The government search of defendant’s computer here exceeded the private search, going into the container within a container rationale. People v. Evans, 2014 Cal. App. LEXIS 887 (1st Dist. October 3, 2014):
Noting that a “container” has been defined as “‘any object capable of holding another object,'” the United States Supreme Court has recently observed that “[t]reating a cell phone as a container whose contents may be searched incident to an arrest is a bit strained as an initial matter. [Citation]. But the analogy crumbles entirely when a cell phone is used to access data located elsewhere, at the tap of a screen. [This] is what cell phones, with increasing frequency, are designed to do by taking advantage of ‘cloud computing.’ Cloud computing is the capacity of Internet-connected devices to display data stored on remote servers rather than on the device itself. Cell phone users often may not know whether particular information is stored on the device or in the cloud, and it generally makes little difference. [Citation.]” (Riley v. California (2014) ___ U.S. ___, 134 S.Ct. 2473, 2491 (Riley), quoting New York v. Belton (1981) 453 U.S.454, 460, fn. 4.) The Court further stated: “Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans ‘the privacies of life” [citation]. The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant.” (Riley, at pp. 2494-2495.)
Because, as the Supreme Court observed, cell phones “are in fact minicomputers” (Riley, supra, 134 S.Ct. at p. 2489), and the search of a computer hard drive implicates at least the same privacy concerns as those implicated by the search of a cell phone, there is no reason to think conventional computers can any more reasonably be characterized as containers than cell phones. Indeed, “[c]omputers are relied upon heavily for personal and business use. Individuals may store personal letters, e-mails, financial information, passwords, family photos, and countless other items of a personal nature in electronic form on their computer hard drives.” (United States v. Mitchell (11th Cir. 2009) 565 F.3d 1347, 1351, 1352 [describing “the hard drive of a computer, which ‘is the digital equivalent of its owner’s home, [as] capable of holding a universe of private information'”].)
The Supreme Court’s analysis in Riley highlights the dangers inherent in lawyers and judges cavalierly applying established legal theories to new technologies, without carefully exploring the factual differences between such technologies and the objects traditionally found appropriate for those theories’ application. (See Riley, supra, 134 S.Ct. at p. 2491.) As the Tenth Circuit Court of Appeals has observed: “‘Since electronic storage is likely to contain a greater quantity and variety of information than any previous storage method, … [r]elying on analogies to closed containers or file cabinets may lead courts to ‘oversimplify a complex area of Fourth Amendment doctrines and ignore the realities of massive modern computer storage.’ [Citation.]” (United States v. Carey (10th Cir. 1999) 172 F.3d 1268, 1275; see also Lessig, The Path of Cyberlaw (1995) 104 Yale L.J. 1743, 1752 [urging courts to “follow the meandering development of the common law” before “venturing too boldly” into the regulation of cyberspace].)
. . .
The notions the trial court relied upon—that Statham initially “believe[d] in good faith that he had discovered pornography,” and that appellant was, in effect, “‘hanging his dirty laundry out to dry’ by handing it over to a third party he knew was going to look at it”—beg the central question pertinent to the scope of Statham’s private search: whether it frustrated appellant’s subjective expectation in the privacy of the materials searched and seized by the government in this case. As we have explained, Statham’s search did not frustrate that expectation of privacy, which is clearly one society recognizes as reasonable.
by John Wesley Hall
Criminal Defense Lawyer and
Search and seizure law consultant
Little Rock, Arkansas
Contact: forhall @ aol.com / The Book www.johnwesleyhall.com
"If it was easy, everybody would be doing it. It isn't, and they don't." —Me
"Life is not a matter of holding good cards, but of playing a poor hand well." –Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others)
“I am still learning.” —Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)).
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers."
—Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848)
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams
v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold,
J.), rev'd Nix v. Williams, 467 US. 431 (1984).
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws,
or worse, its disregard of the charter of its own existence." —Mapp
v. Ohio, 367 U.S. 643, 659 (1961).
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).
"There have been powerful hydraulic pressures throughout our history that
bear heavily on the Court to water down constitutional guarantees and give the
police the upper hand. That hydraulic pressure has probably never been greater
than it is today."
— Terry
v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).
"The great end, for which men entered into society, was to secure their
property."
—Entick
v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)
"It is a fair summary of history to say that the safeguards of liberty have
frequently been forged in controversies involving not very nice people. And
so, while we are concerned here with a shabby defrauder, we must deal with his
case in the context of what are really the great themes expressed by the Fourth
Amendment."
—United
States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)
"The course of true law pertaining to searches and seizures, as enunciated
here, has not–to put it mildly–run smooth."
—Chapman
v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).
"A search is a search, even if it happens to disclose nothing but the
bottom of a turntable."
—Arizona
v. Hicks, 480 U.S. 321, 325 (1987)
"For the Fourth Amendment protects people, not places. What a person knowingly
exposes to the public, even in his own home or office, is not a subject of Fourth
Amendment protection. ... But what he seeks to preserve as private, even in
an area accessible to the public, may be constitutionally protected."
—Katz
v. United States, 389 U.S. 347, 351 (1967)
“Experience should teach us to be most on guard to
protect liberty when the Government’s purposes are beneficent. Men born
to freedom are naturally alert to repel invasion of their liberty by evil-minded
rulers. The greatest dangers to liberty lurk in insidious encroachment by men
of zeal, well-meaning but without understanding.”
—United
States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)
“Liberty—the freedom from unwarranted
intrusion by government—is as easily lost through insistent nibbles by
government officials who seek to do their jobs too well as by those whose purpose
it is to oppress; the piranha can be as deadly as the shark.”
—United
States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)
"You can't always get what you want /
But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards
"In Germany, they first came for the communists,
and I didn't speak up because I wasn't a communist. Then they came for the Jews,
and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists,
and I didn't speak up because I wasn't a trade unionist. Then they came for
the Catholics and I didn't speak up because I wasn't a Catholic. Then they came
for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration
camp]
“You know, most men would get discouraged by
now. Fortunately for you, I am not most men!”
---Pepé Le Pew
"The point of the Fourth Amendment, which often is not grasped by zealous officers,
is not that it denies law enforcement the support of the usual inferences which
reasonable men draw from evidence. Its protection consists in requiring that
those inferences be drawn by a neutral and detached magistrate instead of being
judged by the officer engaged in the often competitive enterprise of ferreting
out crime."
—Johnson
v. United States, 333 U.S. 10, 13-14 (1948)