How an obscure rule lets law enforcement search any computer