    the first place. Compare, e.g., 
    Davis, 564 U.S. at 238
    (“The Court has over time applied this
    ‘good-faith’ exception across a range of cases.” (emphasis added)), with, e.g., 
    id. at 239
    (“The
    question in this case is whether to apply the exclusionary rule when the police conduct a search
    in objectively reasonable reliance on binding judicial precedent.” (emphasis added)), and
    Herring v. United States, 
    555 U.S. 135
    , 139 (2009) (characterizing the question presented as
    21
    Case: 17-14915       Date Filed: 08/28/2019      Page: 22 of 56
    that exclusion is not warranted when police act “in objectively reasonable reliance”
    on a subsequently invalidated search warrant—in other words, when they act in
    “good faith.” 
    468 U.S. 897
    , 922 (1984). “‘[O]ur good-faith inquiry is confined to
    the objectively ascertainable question whether a reasonably well trained officer
    would have known that the search was illegal’ in light of ‘all of the
    circumstances.’” 
    Herring, 555 U.S. at 145
    (quoting 
    Leon, 468 U.S. at 922
    n.23).
    To date, the Supreme Court has applied the good-faith exception when,
    among other things, officers reasonably relied on a warrant that was later deemed
    invalid for lack of probable cause, see 
    Leon, 468 U.S. at 922
    , on a warrant that
    erroneously appeared outstanding due to an error in a court or police database, see
    Arizona v. Evans, 
    514 U.S. 1
    , 4 (1995); 
    Herring, 555 U.S. at 137
    , on a statute that
    was later deemed unconstitutional, see 
    Krull, 480 U.S. at 352
    –53, and on a judicial
    decision that was later overruled, 
    Davis, 564 U.S. at 232
    . The Supreme Court
    hasn’t, however, directly addressed the particular question before us today—
    whether the good-faith exception can be applied to a search conducted in reliance
    on a warrant that was void from the outset.
    Taylor and Smith insist that the void-voidable distinction is critical.
    Reliance on a voidable warrant—issued in error, perhaps, but by a judge with
    “whether the exclusionary rule should be applied” when officers act in reasonable reliance on a
    negligent police database error (emphasis added)).
    22
    Case: 17-14915   Date Filed: 08/28/2019    Page: 23 of 56
    jurisdiction to act—is different, they contend, from reliance on a warrant that was
    void from the get-go. Because the latter is—as we’ve agreed—“no warrant at all,”
    Taylor and Smith insist that reliance on it can’t provide an exception to the
    exclusionary rule. This is so, they continue, because the “heart of the good faith
    exception is [] officers’ reliance on a neutral third party’s actions within the scope
    of the third party’s authority.” Br. of Appellant Taylor at 29; Br. of Appellant
    Smith at 27.
    There is a certain logic to this argument: In fact, there was never a valid
    warrant, so the search was illegal all along. What matters for exclusionary-rule
    and good-faith purposes, though, isn’t the validity of the warrant “in fact,” but
    rather the validity of the warrant as it would have reasonably appeared to an officer
    tasked with executing it. The appropriate question, therefore, is whether, from the
    perspective of a reasonable officer, there is any difference—for deterrence or
    culpability purposes—between the warrant issued in this case and the warrants
    issued in Leon, Evans, and Herring?
    We don’t think so. The exclusionary rule is concerned with deterring officer
    misconduct and punishing officer culpability—not with setting judges straight. See
    
    Herring, 555 U.S. at 142
    (observing that the “exclusionary rule was crafted to curb
    police rather than judicial misconduct”). Viewed from an officer’s perspective,
    relying on a facially valid warrant that, as it turns out, was void from the beginning
    23
    Case: 17-14915     Date Filed: 08/28/2019   Page: 24 of 56
    is no different from relying on a facially valid warrant that, for instance, was later
    deemed improper based on a dubious determination of probable cause, see 
    Leon, 468 U.S. at 925
    –26, or appeared outstanding thanks only to a database error, see
    
    Herring, 555 U.S. at 136
    –37. So long as an officer could reasonably have thought
    that the warrant was valid, the specific nature of the warrant’s invalidity is
    immaterial.
    In so holding, we join every court of appeals to consider the question, all of
    which have agreed that the good-faith exception applies—and the exclusionary
    rule doesn’t—in a situation like this. See United States v. Eldred, No. 17-3367-cv,
    
    2019 WL 3540415
    , at *8 (2d Cir. Aug. 5, 2019); United States v. Ganzer, 
    922 F.3d 579
    , 587–90 (5th Cir.), petition for cert. filed, No. 19-5339 (2019); United States v.
    Moorehead, 
    912 F.3d 963
    , 971 (6th Cir.), petition for cert. filed, No. 19-5444
    (2019); 
    Werdene, 883 F.3d at 216
    –17; United States v. McLamb, 
    880 F.3d 685
    ,
    691 (4th Cir.), cert. denied, 
    139 S. Ct. 156
    (2018); United States v. Kienast, 
    907 F.3d 522
    , 527–28 (7th Cir. 2018), cert. denied, 
    139 S. Ct. 1639
    (2019); 
    Henderson, 906 F.3d at 1118
    ; United States v. Levin, 
    874 F.3d 316
    , 323–24 (1st Cir. 2017);
    Horton, 863 F.3dat 1050; United States v. Workman, 
    863 F.3d 1313
    , 1319 (10th
    Cir. 2017), cert. denied, 
    138 S. Ct. 1546
    (2018). As the Sixth Circuit summarized,
    “[t]he good-faith exception is not concerned with whether a valid warrant exists,
    but instead asks whether a reasonably well-trained officer would have known that a
    24
    Case: 17-14915      Date Filed: 08/28/2019    Page: 25 of 56
    search was illegal.” 
    Moorehead, 912 F.3d at 968
    . The Third Circuit similarly
    explained the “fundamental flaw” in the argument like the one that Taylor and
    Smith make here: “[I]t does not appreciate the distinction between the validity of
    the warrant and the deterrence rationale of the exclusionary rule and the good-faith
    exception.” 
    Werdene, 883 F.3d at 216
    .
    In light of the exclusionary rule’s purpose of deterring culpable police
    misconduct, there is no reason to distinguish between good-faith reliance on a void
    warrant and any other warrant later deemed defective. We thus hold that the good-
    faith exception to the exclusionary rule can apply when police officers reasonably
    rely on a warrant later determined to have been void ab initio.
    2
    Finally, then, to this particular case: Having determined that the good-faith
    exception can apply in situations involving void warrants, the question remains
    whether the exception should apply to the cases before us today. In Leon, the
    Supreme Court laid out several situations in which the good-faith exception should
    not apply: (1) where the magistrate judge was misled by information in a warrant
    application that the applicant knew was false or would have known was false but
    for a reckless disregard of the truth; (2) where the magistrate “wholly abandoned”
    her judicial role; (3) where the affidavit supporting the warrant application was “so
    lacking in indicia of probable cause as to render official belief in its existence
    25
    Case: 17-14915     Date Filed: 08/28/2019   Page: 26 of 56
    entirely unreasonable”; or (4) where the warrant was “so facially deficient” that
    officers couldn’t have reasonably presumed it to be 
    valid. 468 U.S. at 923
    .
    Here, Taylor and Smith contend—and the dissent agrees—that the
    magistrate was, within the meaning of Leon, “misled by information” in the
    application that the FBI officers knew, or should have known, to be false. The face
    of the application, they say, prominently represented that the “property to be
    searched” was “located in the Eastern District of Virginia” and, more specifically,
    asserted (in the incorporated Attachment A) that the Playpen server was “located at
    a government facility in the Eastern District of Virginia.” Br. of Appellant Taylor
    at 42; Br. of Appellant Smith at 41. It wasn’t until page 29 of Agent Macfarlane’s
    31-page affidavit, Taylor and Smith say, that the application finally acknowledged
    that the NIT would search computers “wherever located.” Br. of Appellant Taylor
    at 42; Br. of Appellant Smith at 41. This approach, they contend, shows that the
    FBI intentionally misled the magistrate judge and belies any claim to good-faith
    reliance.
    In responding that the good-faith exception should apply, the government
    begins with the contention that there is no deterrent benefit to exclusion here
    because Rule 41 was recently amended to add a new subsection to cover remote-
    access warrants to search electronic storage both within and outside of a magistrate
    26
    Case: 17-14915        Date Filed: 08/28/2019       Page: 27 of 56
    judge’s district—i.e., precisely the sort of search at issue in this case. 14 But that
    argument cuts both ways. On the one hand, it indicates that we needn’t necessarily
    deter this particular type of search on a going-forward basis. On the other, the
    recent amendment of Rule 41 to allow remote-access search warrants underscores
    that Rule 41(b) did not permit these warrants at the time the FBI deployed the NIT.
    Even so, we find no indication that the FBI officers sought to deceive the
    magistrate judge or otherwise acted culpably or in a way that necessitates
    deterrence—and certainly no indication of the sort of “deliberate[], reckless[], or .
    . . gross[ly] negligen[t]” conduct that the Supreme Court has recently highlighted
    as the focus of the exclusionary-rule/good-faith inquiry. 
    Davis, 564 U.S. at 240
    ;
    see also 
    Herring, 555 U.S. at 144
    ; 
    Krull, 480 U.S. at 352
    –53. While the NIT-
    warrant application was perhaps not a model of clarity, it seems clear to us that the
    officers did the best they could with what they had—a general application form
    that was perhaps ill-suited to the complex new technology at issue. 15 It is true, as
    14Rule 41(b)(6) now states in relevant part: “[A] magistrate judge with authority in any district
    where activities related to a crime may have occurred has authority to issue a warrant to use
    remote access to search electronic storage media and to seize or copy electronically stored
    information located within or outside that district if . . . the district where the media or
    information is located has been concealed through technological means.”
    15In concluding that the officers intended to “hoodwink” the magistrate judge, the dissent relies
    heavily on DOJ’s proposals to amend Rule 41 to better address “remote searches for ‘crimes
    involving Internet anonymizing technology.’” Dissenting Op. at 37–38, 46 (quoting Letter from
    Mythili Raman, Acting Assistant Att’y Gen., to Hon. Reena Raggi, Chair, Advisory Comm. on
    the Crim. Rules (Sept. 18, 2013)). Even setting aside the dubious proposition that knowledge of
    communications between the “highest ranking officials in the Criminal Division” and Federal
    27
    Case: 17-14915      Date Filed: 08/28/2019       Page: 28 of 56
    Taylor and Smith emphasize, that the face of the pre-printed warrant application
    stated that “the property to be searched” was “located in the Eastern District of
    Virginia.” It is also true that Attachment A, which described the target property,
    reported that the Playpen server was “located at a government facility in the
    Eastern District of Virginia.” That being said, there were indications that the FBI
    was seeking more broad-ranging search authority. As already noted, the case
    caption referred generally to “COMPUTERS THAT ACCESS” Playpen.
    Somewhat more clearly, Attachment A explained that the NIT would be “deployed
    on” the Playpen-operating server located in the Eastern District of Virginia as a
    means of “obtaining information” from “activating computers,” defined as
    computers “of any user or administrator who logs into” the Playpen site. Finally,
    and most importantly—if a bit more obscurely than might have been ideal—Agent
    Macfarlane’s affidavit stated that “the NIT may cause an activating computer—
    wherever located—to send” identifying information to the FBI.
    So, was the warrant application here perfect? Not close. But does it
    evidence “chicanery,” “duplicity,” and “gamesmanship”? See Dissenting Op. at
    Rules Advisory Committee Chairs can be imputed downstream to line-level law-enforcement
    officers, see Dissenting Op. at 38–39, these communications in no way demonstrate that the
    warrant application here was made in bad faith. We see no benefit to deterring officers from
    attempting to describe cutting-edge countermeasures using the forms and resources at their
    disposal while department heads simultaneously seek to amend the rules to better address
    advancing technology. Cf. Eldred, 
    2019 WL 3540415
    , at *7; 
    McLamb, 880 F.3d at 691
    . The
    dissent’s argument to the contrary is based entirely on speculation about what different
    government actors could have known.
    28
    Case: 17-14915        Date Filed: 08/28/2019       Page: 29 of 56
    16, 25. It doesn’t. We conclude that, in their totality, the application and affidavit
    sufficiently disclosed the bounds of the intended search. In light of the square-
    peg/round-hole issue that they faced, the officers did what we would hope and
    expect—they fully disclosed the mechanics of the intended search, left the
    constitutional call to the magistrate judge, and acted in reasonable reliance on the
    resulting warrant. 16 As already explained, the “exclusionary rule was crafted to
    curb police rather than judicial misconduct.” 
    Herring, 555 U.S. at 142
    . Because
    we don’t find the officers’ behavior here culpable and see no deterrent value in
    suppressing the evidence found on Taylor’s and Smith’s computers, we find that
    the good-faith exception to the exclusionary rule applies in this case.
    AFFIRMED.
    16 To the extent that the dissent suggests that officers seeking a search warrant have an
    affirmative obligation to “flag” potential legal issues in their application, we must respectfully
    disagree. See, e.g., Dissenting Op. at 39–40 (stating that the officers here “should have known . .
    . that the magistrate’s jurisdiction to issue the warrant was in doubt” and that they “had an
    obligation to flag [this] for the magistrate”). Law-enforcement officers have a duty to lay out
    facts—including jurisdictional facts—for reviewing courts, not to anticipate and articulate
    possible legal hurdles. The warrant application here, particularly when read in conjunction with
    Agent Macfarlane’s detailed 30-plus-page affidavit, adequately—if imperfectly—lays out the
    facts. See, e.g., 
    Levin, 874 F.3d at 323
    (determining that there was “no benefit in deterring” the
    government from “turn[ing] to the courts for guidance” when faced with a novel legal question
    such as whether the NIT warrant could properly issue).
    29
    Case: 17-14915        Date Filed: 08/28/2019        Page: 30 of 56
    TJOFLAT, Circuit Judge, concurring in part and dissenting in part: 1
    As the majority points out, we are far from the first court to consider
    whether the NIT warrant passes constitutional muster. I agree with the majority
    that it does not. The majority also adds its voice to the unanimous chorus of ten
    other courts of appeals who have found that, regardless of any constitutional
    infirmity, the exclusionary rule should not apply. On this point, I must respectfully
    dissent.
    The evidence obtained as a result of the NIT warrant should be suppressed
    because the law enforcement officials who sought the warrant are not entitled to
    the good faith exception. The officials knew or should have known that there was
    an issue with jurisdiction and that the search would occur outside the district. Yet,
    the officials told the magistrate repeatedly that the search would take place in the
    district. 2 If the law condones this conduct, it makes a mockery of the warrant
    process.
    I.
    First, some background on the exclusionary rule. The purpose of the
    exclusionary rule “is to deter future Fourth Amendment violations.” Davis v.
    1I concur in all of the majority opinion except for part II.B.2.
    2 The only reference to a search that potentially would occur outside the district comes
    buried on page 29 of the 31-page affidavit after repeated representations by the officers that the
    search would take place within the district. See infra part III.
    30
    Case: 17-14915     Date Filed: 08/28/2019    Page: 31 of 56
    United States, 
    564 U.S. 229
    , 236–37 (2011). But the point is “to deter police
    misconduct rather than to punish the errors of judges and magistrates.” United
    States v. Leon, 
    468 U.S. 897
    , 916 (1984).
    Courts look to all the officials involved in the warrant process, including
    those who sought the warrant in the first place. 
    Id. at 923
    n.24 (“It is necessary to
    consider the objective reasonableness, not only of the officers who eventually
    executed a warrant, but also of the officers who originally obtained it or who
    provided information material to the probable-cause determination.”). In this case,
    the officials who sought the warrant include, at least, the FBI agent who submitted
    the warrant application and the Assistant U.S. Attorney who reviewed it.
    Whether to invoke the exclusionary rule turns largely on “the flagrancy of
    the police misconduct.” See 
    id. at 911;
    see also Herring v. United States, 
    555 U.S. 135
    , 143 (2009). Courts ask whether law enforcement officials knew or should
    have known that their conduct was unconstitutional. See 
    Herring, 555 U.S. at 143
    (citing Illinois v. Krull, 
    480 U.S. 340
    , 348–49 (1987)).
    Their conduct is evaluated under an objective reasonableness standard:
    “whether a reasonably well trained officer would have known that the search was
    illegal in light of all of the circumstances,” including this “particular officer’s
    knowledge and experience.” 
    Id. at 145
    (quotation omitted). This standard
    31
    Case: 17-14915     Date Filed: 08/28/2019   Page: 32 of 56
    “requires officers to have a reasonable knowledge of what the law prohibits.”
    
    Leon, 468 U.S. at 919
    n.20.
    If, under this standard, courts determine that law enforcement’s conduct was
    deliberate, reckless, or grossly negligent, exclusion is likely warranted. 
    Davis, 564 U.S. at 238
    . Alternatively, if law enforcement reasonably relied on a warrant,
    
    Leon, 468 U.S. at 922
    , or on binding judicial precedent, 
    Davis, 564 U.S. at 249
    –50,
    exclusion is not warranted. This is the so-called good faith exception, and it makes
    sense: if law enforcement acted in objectively reasonable reliance, the conduct was
    not culpable—i.e., it wasn’t deliberate, reckless, or grossly negligent—so there is
    no misconduct to deter.
    That does not mean that whenever law enforcement obtains a warrant, the
    good faith exception applies. For example, if law enforcement officials misled the
    magistrate in the warrant application with material information that they knew or
    should have known was false, they are not entitled to good faith. 
    Leon, 468 U.S. at 923
    (“Suppression therefore remains an appropriate remedy if the magistrate or
    judge in issuing a warrant was misled by information in an affidavit that the affiant
    knew was false or would have known was false except for his reckless disregard of
    the truth.”). That is what happened here.
    There is no question that law enforcement made a false representation in the
    NIT warrant application. On the application, the FBI agent told the magistrate, in
    32
    Case: 17-14915   Date Filed: 08/28/2019   Page: 33 of 56
    no uncertain terms, that the property to be searched would be “located in the
    Eastern District of Virginia.” Of course, it is “undisputed” that the search did not
    take place within the district. Maj. Op. at 12. Thus, the issue is whether the
    officials seeking the warrant made this false representation deliberately or
    recklessly. This issue turns on what a reasonable officer standing in the shoes of
    the officials in this case knew or should have known. For this determination, we
    must consider the totality of the circumstances.
    II.
    A.
    When the totality of the circumstances is considered, I have little doubt that
    a reasonable FBI agent and federal prosecutor should have known there was a
    jurisdictional problem. See United States v. Martin, 
    297 F.3d 1308
    , 1318 (11th
    Cir. 2002) (holding that courts “can look beyond the four corners of the affidavit
    and search warrant to determine whether” the good faith exception applies).
    Specifically, the Justice Department’s efforts to change the Federal Rules of
    Criminal Procedure in the wake of a similar failed FBI warrant application in
    Texas should have made it clear that jurisdiction would likely be an issue with the
    NIT warrant.
    In 2013—two years before the warrant application in this case—the FBI
    applied to a magistrate judge in Texas for a strikingly similar warrant. See In re
    33
    Case: 17-14915        Date Filed: 08/28/2019       Page: 34 of 56
    Warrant to Search a Target Comput. at Premises Unknown, 
    958 F. Supp. 2d 753
    ,
    755 (S.D. Tex. 2013). The FBI was attempting to identify “[u]nknown persons”
    who committed bank fraud and identity theft using “an unknown computer at an
    unknown location.” 
    Id. The warrant
    sought authorization to “surreptitiously
    install” software on the target computer that would extract certain information and
    send it back to “FBI agents within this district.” 
    Id. In a
    published decision, the magistrate denied the warrant application
    because the search of the target computer would not take place within the district.
    See 
    id. at 756–58.
    The court explained its decision: “Since the current location of
    the Target Computer is unknown, it necessarily follows that the current location of
    the information on the Target Computer is also unknown. This means that the
    Government’s application cannot satisfy the territorial limits of Rule 41(b)(1).” 3
    
    Id. at 757.
    The same logic applies to the NIT warrant.
    Notably, unlike this case, the FBI addressed the jurisdictional issue in its
    supporting affidavit to the Texas magistrate. See 
    id. at 756.
    The FBI “readily
    admit[ted] that the current location of the Target Computer [was] unknown,” but
    nevertheless maintained that the search would comply with Rule 41(b)(1)
    “‘because information obtained from the Target Computer will first be examined in
    3  The magistrate also found that the warrant did not satisfy any of the other territorial
    limits of Rule 41(b), though it does not appear that the FBI claimed to satisfy any provision other
    than Rule 41(b)(1). See 
    id. at 756–58.
                                                    34
    Case: 17-14915     Date Filed: 08/28/2019    Page: 35 of 56
    this judicial district.’” 
    Id. (quoting the
    FBI’s affidavit). The magistrate rightly
    rejected the FBI’s argument, pointing out that it would “stretch the territorial limits
    of Rule 41(b)(1)” to absurd lengths: “By the Government’s logic, a Rule 41
    warrant would permit FBI agents to roam the world in search of a container of
    contraband, so long as the container is not opened until the agents haul it off to the
    issuing district.” 
    Id. at 757.
    The point is that there was federal precedent addressing the precise
    jurisdictional issue raised by the NIT warrant. Thus, it is not true, as several of our
    sister circuits have suggested, that the jurisdictional issue was a “novel question
    . . . for which there was no precedent on point.” United States v. Levin, 
    874 F.3d 316
    , 323 (1st Cir. 2017); see also United States v. McLamb, 
    880 F.3d 685
    , 691 (4th
    Cir. 2018) (stating that officials seeking the NIT warrant were “[w]ithout judicial
    precedent for reference”), cert. denied, 
    139 S. Ct. 156
    (2018).
    Since the FBI sought the warrant in the Texas case, it seems to fair to say
    that a reasonable FBI agent seeking a similar warrant should have been aware of
    the issues presented by remote searches of unknown sources. Granted, the FBI is a
    large organization, but the universe of people involved in these cutting-edge search
    warrants designed to uncover anonymous computer users is surely much smaller.
    Plus, we know that “the FBI consulted with attorneys at the . . . FBI’s Remote
    Operations Unit” before applying for the warrant. 
    McLamb, 880 F.3d at 689
    .
    35
    Case: 17-14915       Date Filed: 08/28/2019       Page: 36 of 56
    Additionally, a reasonable federal prosecutor who did any research into the legal
    issues raised by the NIT warrant should have come across the Texas case, so the
    Assistant U.S. Attorney who reviewed the warrant should have known about it.
    Thus, because of the Texas case, the officials applying for the NIT warrant should
    have been aware that there was a potential problem with the magistrate’s
    jurisdiction to issue the warrant.
    Of course, a magistrate’s decision in Texas, even in a published opinion, is
    not binding precedent for a warrant application in Virginia. I do not suggest that
    the Texas case foreclosed officials from applying for the NIT warrant. Prosecutors
    and the FBI could honestly “believe that reasonable magistrate judges could differ
    on the legality of the NIT.” United States v. Werdene, 
    883 F.3d 204
    , 218 n.12 (3d
    Cir. 2018), cert. denied, 
    139 S. Ct. 260
    (2018). For that reason, it would have been
    perfectly acceptable for these officials to have applied for the NIT warrant and
    explained to the magistrate why they believed there was jurisdiction. But it was
    unacceptable to ignore the jurisdictional issue altogether—to repeatedly assert that
    the search was within the district and fail to mention to the magistrate the problems
    that led another judge to deny a substantially similar warrant. 4
    4  The Werdene court suggested that the Texas warrant is not analogous because it was
    “significantly more invasive” than the NIT warrant. 
    Werdene, 883 F.3d at 218
    n.12. The more
    invasive aspects of the Texas warrant are why the magistrate in that case found problems with
    the particularity requirement and the constitutional standards for video surveillance. See In re
    
    Warrant, 958 F. Supp. 2d at 758
    –61. Those aspects had nothing to do with the jurisdictional
    analysis. See 
    id. at 756–58.
    The jurisdictional analysis applies equally here.
    36
    Case: 17-14915     Date Filed: 08/28/2019    Page: 37 of 56
    Moreover, the Texas case was not an isolated occurrence. It had far-
    reaching consequences that make it almost unthinkable that the officials seeking
    the NIT warrant were unaware of the jurisdictional problem.
    Less than six months after the Texas decision, the Justice Department sent a
    letter to the Advisory Committee on the Criminal Rules urging it to amend the
    rules to allow for warrants like the one sought in the Texas case. Letter from
    Mythili Raman, Acting Assistant Att’y Gen., to Hon. Reena Raggi, Chair,
    Advisory Comm. on the Crim. Rules (Sept. 18, 2013). Specifically, the Justice
    Department proposed amending “Rule 41 of the Federal Rules of Criminal
    Procedure to update the provisions relating to the territorial limits for searches of
    electronic storage media.” 
    Id. The amendment
    would permit magistrate judges to
    issue warrants for remote searches for “crimes involving Internet anonymizing
    technologies.” 
    Id. The letter
    cited the Texas case to justify the rule change. 
    Id. While the
    committee considered the proposed amendment, the Justice
    Department continued to advocate for the change and submitted several
    memorandums defending the amendment. In one memo, dated about two months
    before the NIT warrant, the Justice Department explained as an example that the
    amendment would “ensure that a court is available” to issue warrants
    “investigating members of a child pornography group” using “the Tor network[] to
    hide from law enforcement.” Memorandum from David Bitkower, Deputy
    37
    Case: 17-14915        Date Filed: 08/28/2019       Page: 38 of 56
    Assistant Att’y Gen., to Hon. Reena Raggi, Chair, Advisory Comm. on the Crim.
    Rules (Dec. 22, 2014). These warrants would authorize “the use of the NIT” to
    “identify the location of the individuals accessing the site.” 
    Id. Sound familiar?
    Ultimately, the committee recommended adopting the amendment, which
    became effective on December 1, 2016. Memorandum from Hon. Reena Raggi,
    Chair, Advisory Comm. on Crim. Rules, to Hon. Jeffrey S. Sutton, Chair, Comm.
    on Rules of Practice and Proc. (May 6, 2015). The Justice Department’s extensive
    involvement in the rule change—including the two highest ranking officials in the
    Criminal Division—makes it hard to accept that none of the Justice Department
    officials involved in the NIT warrant was aware of the jurisdictional issue. 5
    The Justice Department had a number of connections to the NIT warrant.
    First of all, there is the Assistant U.S. Attorney who reviewed the warrant
    application. The FBI also “consulted with attorneys at the [Department’s] Child
    5  While the majority finds dubious the proposition that this knowledge could be imputed
    to “downstream line-level law enforcement officers” and finds no deterrent effect in holding
    such officers responsible for misleading magistrates regarding the jurisdictional defects in the
    warrant application, Maj. Op. at 27 n.15, I disagree. I find it hard to believe that Assistant U.S.
    Attorneys are not kept abreast of existing jurisdictional issues and the efforts their office is
    taking to solve those issues. I also find it hard to believe that the “downstream line-level”
    officers—who are doubtlessly experts in these technologies and techniques—were unaware of
    the misleading nature of their statements of fact here. They repeatedly suggested in the affidavit
    that a search would take place within a particular district when the true goal of the warrant was to
    search any relevant computers, regardless of their location. Therefore, contrary to the majority’s
    assertion that this argument is “based entirely on speculation about what different government
    actors could have known,” 
    id., I believe
    that the officers here should have known that they were
    acting improperly, which triggers the exclusionary rule. See 
    Herring, 555 U.S. at 143
    . The
    burden should not rest on a magistrate to comb through a deceptively crafted and contradictory
    affidavit to detect the true nature of the warrant request.
    38
    Case: 17-14915   Date Filed: 08/28/2019   Page: 39 of 56
    Exploitation and Obscenity Section” before applying for the warrant. 
    McLamb, 880 F.3d at 689
    . Significantly, as part of the same investigation of Playpen, the
    FBI and the Justice Department applied for a wiretap order on the same day that
    they applied for the NIT warrant. The wiretap order was to monitor the private
    message and chat activity on Playpen. The affidavit supporting the wiretap
    application included a thorough discussion of the NIT warrant. The same Assistant
    U.S. Attorney who reviewed the NIT warrant applied for the wiretap order, along
    with a trial attorney for the Department’s Child Exploitation and Obscenity
    Section. And the Deputy Assistant Attorney General for the Criminal Division
    approved the wiretap application. Between the Texas case and the rule change,
    surely at least one of these officials should have known about the jurisdictional
    issue.
    The Texas case and the DOJ-requested rule change show that a reasonable
    officer in the shoes of the law enforcement officials seeking the warrant should
    have known that there was a jurisdictional issue. To be clear, I’m not suggesting
    that the officials should have known that the magistrate did not have jurisdiction to
    issue the warrant. I’m suggesting that because of these circumstances, they should
    have known that the magistrate’s jurisdiction to issue the warrant was in doubt—
    that there was a potential problem with jurisdiction. And if they knew that there
    39
    Case: 17-14915       Date Filed: 08/28/2019        Page: 40 of 56
    would be an issue with jurisdiction, they had an obligation to flag it for the
    magistrate. 6
    B.
    It is also clear that the officials seeking the warrant knew that the search
    would not be contained to the Eastern District of Virginia. The FBI’s investigation
    revealed that Playpen had over 150,000 members and that the site received over
    11,000 unique users every week. It would be absurd to believe that all of the
    users’ computers would be in the Eastern District of Virginia. A reasonable
    official would have believed, correctly as it turns out, that the users’ computers
    would be found in districts all over the country. 7
    6  The majority construes this argument to place “an affirmative obligation to ‘flag’
    potential legal issues in their [warrant] application.” Maj. Op. at 29 n.16. The majority
    disagrees with this approach, instead concluding that “[l]aw-enforcement officers have a duty to
    lay out facts—including jurisdictional facts—for reviewing courts, not to anticipate and
    articulate possible legal hurdles,” and finding that the warrant application here “adequately—if
    imperfectly—lay[ed] out the facts.” 
    Id. However, the
    majority misunderstands the obligations I
    propose. I suggest merely that, when the officers and lawyers involved in presenting the
    affidavit have reason to believe that they are requesting a warrant that is improper, they not
    conceal precedent which is entitled to persuasive authority. Further, and more importantly, I
    disagree with the majority’s characterization of the application here as “imperfect” but
    “adequate.” The application had the tendency to deceive the magistrate by presenting repeated
    assertions of misleading facts, while burying the true goal at the back of the affidavit. I propose
    that law enforcement has the obligation, at minimum, to avoid such action.
    7 The only connection to the Eastern District of Virginia was the server that hosted the
    site. But the server was originally in North Carolina; the FBI moved the server to Virginia. And
    the site’s administrator lived in Florida. There truly was no reason to think the site had a special
    connection to the Eastern District of Virginia.
    40
    Case: 17-14915        Date Filed: 08/28/2019        Page: 41 of 56
    Granted, the NIT technology is complex, and the uninitiated could be
    forgiven for not understanding exactly what is being searched and where that
    search would take place. But no one could credibly argue that the officials who
    developed the technology and who were responsible for deploying it were unclear
    about how it worked. The FBI knew the search was of computers, and that those
    computers could be anywhere.
    III.
    Having established that the officials seeking the warrant knew or should
    have known that there was a potentially fatal jurisdiction problem with the warrant,
    let’s take a closer look at how they presented this issue to the magistrate. 8
    The caption to the warrant application states that the search will be of
    “computers that access” the Playpen website. Beneath the caption, the FBI agent
    seeking the warrant attests, under penalty of perjury, that he has “reason to
    believe” the property to be searched is “located in the Eastern District of Virginia.”
    The application directs the reader to “Attachment A” for a description of the
    property to be searched. Attachment A, titled “Place to be Searched,” explains that
    8 A party does not need to provide direct evidence that the false representation was made
    deliberately or recklessly; instead, the court can infer from the warrant application itself that a
    misrepresentation was deliberate or reckless if it would be clear to a reasonable official. Cf.
    Madiwale v. Savaiko, 
    117 F.3d 1321
    , 1326 (11th Cir. 1997) (“A party need not show by direct
    evidence that the affiant makes an omission recklessly. Rather, it is possible that when the facts
    omitted from the affidavit are clearly critical to a finding of probable cause the fact of
    recklessness may be inferred from proof of the omission itself.”) (quotation omitted).
    41
    Case: 17-14915      Date Filed: 08/28/2019    Page: 42 of 56
    the “warrant authorizes the use of a network investigative technique (‘NIT’) to be
    deployed on the computer server described below” to obtain certain information
    “from the activating computers described below.” Below, it explains that the
    “computer server is the server operating” the Playpen website, “which will be
    located at a government facility in the Eastern District of Virginia.” And it
    explains that the “activating computers are those of any user or administrator who
    logs into the [Playpen] by entering a username and password.”
    Thus, on the face of the warrant application, officials informed the
    magistrate that the search would be in the Eastern District of Virginia. The
    application then seemingly supported this assertion by noting that the server is in
    the district—the only geographic reference in the application.
    True, an especially discerning magistrate might have gathered that the search
    is of computers, not of the server, so the location of the server is irrelevant, and the
    computer of “any user” could be outside the district. But the question is not
    whether it was possible for the magistrate to detect the error—the exclusionary rule
    is concerned with police misconduct, not magistrates’ errors. See 
    Leon, 468 U.S. at 916
    . The question is whether the magistrate was misled, and whether law
    enforcement officials were responsible for the deception. See 
    id. at 923.
    Maybe
    the magistrate should have noticed. But the officials who sought the warrant
    42
    Case: 17-14915     Date Filed: 08/28/2019    Page: 43 of 56
    understood the technology and how the search would work better than anyone, and
    if anyone should have noticed, it was they.
    The affidavit supporting the warrant continues the charade. It mentions
    repeatedly that the server is located in the magistrate’s district. Here are a few
    examples:
    • “Accordingly, I request authority to use the NIT, which will be deployed on
    the TARGET WEBSITE, while the TARGET WEBSITE operates in the
    Eastern District of Virginia, to investigate any user or administrator who
    logs into the TARGET WEBSITE by entering a username and password.”
    • “Under the NIT authorized by this warrant, the TARGET WEBSITE, which
    will be located in Newington, Virginia, in the Eastern District of Virginia,
    would augment [the content sent to visitor’s computers] with additional
    computer instructions. When a user’s computer successfully downloads
    those instructions from the TARGET WEBSITE, located in the Eastern
    District of Virginia, the instructions, which comprise the NIT” will cause the
    user’s computer to send certain information to the FBI.
    • “During the up to thirty day period that the NIT is deployed on the TARGET
    WEBSITE, which will be located in the Eastern District of Virginia, each
    time that any user or administrator logs into the TARGET WEBSITE by
    entering a username and password, this application requests authority for the
    NIT authorized by this warrant to attempt to cause the user’s computer to
    send the above-described information to a computer controlled by or known
    to the government that is located in the Eastern District of Virginia.”
    The repeated emphasis of the server’s location is especially suspicious given that
    the location of the server was completely irrelevant. The search was of users’
    computers, not of the server.
    Why, then, did the affidavit repeatedly mention the server’s location? It
    smacks of desperation, and it appears calculated to lull the magistrate into a false
    43
    Case: 17-14915     Date Filed: 08/28/2019    Page: 44 of 56
    sense of jurisdictional security. I can think of no other reason to include so
    irrelevant a piece of information so many times.
    In contrast, the affidavit is nearly silent on the decisive data point: the
    location of the computers. It is only on page 29 of 31 that the affidavit finally
    acknowledges (somewhat explicitly) that “the NIT warrant may cause an activating
    computer—wherever located—to send to a computer controlled by or known to the
    government” the information sought. This is the closest law enforcement comes to
    advising the magistrate that the search will occur outside the district. As a
    disclosure, it leaves much to be desired. The affidavit mentions this detail once,
    without any explanation of its impact. It does not say that, therefore, the search
    might occur outside the Eastern District of Virginia. It forces the magistrate to
    draw the conclusion. It is a breadcrumb, buried in a dense and complicated
    affidavit, left for the magistrate to follow.
    In other warrant applications, law enforcement officials were not nearly so
    stingy with information about jurisdiction. For example, in the Texas case, the
    government confronted the jurisdiction problem and supplied the magistrate with
    an argument in the affidavit for why it thought there was jurisdiction. See In re
    
    Warrant, 958 F. Supp. 2d at 756
    . Courts should expect nothing less.
    Even in the wiretap application—submitted simultaneously with the NIT
    application by the same Assistant U.S. Attorney—the application included a
    44
    Case: 17-14915        Date Filed: 08/28/2019       Page: 45 of 56
    paragraph detailing the jurisdictional basis for the warrant, even though the
    jurisdiction for that order was straightforward and uneventful. 9 Here, in contrast,
    where there was a major problem with jurisdiction, any mention of jurisdiction is
    conspicuously absent. Why would the same attorney include a discussion of
    jurisdiction in one application, where it was less important, and omit any such
    discussion from another, where it was more important? It is hard to escape the
    conclusion that the officials seeking the warrant aimed to conceal the issue.
    The comparison with these other examples illustrates why the officials in
    this case did not do what we “hope and expect” of law enforcement. Maj. Op. at
    29. The disclosure in the affidavit was woefully inadequate.
    The warrant’s defenders argue that the disclosure on page 29 “cured” the
    warrant of any ambiguity. See, e.g., 
    McLamb, 880 F.3d at 690
    –91 (“To the extent
    the form is misleading, [the affidavit] cured any ambiguity by informing the
    magistrate judge that the NIT would cause activating computers ‘wherever located’
    to transmit data to the FBI.”). First of all, it’s odd to say that the disclosure cured
    the warrant. The disclosure that the warrant authorized searches of computers
    “wherever located” is the fatal flaw; it’s the reason the magistrate didn’t have
    9  Here is what the wiretap application said about jurisdiction: “This Court has territorial
    jurisdiction to issue the requested order under 18 U.S.C. § 2518(3) because the computer server
    intercepting all communications and on which the TARGET WEBSITE, including the TARGET
    FACILITIES, are located will be in Newington, VA, in the Eastern District of Virginia during
    the period of inspection.”
    45
    Case: 17-14915      Date Filed: 08/28/2019    Page: 46 of 56
    jurisdiction to approve the warrant. How could revealing the fatal flaw cure the
    warrant?
    More accurately, the suggestion is that by eventually and indirectly revealing
    the warrant’s defect, the officials seeking the warrant absolved themselves of any
    bad faith. In other words, law enforcement officials cannot be accused of bad faith
    so long as they technically, no matter how discreetly, disclose the truth somewhere
    in the warrant application. This sets too low a bar. It essentially gives officials
    permission to try to hoodwink magistrates: they can make false statements to the
    court so long as they include enough information to uncover their chicanery. If the
    magistrate fails to spot the issue, officials can cloak themselves in good faith
    reliance and execute the warrant without fear of suppression. I refuse to invite
    such gamesmanship. If law enforcement officials know of a problem with their
    warrant, they need to be forthcoming about it.
    Here’s the other problem with the “cure” argument: If the language in the
    application might have been enough to show the magistrate that the search would
    not be in the district, surely it was enough to reveal the same to the officials
    seeking the warrant. After all, wouldn’t we expect the author to understand his
    writing better than the reader—especially when the subject concerns an
    exceedingly complex technology with which the author is familiar and the reader is
    46
    Case: 17-14915     Date Filed: 08/28/2019    Page: 47 of 56
    not? And once the officials realize the problem, they need to address it, otherwise
    they are misleading the magistrate.
    Furthermore, the argument that the application disclosed enough for the
    magistrate to discover the defect answers the wrong question. It focuses on
    whether the magistrate should have spotted the issue. Cf. United States v. Horton,
    
    863 F.3d 1041
    , 1052 (8th Cir. 2017) (“Even if it were misleading to label the place
    to be searched as the Eastern District of Virginia, a reasonable reader would have
    understood that the search would extend beyond the boundaries of the district
    because of the thorough explanation provided in the attached affidavit.”) (emphasis
    added), cert. denied, 
    138 S. Ct. 1440
    (2018). But, again, the exclusionary rule is
    concerned with curbing “police rather than judicial misconduct.” 
    Herring, 555 U.S. at 142
    . Thus, the proper question is, given what the officials knew or should
    have known, was it deliberately or recklessly misleading to present the application
    the way that they did. Put differently, did they consciously disregard a serious risk
    that the magistrate would think the search would occur in the Eastern District of
    Virginia? It’s plain to me that they did.
    If the officials knew that the search would be of computers outside the
    district, it was unacceptable to swear that the search would be within the district.
    If, perhaps, the officials had some other reasonable basis for believing that the
    search was still within the magistrate’s jurisdiction, they needed to present it to the
    47
    Case: 17-14915     Date Filed: 08/28/2019     Page: 48 of 56
    magistrate. It would be recklessly misleading to submit a warrant application to a
    magistrate repeatedly stating the search would be within the district, with one
    buried caveat, when the officials’ only reason for stating that is some novel theory
    they declined to share with the magistrate.
    Tellingly, at no point in this appeal, nor to our knowledge in any of the other
    appeals concerning the NIT warrant, has the government defended the warrant on
    the grounds that the search did in fact occur in the Eastern District of Virginia.
    How could they? Instead, the government has argued that the NIT search
    functioned like a tracking device that was installed within the district, and thus
    satisfied Federal Rule of Criminal Procedure 41(b)(4). A number of district courts
    have accepted this argument. See United States v. Workman, 
    863 F.3d 1313
    , 1321
    n.5 (10th Cir. 2017) (listing cases), cert. denied, 
    138 S. Ct. 1546
    (2018). In light of
    these district court decisions, several of our sister circuits have said that they will
    not fault law enforcement for thinking there was jurisdiction when a number of
    federal judges have made the same mistake. See, e.g., United States v. Moorehead,
    
    912 F.3d 963
    , 970 (6th Cir. 2019) (“But reasonable jurists have come to different
    conclusions about whether the NIT Warrant was valid. We cannot, therefore,
    expect officers to have known that this type of warrant was invalid at the time it
    48
    Case: 17-14915       Date Filed: 08/28/2019       Page: 49 of 56
    was sought.”) (citations omitted), petition for cert. filed (U.S. May 20, 2019) (No.
    19-5444). 10
    After the fact, courts can uphold a warrant on any basis. That same luxury
    should not extend to a good-faith analysis of the officials who sought the warrant.
    The FBI agent swore in the warrant application that he had “reason to believe” the
    property to be searched was in the Eastern District of Virginia. An official cannot
    make that representation if he does not actually have a reason, but is instead hoping
    for the magistrate to find one. Thus, the suggestion that because a few courts have
    upheld the warrant on a tracking-device theory it was reasonable for the officials
    seeking the warrant to believe there was jurisdiction, requires the assumption that
    the officials believed there was jurisdiction for the warrant on a tracking-device
    theory.
    The problem with this logic is that law enforcement did not seek, nor did
    they obtain, a tracking-device warrant. See Maj. Op. at 13. To obtain a tracking-
    device warrant, law enforcement uses a different form from the one used for
    typical searches within the district. Compare Administrative Office of U.S.
    10  Some of the courts making this point are actually responding to a different argument.
    In those cases, the argument was that the officers executing the warrant were not entitled to good
    faith, because the warrant was plainly invalid on its face. See, e.g., United States v. Henderson,
    
    906 F.3d 1109
    , 1119 (9th Cir. 2018) (“[O]ne is left to wonder how an executing agent ought to
    have known that the NIT warrant was void when several district courts have found the very same
    warrant to be valid.”) (emphasis added), cert. denied, 
    139 S. Ct. 2033
    (2019). I agree with these
    courts that it was objectively reasonable for the executing officers to rely on the warrant and to
    defer to the magistrate’s judgment that there was jurisdiction to issue the warrant.
    49
    Case: 17-14915     Date Filed: 08/28/2019    Page: 50 of 56
    Courts, Criminal Form AO 102, Application for a Tracking Warrant (2009), with
    Criminal Form AO 106, Application for a Search Warrant (2010),
    https://www.uscourts.gov/forms/criminal-forms (last visited August 19, 2019).
    A reasonable law enforcement official, especially an FBI agent with 19
    years of experience, would understand the difference between a tracking-device
    warrant and a search warrant. A reasonable official would know that if the
    jurisdictional basis for the warrant was a tracking-device theory, he should seek a
    tracking-device warrant, or at least make the magistrate aware of the theory some
    other way. Bottom line: it is objectively unreasonable for law enforcement to
    believe there is jurisdiction on the basis of a warrant they did not seek and a theory
    they did not present.
    *                  *                   *
    To recap, the officials knew or should have known that there was a
    jurisdiction problem with the warrant. And they knew the search would not be
    within the district. If the search was of computers outside the district, the only
    possible basis for believing the magistrate had jurisdiction to issue the warrant
    would have been a tracking-device theory. But a reasonable official would know
    the warrant was not a tracking-device warrant, and it would be recklessly
    misleading to seek a regular search warrant based on a tracking-device theory
    without at least alerting the magistrate to the theory. As such, it appears to me that
    50
    Case: 17-14915     Date Filed: 08/28/2019    Page: 51 of 56
    a reasonable official in these circumstances would have no basis for believing the
    magistrate had jurisdiction.
    Even assuming the officials believed there was jurisdiction, the warrant
    application was misleading. The application states repeatedly that the search
    would be in the district, even though they knew the search would be of computers
    outside the district. They repeatedly emphasized the location of the server, which
    was irrelevant, and completely omitted any discussion of jurisdiction. The late
    disclosure that the computers could be “wherever located” did not eliminate the
    risk that the magistrate would be misled and did not give the officials license to
    make disingenuous representations elsewhere. For these reasons, I believe the
    officials deliberately or recklessly misled the magistrate.
    IV.
    Whether the exclusionary rule should apply is, ultimately, a question of
    whether the benefits of deterrence outweigh the costs of suppression. See 
    Herring, 555 U.S. at 141
    . The costs—excluding reliable evidence and possibly allowing the
    guilty to go free—are high. 
    Davis, 564 U.S. at 237
    (“[Exclusion] almost always
    requires courts to ignore reliable, trustworthy evidence bearing on guilt or
    innocence. And its bottom-line effect, in many cases, is to suppress the truth and
    set the criminal loose in the community without punishment.”) (citation omitted).
    51
    Case: 17-14915     Date Filed: 08/28/2019    Page: 52 of 56
    But what about the other side of the scale? What are the benefits of deterrence in
    this case?
    Other courts have given short shrift to the benefits of deterrence in this case.
    They claim there is minimal deterrent value because (1) the blame lies with the
    magistrate for approving the warrant, and (2) the NIT warrant would now be
    lawful after the rule change. See, e.g., 
    Moorehead, 912 F.3d at 970
    –71 (“The fact
    that any jurisdictional error here was made by the magistrate, coupled with the fact
    that Rule 41(b) has been amended to authorize warrants like the one at issue,
    means the benefits of deterrence cannot outweigh the costs.”) (quotation omitted).
    This misses the point. If the officials who sought the warrant are culpable for
    misleading the magistrate, the fault lies with them. And the object of suppression
    would be to deter law enforcement from misleading magistrates in the future, not
    to prevent warrants like this one from issuing.
    There is a reason the Supreme Court has said that if police conduct is
    deliberate, reckless, or grossly negligent, “the deterrent value of exclusion is strong
    and tends to outweigh the resulting costs.” 
    Davis, 564 U.S. at 238
    . If courts
    decline to invoke the exclusionary rule in the face of culpable misconduct, we
    condone and encourage it. We effectively establish a new standard for law
    enforcement. Thus, even though the NIT warrant would not be valid, this will not
    52
    Case: 17-14915      Date Filed: 08/28/2019    Page: 53 of 56
    be the last time that law enforcement officials mislead a magistrate in their quest
    for a warrant of dubious validity.
    With this case, ten courts of appeals have sanctioned the following standard:
    When law enforcement officials apply for a warrant, even if they know the warrant
    is constitutionally suspect, so long as they technically disclose the facts that would
    reveal the problem to a discerning magistrate, no matter how cursory or buried the
    disclosure, the warrant is effectively unimpeachable if the magistrate fails to detect
    the problem. I cannot believe that the law expects so little of law enforcement, or
    so much of magistrates.
    This standard creates a warped incentive structure. It encourages law
    enforcement to obscure potential problems in a warrant application. Because
    officials can be less upfront about problems in a warrant application, the onus is on
    the magistrate to spot the issues. But it is well-established that if a magistrate
    makes a mistake—e.g., misses an issue, gets the law wrong—that mistake will
    almost always be forgiven because the police can generally rely on an approved
    warrant in good faith. See 
    Leon, 468 U.S. at 922
    . This is a system designed to
    encourage mistakes.
    Instead, we should demand the utmost candor in warrant applications.
    Before today, I thought we did. The warrant process is premised on the good faith
    of law enforcement. See Franks v. Delaware, 
    438 U.S. 154
    , 164 (1978) (“[T]he
    53
    Case: 17-14915      Date Filed: 08/28/2019     Page: 54 of 56
    Warrant Clause . . . surely takes the affiant’s good faith as its premise . . . .”). It is
    “unthinkable” that a warrant application, “revealed after the fact to contain a
    deliberately or reckless false statement,” would be beyond “impeachment.” 
    Id. at 165.
    Indeed, if law enforcement officials were permitted to deliberately or
    recklessly include false representations in the warrant application, “and, having
    misled the magistrate, then [were] able to remain confident that the ploy was
    worthwhile,” it would neuter the Fourth Amendment. 
    Id. at 168.
    Similarly, candor underpins the rationale for the good faith exception. We
    extend good faith to police executing the warrant because they are entitled to
    presume that magistrates are competent. See Messerschmidt v. Millender, 
    565 U.S. 535
    , 547–48 (2012). But there is no reason to defer to magistrates’ judgments if
    law enforcement officials do not present the court with the full and accurate
    picture. See 
    Leon, 468 U.S. at 914
    –15 (stating that courts should not defer to a
    warrant when the magistrate’s determination was based on a “knowing or reckless
    falsity” or when the magistrate was not presented with “[s]ufficient information”).
    It is especially important to demand candor in warrant applications. The
    warrant application process is ex parte, which increases the risk that false
    information will be accepted or problems will be overlooked. See 
    Franks, 438 U.S. at 169
    (“The usual reliance of our legal system on adversary proceedings
    itself should be an indication that an ex parte inquiry is likely to be less
    54
    Case: 17-14915    Date Filed: 08/28/2019    Page: 55 of 56
    vigorous.”). That risk, in turn, creates a temptation to withhold or obscure
    unfavorable information. See 
    id. (“The magistrate
    has no acquaintance with the
    information that may contradict the good faith and reasonable basis of the affiant’s
    allegations.”).
    I also don’t think candor is too much to ask for. When executing a warrant,
    police are making decisions in real time. Plus, typically, they are not lawyers, so
    we don’t expect them to have as much knowledge of the law as a magistrate
    reviewing a warrant application from the comfort of her chambers. These
    considerations do not apply, at least not to the same extent, to officials seeking a
    warrant. Generally, these officials have just as much, if not more, time for
    reflection while preparing the application, as the magistrate does while reviewing
    it. And in the frequent cases where police work with prosecutors to prepare a
    warrant application, it is fair to expect them to have a greater knowledge of the
    law.
    I’m not advocating to change the law—the law already requires candor in
    warrant applications. I’m asking courts to take this requirement seriously.
    When the Supreme Court established the good faith exception, the principal
    dissent warned that it would “put a premium on police ignorance of the law.”
    
    Leon, 468 U.S. at 955
    (Brennan, J., dissenting). Justice Brennan predicted that in
    close cases “police would have every reason to adopt a ‘let’s-wait-until-it’s-
    55
    Case: 17-14915     Date Filed: 08/28/2019    Page: 56 of 56
    decided’ approach in situations in which there is a question about a warrant’s
    validity or the basis for its issuance.” 
    Id. With this
    decision, his premonition has
    come true.
    *                   *                    *
    I recognize that my decision would have an unfortunate result. It would
    invalidate a warrant that led to the arrest and prosecution of hundreds who
    trafficked in child pornography. And it would suppress the evidence gathered
    under that warrant’s authority, likely leading to the release of many of those
    offenders. But this unfortunate result is almost always the consequence when
    relevant, damning evidence is excluded. Such a result is the price we pay to
    protect the Fourth Amendment rights of the public. Therefore, we must follow the
    law even when faced with unpleasant outcomes. Otherwise, we excuse conduct,
    like the conduct at issue here, which invites strategic duplicity into the warrant
    process.
    Because today’s decision undermines the integrity of the warrant process—
    a process which plays a crucial role in protecting the rights guaranteed by our
    Constitution—I respectfully dissent.
    56