After being convicted on “one count of possession of child
pornography, [Missouri Revised Statutes] § 573.035, and one count of promoting
child pornography in the second degree, [Missouri Revised Statutes] § 573025,
David Sachs appealed. State v. Sachs, __ S.W.3d __, 2012 WL 1392574 (Missouri Court
of Appeals 2012). In his appeal, Sachs
“challenge[s] the admission of evidence recovered as a result of a warrantless
search of his personal computer”, and issue we’ll get to in a moment. State
v. Sachs, supra.
To understand his argument concerning the search of the
computer, you need to understand how and why the search came about: It bean on July 27, 2009, when Sergeant
Cavanaugh of the St. Louis County Police Department contacted Detective
Anderson of the Boone County Sheriff’s Department about “an ongoing child
pornography investigation.” State v. Sachs, supra. Cavanaugh had executed a search warrant “at a
Webster Groves address after obtaining evidence that” the IP address associated
with the home “had been used in the past to upload and download child
pornography.” State v. Sachs, supra. The homeowners told Cavanaugh they had a son
– David Sachs – who then lived in Columbia, Missouri but had previously lived
in their home and used the Internet there.
State v. Sachs, supra. Cavanaugh asked Anderson to interview David
Sachs. State v. Sachs, supra.
(Columbia is in Boone County.)
Anderson went to Sachs’ apartment, accompanied by Detective
Perkins and Officer Purdy. State v. Sachs, supra. Sachs lived in the three-bedroom apartment
with two roommates; the latter opened the door after the officers knocked and
one of them got David. State v. Sachs, supra. Anderson asked if they could speak in private
and they went to Sachs’ room. State v. Sachs, supra. Anderson noticed a computer that was “turned
on and . . . a word-processing document was showing on the screen.” State
v. Sachs, supra.
Anderson told Sachs “they were investigating the
distribution of child pornography” and asked Sachs how long he had been in
Columbia; Sachs said he had been there for fourteen months but had “stayed at
his parents’ house on and off during that period.” State
v. Sachs, supra. He said he had an
old computer at his parents’ house that he no longer used and had the computer
in the apartment “he had previously used” at his parents’ home. State v. Sachs, supra. Sachs “admitted to having file-sharing
programs on his computer” and using them to download adult pornography; when
Anderson asked if he ever downloaded child pornography, he said that “on
occasion” he had “accidentally downloaded misnamed material that turned out to
be child pornography” but deleted it when he realized what it was. State
v. Sachs, supra. He said he might
have failed to erase some of the child pornography he had downloaded. State
v. Sachs, supra.
Anderson asked if he could examine Sachs’ computer to
“verify there was not active child pornography on it” but Sachs refused. State
v. Sachs, supra. Anderson contacted
the St. Louis County Sheriff’s Department and was told their officers wanted to
interview Sachs at the Boone County Sheriff’s Department; he agreed to meet
with the St. Louis officers at the local Sheriff’s Department. State
v. Sachs, supra. Anderson also told
Sachs he was going to apply for a warrant to search his computer, and then let
Sachs “step outside to talk to his parents on the telephone.” State
v. Sachs, supra.
Anderson had decided to seize the
computer until a warrant could be obtained. Before unplugging the computer to
take it, he decided to . . . examine the programs currently running on the
computer. From icons shown on the bottom, right corner of the computer screen, Anderson
could tell several programs were running in addition to the word processing
program shown on the screen. One of [them] was LimeWire, which [Sachs] admitted
having used to download music and videos. When
Anderson clicked on that icon to open that program, he was able to see files
were being downloaded and uploaded at that time. He took pictures of the
screens showing lists of the filenames being uploaded and downloaded.
After seeing the names of the files
being uploaded and downloaded on LimeWire, many . . . suggesting they might
contain child pornography, Anderson told [Sachs] files were being uploaded and
downloaded on his computer. [Sachs] responded, `Yes, sir.’ Anderson asked [Sachs]
if he knew he had child pornography on the computer. [Sachs] responded that he
was aware there would be child pornography on his computer but stated that he
did not realize he was sharing such material. . . . [Sachs] indicated the last
time he had downloaded child pornography was the previous night and he had used
particular search terms to find such files.
State v. Sachs, supra.
Sachs and Anderson went to the Boone County Sheriff’s
Office, where Sachs decided not to talk to the St. Louis County officers. State
v. Sachs, supra. Anderson brought Sachs’ computer with them and got a
warrant to search it. State v. Sachs, supra. The “hard drive . . . was examined using
forensic equipment and programs.” State v. Sachs, supra. Officers found “numerous video files
containing child pornography” plus evidence that LimeWire had been used to
“download such files”, make them “available for upload to others” and that such
files “had indeed been uploaded to others using LimeWire.” State
v. Sachs, supra. That evidence was
used against Sachs at his jury trial on the charges noted above; he was
convicted, sentenced to two concurrent terms of five years in prison and
appealed. State v. Sachs, supra.
On appeal, Sachs argued that the trial judge denied his
motion to suppress the evidence obtained from his computer because “the search
of his computer by Anderson before a warrant was obtained violated his
constitutional right to be free from unreasonable, warrantless search.” State
v. Sachs, supra. As Wikipedia
explains, and as I’ve noted in earlier posts, the 4th Amendment
creates a right to be free from “unreasonable” searches and seizures; to be
“reasonable,” a search or seizure must be conducted pursuant to a valid search
warrant or pursuant to an exception to the warrant requirement. Wikipedia outlines the exceptions, if you’re
interested.
The Court of Appeals began its analysis of Sachs’s argument
by “by stating the obvious. When Anderson began clicking on icons on [Sachs’] computer screen to view different
programs that were not openly visible on the computer screen, he was
conducting a search.” State v. Sachs, supra. Since clicking on the icons constiuted a search, it violated the 4th Amendment unless the search was conducted pursuant to a
warrant or an exception.
The prosecution’s first argument was that the exigent
circumstances exception “justified the detective's actions in accessing the
active programs because information in the computer's RAM (random access
memory) would disappear when the officer unplugged the computer to seize it.” State
v. Sachs, supra. As Wikipedia notes,
this exception lets officers act without a warrant in which “people are in
imminent danger, evidence faces imminent destruction, or
a suspect will escape.” The
state relied on the second option, but the Court of Appeals was not persuaded:
[T]his case simply does not establish
any pressing need for the officer to unplug the computer prior to obtaining a
warrant. Three officers were present . . . and had fully secured the scene. The
State failed to prove . . . exigent circumstances that would preclude an
officer from remaining with the computer while a warrant was obtained.
The
State's argument . . . is based entirely upon a presumption of inconvenience
for the officers and [Sachs’] roommates. Such circumstances are not exigent and
most certainly do not establish `a need that will not brook the delay incident
to obtaining a warrant.’ [State v.
Warren, 304 S.W.3d 794 (2010).] . . . [I]f Anderson truly believed that
valuable evidence might be lost through the unplugging of the computer, he should
have waited until a warrant was obtained and then conducted his search of the
files active on the computer.
State v. Sachs, supra.
The court also rejected the prosecution’s argument that
exigent circumstances existed because Sachs’ was “actively” uploading and
downloading “files of some type”. State v. Sachs, supra. The Court of Appeals’ response was that the
prosecution’s argument that “the transfer of files of an unknown nature might
be completed by the time a warrant was obtained is akin to saying that an
officer couldn't wait for a wiretap warrant because the suspect was on the
phone and might finish his conversation before a warrant could be obtained.” State
v. Sachs, supra.
The prosecution then argued that `regardless of whether
Anderson's actions in opening the active files on [Sachs’] computer violated
the 4th Amendment, the evidence was properly admitted at trial based upon the
inevitable discovery doctrine.” State v. Sachs, supra. The court began its analysis of this issue by
outlining the applicable law:
`[T]he inevitable discovery rule . . . provides
that evidence obtained through unlawful means may be admissible if it can be
shown the same evidence would have been inevitably discovered in a lawful manner.’
State v. Grayson, 336 S.W.3d 138 (Missouri Supreme Court 2011). `To
show that the evidence would have inevitably been discovered, the state must
prove by a preponderance of the evidence: (1) that certain standard, proper and
predictable procedures of the local police department would have been utilized
and (2) those procedures inevitably would have led to discovery of the
challenged evidence through the state's pursuit of a substantial, alternative
line of investigation at the time of the constitutional violation.’ [State v. Oliver, 293 S.W.3d 437
(Missouri Supreme Court 2009).]
State v. Sachs, supra.
In applying this standard, the court found, first, that “access
to the active files on the computer to view and take pictures of the active
programs was” not inevitable because Anderson testified “to his intent to turn
off, unplug, and remove the computer from the premises prior to applying for a
warrant” which meant that “as a result of [his] own actions, the ability to
view and photograph the active programs would not have existed by the time a warrant
could be obtained for a lawful search to have been conducted.” State v. Sachs, supra. It therefore held that the inevitable
discovery doctrine did not justify “admission of the pictures of the active
computer screens or Anderson's testimony related to his access of the active
programs”. State v. Sachs, supra.
It also found, however, that to “the extent [Sachs]
challenges the seizure of the computer's hard drive and admission of the
evidence recovered as result of a forensic examination of the hard drive after
a search warrant was obtained, . . . that evidence would clearly have been
inevitably discovered.” State v. Sachs, supra. The court noted that Anderson “had more than
sufficient probable cause to obtain a search warrant in light of [Sachs’]previous
admission that he had downloaded child pornography and some child pornography
was likely still on his computer.” State
v. Sachs, supra.
In making this finding, the Court of Appeals rejected Sachs’
argument that the evidence should be suppressed as “fruit of the poisonous
tree” because Anderson “referenced” the “unlawfully obtained evidence” analyzed
above in his application for the search warrant. State
v. Sachs, supra. As Wikipedia notes,
[f]ruit
of the poisonous tree is a legal metaphor in the United States used
to describe evidence that is obtained illegally. The logic . . . is
that if the source of the evidence (the `tree’) is tainted, then anything
gained from it (the `fruit’) is tainted as well.
The court began its analysis of the fruit of the poisonous
tree argument by noting that
`[t]he fact that illegally obtained
evidence is included in the affidavit does not invalidate the warrant.’ [State v. Oliver, supra.] `The ultimate
inquiry is not whether the affidavit contained allegations based upon illegally
obtained evidence but whether, if setting aside all tainted allegations, the
independent and lawful information stated in the affidavit suffices to show
probable cause.’ [State v. Oliver, supra.]
State v. Sachs, supra.
It found that in this case, when the unlawfully obtained
evidence was “disregarded,” the remaining information in the affidavit
established probable cause. State v.
Sachs, supra. The Court of Appeals held, therefore, that the “evidence
recovered from the hard drive would have inevitably been discovered regardless
of Anderson's improper search of the active files on the computer, and the
trial court did not err in admitting that evidence at trial.” State
v. Sachs, supra.
For this reason and others, it affirmed Sachs’ conviction
and sentences. State v. Sachs, supra.
What a moron. Dude should have just kept his mouth shut and told the cops to take a hike. He'd be a free man now.
ReplyDelete