Update 2 (10/24/13): And just as quickly, the Register contacted me to indicate that the article has been updated to remove the Fourth Amendment references.
Two quick, but equally horrible points about this article:
In addition, the defendants have identified themselves as hackers, as discussed above. A well-known characteristic of hackers is that they cover their tracks...This makes it likely that defendant Thuen will delete material on the hard drive of his computer that could be relevant to this case...The tipping point for the Court comes from evidence that the defendants – in their own words – are hackers. By labeling themselves this way, they have essentially announced that they have the necessary computer skills and intent to simultaneously release the code publicly and conceal their role in that act. And concealment likely involves the destruction of evidence on the hard drive of Thuen’s computer. For these reasons, the Court finds this is one of the very rare cases that justifies seizure and copying of the hard drive.