As I’ve noted in earlier posts, the 4th Amendment
to the U.S. Constitution requires, as its default position, that officers
obtain a warrant – a search (and seizure) warrant before they search a place
and seize evidence.
As I’ve also noted, officers do not have to get a warrant if
they can rely an exception to the default warrant requirement, one of which is
“exigent circumstances.” And as Wikipedia explains, exigent circumstances exist
when officers have probable cause to believe that if they do not quickly (i.e.,
without getting a warrant), human life or safety will be in danger, a suspect
may escape and/or evidence may be destroyed.
That brings us to U.S.
v. Brown, __ F.3d __, 2012 WL 6052019 (U.S. Court of Appeals for the 4th Circuit 2012). After being convicted of “receiving visual depictions involving
the use of minors engaging in sexually explicit conduct . . . in violation
of 18 U.S. Code § 2252(a)(2)” and sentenced to “to 144 months in prison
and ten years of supervised release”, Daniel J. Brown appealed. U.S. v.
Brown, supra. On appeal, he argued that the district court judge who had
the case erred in denying his motion to suppress certain evidence. U.S. v.
Brown, supra.
To understand the suppression motion and why the district
court judge did not grant it, it is necessary to understand how the case
arose. According to this opinion, it
began in May of 2009, when
Detective Nicholas Rudman of the
Charlottesville (Virginia) Police Department, who was assigned to investigate
internet crimes against children, began an investigation of an internet protocol (`IP’) address associated with a computer that had downloaded files
containing child pornography.
Those files were identified to Rudman
by what is known as `hash value,’ rather than by a proper name.
Rudman recognized the hash values of the files as corresponding to those which,
he knew from prior experience, contained child pornography. The pornographic
files had been transmitted over the Internet through peer-to-peer (file
sharing) networks, where users are able to download each others' digital files.
U.S. v. Brown, supra.
subscriber of the IP address was Medical Transport,
LLC, a private ambulance business located in Charlottesville. Based on
information obtained from the company's manager, Rudman and Detective Todd
Lucas were able to narrow the focus of their investigation to Brown and Justin
Yarboro, who worked together and were always on duty at Medical Transport when
the files were downloaded.
Using the information they had discovered, the
detectives secured a search warrant on June 17, 2009, for Medical Transport's
headquarters. Rudman and Lucas, joined by Detectives Lisa Reeves and Michael
Flaherty, executed the search warrant that day while Brown and Yarboro were on
duty.
U.S. v. Brown, supra.
The search of Medical Transport’s building did not reveal “any computers
or electronic equipment that were relevant to” the investigation. U.S. v.
Brown, supra.
While the officers were executing the warrant at the Medical Transport
building, Brown and Yarboro were out on a call in an ambulance. U.S. v.
Brown, supra. When the two returned
to Medical Transport, they “pulled the ambulance to the front of
the building” and got out. U.S. v. Brown, supra. The detectives “promptly approached” the two
and identified themselves “as officers of the Charlottesville Police Department
investigating Internet crimes against children.” U.S. v. Brown, supra. Rudman
then asked Brown and Yarboro,
`Do you guys have any laptops in your
vehicle?’ When Brown responded in the affirmative, Rudman asked, `Can you get
those for us?’ Brown complied, retrieving his laptop, which Rudman took
out of Brown's hands and handed to Flaherty for inspection.
Brown and Yarboro were then brought
into the Medical Transport building and interviewed separately. Rudman
conducted the interview of Yarboro, who was the initial focus of the
investigation because he was younger than Brown and was presumably more
computer savvy. Lucas simultaneously interviewed Brown, and quickly realized
that Brown was the more likely suspect of the two.
U.S. v. Brown, supra.
also deduced that Brown was more likely
to have downloaded the files. She promptly left the interview room to interrupt
Rudman's interview of Yarboro and lead Rudman to where Lucas was interviewing
Brown. Rudman explained that he was present to ask about child pornography.
During the interview, Rudman showed Brown documents from the investigation
indicating that files containing child pornography had been downloaded at
Medical Transport's IP address.
Brown soon admitted that his laptop was
the computer that had been involved, and he acknowledged searching for child
pornography by computer on and off for a couple of years, using search terms
like `daughter,’ `incest,’ and `PTHC’ (pre-teen hard core). The detectives
thereafter concluded the interview.
Having seized Brown's laptop, the
detectives procured a second search warrant, authorizing them to search the
laptop itself. The laptop was found to contain videos and images of child
pornography.
U.S. v. Brown, supra.
Brown’s appellate brief notes that the laptop search “revealed
internet activity, four videos, and the remnants of deleted images indicative
of child pornography”. Brief of the
Appellant, U.S. v. Brown, 2012 WL 710678. It also notes that this “evidence was the
basis of the government's case against” him. Brief of the Appellant, supra.
Brown was indicted for receiving child pornography and, as
noted above, moved to suppress evidence.
U.S. v. Brown, supra. In his motion, Brown argued that the
search warrant for Medical Transport
did not authorize a seizure of Brown's laptop because the laptop was not found
in the Medical Transport building. The motion contended that the warrant only
authorized the search of `the business of Medical Transport,’ and specifically
identified and described the building, which was located on Harris Street in
Charlottesville.
The motion maintained that the warrant
allowed the detectives to search for computers, electronic storage devices, and
employee records relating to scheduling, but did not authorize a search of
either Brown or the ambulance outside the building.
U.S. v. Brown, supra.
More precisely, Brown’s motion to suppress argued that
`[n]either Brown nor the computer was
at the location the warrant authorized for search. Officer Rudman's statements
reveal that the CPD officers' zeal to obtain the subject of the warrant led
them to disregard their authority to search for it. . . . Here, the warrant
clearly allows for search inside a specific building but officers chose to
search a person and vehicle outside of the building. Thus, the officers found
what they were looking for but they did not find it in an area where they were
constitutionally permitted to look.’
U.S. v. Brown, supra
(quoting Brown’s motion to suppress).
The district court judge denied the motion to suppress
before the trial began and again, when Brown renewed it at the close of the
prosecution’s evidence. U.S. v. Brown, supra. On appeal, Brown argued that the judge
“erred” in not holding “an evidentiary hearing prior to denying the
motion.” U.S. v. Brown, supra.
More specifically, Brown contends that
the court should have assessed whether the seizure of his laptop by the
officers was reasonable. . . .In its response brief, the government asserts
that exigent circumstances existed to justify the officers' seizure of the
laptop.
U.S. v. Brown, supra.
The prosecution did not contest Brown's assertion that the
search warrant for the Medical Transport building failed to authorize a search
or seizure of Brown's person or the ambulance.”
U.S. v. Brown, supra. The
Court of Appeals therefore noted that “rather than engaging in an analysis of
the scope of the warrant (which is not in the record), we will proceed on the
proposition that the seizure of Brown's laptop was warrantless.” U.S. v.
Brown, supra. Since the seizure was
not conducted pursuant to a warrant, it would violate the 4th
Amendment unless it was justified by one of the warrant exceptions.
The court began its analysis of Brown’s argument by noting
that the “exigent circumstances that may justify a warrantless seizure include
. . . imminent destruction of evidence.”
U.S. v. Brown, supra. It then explained that the Supreme Court has
recognized that, with respect to
warrantless seizures, `the 4th Amendment requires only that the steps preceding
the seizure be lawful.’ [Kentucky v. King, 131 S.Ct. 1849 (2011).] In other words, `the exigent circumstances
rule applies when the police do not gain entry to premises by means of an
actual or threatened violation of the 4th Amendment.’ Kentucky v. King, supra.
Here, the Charlottesville detectives
had probable cause to believe child pornography was being downloaded at the
Medical Transport building, and they could reasonably believe that it was being
downloaded at that location by either Brown or Yarboro.
The detectives' showing of probable
cause -- accepted and endorsed by the magistrate judge in issuing the search
warrant for the building -- came from tracing the illegal files to the Medical
Transport IP address and learning from Medical Transport's manager that Brown
and Yarboro were the only employees working at the time that the files were
downloaded.
The detectives' entry onto the
company's property was authorized by the search warrant, and their subsequent
inquiries regarding laptop computers possessed by Brown and Yarboro, were therefore
lawful and proper.
U.S. v. Brown, supra.
The Court of Appeals also noted that based on their
investigation, the detectives had
probable cause to believe that any computer used by either Brown or
Yarboro during their work shifts at Medical Transport harbored evidence of
child pornography. Accordingly, when the Charlottesville detectives informed
Brown they were investigating Internet crimes against children, they had probable
cause to believe that Brown's laptop, which he possessed during his work shift,
contained evidence of child pornography. See U.S. v. Place, 462
U.S. 696 (1983) (4th Amendment permits a warrantless seizure of property `[w]here
. . . authorities have probable cause to believe [the property] holds contraband
or evidence of a crime . . . , if the exigencies of the circumstances demand
it’).
Following up on Brown's response, it
was entirely reasonable for the officers to seize Brown's laptop—as they did—to
prevent either it or its contents from being damaged or destroyed. . .
.
U.S. v. Brown, supra
(emphasis in the original).
The Court of Appeals therefore affirmed the district court’s
denial of the motion to suppress and affirmed Brown’s conviction and
sentence. U.S. v. Brown, supra.
No comments:
Post a Comment