If the intelligence you have that indicates that the terrorists identity is stored on the laptop, you would still need a warrant to search it unless you could show that you had evidence that the terrorists attack was imminent enough to cause immediate danger to people. Then you could search it right away, while waiting on an easily obtained warrant. If this scenario is to be taken as the exact state of events going on during this case and investigation, it sounds as though enough intelligence exists to make obtaining a warrant to search the laptop an almost foregone conclusion. As the intelligence in question comes from the apprehended suspect itself, searching the laptop immediately would be
If the intelligence you have that indicates that the terrorists identity is stored on the laptop, you would still need a warrant to search it unless you could show that you had evidence that the terrorists attack was imminent enough to cause immediate danger to people. Then you could search it right away, while waiting on an easily obtained warrant. If this scenario is to be taken as the exact state of events going on during this case and investigation, it sounds as though enough intelligence exists to make obtaining a warrant to search the laptop an almost foregone conclusion. As the intelligence in question comes from the apprehended suspect itself, searching the laptop immediately would be