Monday, February 16, 2015

The Flash Drive, the 4th Amendment and Child Pornography

After Devon Alexander Kane pled guilty to possessing child pornography and was sentenced to 90 days in jail and ten years of probation, due to “medical issues”, he appealed.  You can read more about the case in the stories you can find here and here.
Kane pled guilty after the trial judge denied his “motions to suppress photographs obtained on an unmarked, unlocked flash drive left in a classroom and discovered by employees of Schreiner University.”  Kane v. State, 2015 WL 575334 (Court of Appeals of Texas 2015). 
The court begins its analysis of Kane’s appeal by explaining how the prosecution arose:
On September 29, 2010, Kathleen Walker, the Director of Instructional Technology at Schreiner University, found an unmarked, black-colored flash drive in one of the campus classrooms. In an attempt to identify the owner of the flash drive, Walker inserted the flash drive into a computer on the university's computer network. Walker discovered documents belonging to Kane and also to another student.

Walker continued examining the flash drive for something that would help identify the true owner. While looking through the flash drive's contents, Walker opened folders labeled `photos’ and `music.’ Contained within these folders were pictures that Walker believed to be child pornography.

Walker immediately contacted Danny Flores, the university's Director of Security, and relayed her discovery and the identity of the student to whom she believed the flash drive might belong. Flores subsequently viewed the same documents on the flash drive before contacting Kerrville Police Officer Michael McDonald. The officers obtained a search warrant to search the contents of the flash drive and Kane was charged with possession of child pornography.
Kane v. State, supra.
Kane then filed two motions to suppress, one of which was based on 
Walker and Flores's search and one based on the search warrant, contending the unwarranted search of his flash drive violated his 4th Amendment rights and constituted trespass. On December 18, 2013, following the trial court's denial of Kane's motions to suppress, Kane entered pleas of guilty and was sentenced to ten years deferred adjudication probation in each case.

This appeal ensued. Because Kane's appellate briefs do not distinguish between the different motions, we address the motions simultaneously, including the arguments contained therein.
Kane v. State, supra.
The Court of Appeals began its analysis of Kane’s arguments by explaining that it
review[s] the trial court's denial of a motion to suppress under a bifurcated standard of review. Valtierra v. State, 310 S.W.3d 442 (Texas Court of Criminal Appeals 2010). A trial court's determination of historical facts will be given almost total deference, while the trial court's application of the law will be reviewed de novoDerichsweiler v. State, 348 S.W.3d 906, 913 (Texas Court of Criminal Appeals 2011). . . .  A trial court has the distinct advantage to make first-hand observations of a witness's demeanor during testimony on a motion to suppress; we, therefore, defer to the trial court's determination of `credibility of the witnesses and the weight to be given their testimony.’ State v. Ross, 32 S.W.3d 853 (Texas Court of Criminal Appeals 2000).
Kane v. State, supra.
On appeal, Kane argued that “the acts of Kathleen Walker and Danny Flores violated his 4th Amendment rights, amounted to trespass, and violated § 33.02 of the Texas Penal Code; he also claims he had a reasonable expectation of privacy in the flash drive.” Kane v. State, supra. The Court of Appeals began its analysis with Kane’s claim that he had a reasonable expectation of privacy in the flash drive. Kane v. State, supra. It noted that Kane claimed
that by storing information on a flash drive he manifested a reasonable expectation of privacy. The State argues that Kane failed to demonstrate that merely storing information on a flash drive that is not password protected, not marked with personal identifiers, and not locked in a locked case, manifests a reasonable expectation of privacy.
Kane v. State, supra.
The Court of Appeals went on to explain that "both parties" agreed that Walker and Flores
were individual citizens and not working under the direction of law enforcement. Kane contends that the exclusionary rule applies to illegal searches conducted by either law enforcement personnel or private citizens. The State counters the exclusionary rule is inapplicable in this case because Kane's flash drive was effectively abandoned, or in the alternative, Walker and Flores took the flash drive with the intent to turn the drive over to law enforcement.
Kane v. State, supra.  Courts have held that the 4th Amendment only protects us citizens from searches and seizures conducted by law enforcement officers or other government agents, because it only protects us from “state action”, as I explained in an earlier post.
The court began its analysis with the issue of whether Kane had a reasonable expectation of privacy in the thumb drive. Kane v. State, supra.  As I have noted in prior posts, the U.S. Supreme Court held, in Katz v. U.S., 389 U.S. 346 (1967), that for a 4th Amendment search to occur, law enforcement officers or other state agents must intrude into an area or thing in which someone has a “reasonable expectation of privacy.”  Under Katz, someone has a reasonableexpectation of privacy if (i) the person subjectively believes the place/thing is private and (ii) society accepts this belief as objectively reasonable.  See U.S. v. Katz, supra (Harlan, J., concurring).
The court then analyzed whether Kane evidenced a subjective belief that the flash drive was private under the 4th Amendment:
The Austin Court of Appeals' analysis in Miller v. State, 335 S.W.3d 847 (Texas Court of Appeals 2011) is instructive. Miller, an officer with the Elgin Police Department, left his personal thumb drive in the department's patrol room computer after printing a copy of his daily activity report. . . . The thumb drive was left attached to the computer located at the front desk of the patrol room and discovered by another officer attempting to use the computer. . . . The thumb drive did not have Miller's name or marks identifying the drive as Miller’s. . . .

One of the Elgin Police Department officers logged onto the computer and opened the drive in an attempt to return the thumb drive to its rightful owner. . . .In doing so, the officer found a photograph he considered pornographic and the thumb drive was turned over to his supervisor. . . . The court found that Miller did not exhibit an actual subjective expectation of privacy. . . .

The court identified several factors in determining whether Miller possessed a subjective expectation of privacy. Miller had previously left the thumb drive in the patrol room which was accessible to other officers, city personnel, and citizens accompanied by officers. . . . Additionally, the thumb drive did not contain any identifying markers that would necessarily identify the drive as [Miller's] . . . and finally, Miller did not take any precautions to prevent others from accessing the information contained on the thumb drive, such as use of a password or encrypted data. . . .

This case is factually similar to that of Miller. Walker found the flash drive in a public computer, in a classroom at Schreiner University. At a minimum, the classroom was available to other students, faculty, and staff of the University. The flash drive did not have any identifying marks suggesting the identity of its owner and was not password protected, encrypted, or locked. Moreover, unlike Miller, Kane did not testify during the hearing on the motions to suppress and did not provide testimony as to his subjective expectation of privacy.

We, therefore, conclude that the trial court could have reasonably concluded Kane's conduct did not exhibit an actual subjective expectation of privacy in the flash drive. . . .
Kane v. State, supra. 
It then addressed whether, assuming Kane subjectively believed the flash drive was private, that belief was objectively reasonable.  Kane v. State, supra.  It explained that the Texas Court of Criminal Appeals has identified “several factors” courts can consider in determining
whether an individual's expectation of privacy is objectively reasonable:
(1) whether the accused had a property or possessory interest in the place invaded;
(2) whether he was legitimately in the place invaded;
(3) whether he had complete dominion or control and the right to exclude others;
(4) whether, prior to the intrusion, he took normal precautions customarily taken by those seeking privacy;
(5) whether he put the place to some private use; and
(6) whether his claim of privacy is consistent with historical notions of privacy.
See Granados v. State, 85 S.W.3d 217 (Texas Court of Criminal Appeals 2002). . . . .

`This list of factors is not exhaustive, however, and none is dispositive of a particular assertion of privacy; rather, we examine the circumstances surrounding the search in their totality.’ Granados v. State, supra.
Kane v. State, supra.  The Court of Appeals explained that it had, in earlier cases, noted
that these factors `are more applicable when discussing the expectation of privacy in a place than in discussing the expectation of privacy in a computer hard drive or even a closed container.’ Rogers v. State, 113 S.W.3d 452 (Texs Court of Appeals - San Antonio 2003). Although Kane did not testify at the hearing on the motions to suppress, there is sufficient evidence to support the trial court's conclusion that the flash drive belonged to Kane. . . . Once again, Miller is instructive in analyzing the remaining factors. . . .  

Here, the trial court `could have reasonably inferred that in order to return the drive to [Kane], others must have taken temporary possession of the drive and possibly accessed it to ascertain whether it belonged to [Kane].’ Miller v. State, supra. Kane left the flash drive in a classroom and did not mark it with his name or other identifying information and did not password protect or take other precautions to prevent others from viewing the information.  See Miller v. State, supra. Thus, `[Kane] did not exercise complete dominion or control over the drive, at least during the times he had misplaced it.’ Miller v. State, supra.

We conclude . . . that the trial court did not abuse its discretion in finding the circumstances did not rise to a level that any subjective expectation by Kane was objectively reasonable. 
Kane v. State, supra. 
Next, the court took up the issue of “Walker’s and Flores’s intent in taking possession of the flash drive.”  Kane v. State, supra.  It explained that the analysis in
Jenschke v. State, 147 S.W.3d 398 (Texas Court of Criminal Appeals 2004), provides guidance. In Jenschke, after their teenage daughter reported being sexually assaulted by a relative, the parents broke into Jenschke's vehicle and retrieved a box that contained a used condom. Jenschke v. State, supra. The parents took the box and an adult video out of the vehicle. Id. Over two years later, the parents turned the evidence over to law enforcement. Jenschke v. State, supra.

The court explained that when an individual, acting in their individual capacity and not as `an officer or an agent of an officer[,] takes property that is evidence of crime, without the effective consent of the owner and with the intent to turn over the property to an officer, the conduct may be non-criminal even though the person has intent to deprive the owner.’ Jenschke v. State, supra. However, when the victim's parents broke into the vehicle, they intended to deprive Jenschke of the property; they did not take the property with the intent to turn it over to law enforcement. Jenschke v. State, supra. Therefore, the parents violated the law against burglary of the vehicle. Jenschke v. State, supra. Because the parents took possession of the property with the intent to hold on to the property, and had not yet decided to turn the property over to law enforcement, the evidence was properly excluded. Jenschke v. State, supra.

Walker's testimony was to the contrary. As university employees, both Walker and Flores were permitted to be in the classroom where the flash drive was left. Walker initially viewed the flash drive to identify the owner's identity. When she discovered the pornographic images, she immediately took the flash drive to Flores, the head of security. Walker's intent clearly changed from simply identifying the owner of the flash drive to turning over the flash drive to law enforcement based on its content that she believed were potentially illegal. After Flores reviewed the images, the flash drive was immediately turned over to law enforcement.

The evidence supports a reasonable inference that Walker, and subsequently Flores, took the flash drive with the intent to turn the evidence over to law enforcement. 
Kane v. State, supra. 
The Court of Appeals therefore found that the court record of the case
supports that the trial court could have reasonably concluded that Kane's conduct did not exhibit an actual subjective expectation of privacy in the flash drive. See Miller v. State, supra. . . . Additionally, we conclude Kane similarly failed to sustain his burden that any expectation he may have possessed was objectively reasonable. Miller v. State, supra.

Finally, even without the trial court's finding that the flash drive was abandoned, we cannot say the trial court erred in concluding that both Walker and Flores took the flash drive with the intent to turn the evidence over to law enforcement. See Miller v. State, supra.  We, therefore, overrule Kane's first two issues on appeal. 
Kane v. State, supra. 
Finally, the court took up Kane’s argument that the searches conducted by
Walker and Flores constituted trespass when they obtained information from his personal property without his permission and without a warrant. Kane contends that his failure to password protect the information on his flash drive, mark the flash drive with personal identification information, or store the flash drive in a locked container, as well as his leaving the flash drive unattended, did not amount to consent to search the flash drive.

The State counters that because Kane's abandonment of his flash drive was voluntary, no trespass was committed by either Walker or Flores.
Kane v. State, supra. 
Kane’s argument relied on Texas Penal Code § 33.02(a)’s prohibition on
a `person knowingly accesses[ing] a computer, computer network, or computer system without the effective consent of the owner. . . . Kane contends the record does not support either actual consent or implied consent. . . .  Because Walker and Flores allegedly accessed Kane's flash drive without his effective consent, Kane asserts any evidence obtained through their actions was illegally obtained and should be suppressed pursuant to article 38.23 of the Texas Code of Criminal Procedure (`No evidence evidence obtained by an officer or other person in violation of any provisions of the Constitution or laws of the State of Texas, or of the Constitution or laws of the United States of America, shall be admitted in evidence against the accused on the trial of any criminal case’).

`If a defendant challenges the admissibility of evidence under this article on the ground it was wrongfully obtained by a private person in a private capacity, the defendant must establish that the private person obtained that evidence in violation of law.’ Mayfield v. State, 124 S.W.3d 377 (Texas Court of Appeals 2003) . . . . We must, therefore, determine whether Walker and Flores violated the law in obtaining the evidence in question.
Kane v. State, supra. 
The Court of Appeals began its analysis of this issue by noting that it found the analysis
in Knepp v. State, 2009 WL 638249,  (Texas Court of Appeals 2009).  . . instructive. Knepp used his personal laptop for work purposes. Knepp v. State, supra. When he left his laptop unsecured, another employee attempted to set a new background image on Knepp's computer and accessed his ‘“my documents' folder to find a funny picture.”’ Knepp v. State, supra. The pictures contained child pornography and Knepp's supervisor contacted the police. Knepp v. State, supra.

Knepp's co-worker testified that he followed office protocol by accessing a co-worker's unsecured computer and changing a setting to alert the owner that the computer had been left unsecured. Knepp v. State, supra. The court concluded that `[b]y leaving his computer open and unsecured, [Knepp] knew he was leaving it for his coworkers to access’ and `the trial court could reasonably conclude that [the co-worker] had [Knepp's] effective consent to access the computer.’ Knepp v. State, supra.

This case is comparable. Walker testified that she routinely checked the computer lab and classroom for articles left by students or faculty and regularly discovered flash drives. She further testified that doing so was part of her `standard operating procedure’ and that the only reason she viewed the information on the flash drive was to facilitate returning the flash drive to its owner.  Knepp v. State, supra. 

We conclude the trial court could have reasonably determined that by examining an unmarked and unlocked flash drive left in a common-use computer facility, Walker did not violate Texas Penal Code § 33.02 and that she had Kane's effective consent to access the flash drive. Id. Because Walker did not violate § 33.02, Kane failed to prove the evidence should have been excluded under article 38.23.  
Kane v. State, supra.  It therefore affirmed the trial judge’s denial of Kane’s motions to suppress. Kane v. State, supra. 



No comments: