Wednesday, May 02, 2012

Exigent Circumstances, Inevitability and Poisonous Trees


After being convicted on “one count of possession of child pornography, [Missouri Revised Statutes] § 573.035, and one count of promoting child pornography in the second degree, [Missouri Revised Statutes] § 573025, David Sachs appealed.  State v. Sachs,  __ S.W.3d __, 2012 WL 1392574 (Missouri Court of Appeals 2012).  In his appeal, Sachs “challenge[s] the admission of evidence recovered as a result of a warrantless search of his personal computer”, and issue we’ll get to in a moment.  State v. Sachs, supra.

To understand his argument concerning the search of the computer, you need to understand how and why the search came about:  It bean on July 27, 2009, when Sergeant Cavanaugh of the St. Louis County Police Department contacted Detective Anderson of the Boone County Sheriff’s Department about “an ongoing child pornography investigation.”  State v. Sachs, supra.  Cavanaugh had executed a search warrant “at a Webster Groves address after obtaining evidence that” the IP address associated with the home “had been used in the past to upload and download child pornography.”  State v. Sachs, supra. The homeowners told Cavanaugh they had a son – David Sachs – who then lived in Columbia, Missouri but had previously lived in their home and used the Internet there.  State v. Sachs, supra.  Cavanaugh asked Anderson to interview David Sachs.  State v. Sachs, supra.  (Columbia is in Boone County.)

Anderson went to Sachs’ apartment, accompanied by Detective Perkins and Officer Purdy.  State v. Sachs, supra.  Sachs lived in the three-bedroom apartment with two roommates; the latter opened the door after the officers knocked and one of them got David.  State v. Sachs, supra.  Anderson asked if they could speak in private and they went to Sachs’ room.  State v. Sachs, supra.  Anderson noticed a computer that was “turned on and . . . a word-processing document was showing on the screen.”  State v. Sachs, supra. 

Anderson told Sachs “they were investigating the distribution of child pornography” and asked Sachs how long he had been in Columbia; Sachs said he had been there for fourteen months but had “stayed at his parents’ house on and off during that period.”  State v. Sachs, supra.  He said he had an old computer at his parents’ house that he no longer used and had the computer in the apartment “he had previously used” at his parents’ home. State v. Sachs, supra.  Sachs “admitted to having file-sharing programs on his computer” and using them to download adult pornography; when Anderson asked if he ever downloaded child pornography, he said that “on occasion” he had “accidentally downloaded misnamed material that turned out to be child pornography” but deleted it when he realized what it was.  State v. Sachs, supra.  He said he might have failed to erase some of the child pornography he had downloaded.  State v. Sachs, supra. 

Anderson asked if he could examine Sachs’ computer to “verify there was not active child pornography on it” but Sachs refused.  State v. Sachs, supra.  Anderson contacted the St. Louis County Sheriff’s Department and was told their officers wanted to interview Sachs at the Boone County Sheriff’s Department; he agreed to meet with the St. Louis officers at the local Sheriff’s Department.  State v. Sachs, supra.  Anderson also told Sachs he was going to apply for a warrant to search his computer, and then let Sachs “step outside to talk to his parents on the telephone.”  State v. Sachs, supra.  

Anderson had decided to seize the computer until a warrant could be obtained. Before unplugging the computer to take it, he decided to . . . examine the programs currently running on the computer. From icons shown on the bottom, right corner of the computer screen, Anderson could tell several programs were running in addition to the word processing program shown on the screen. One of [them] was LimeWire, which [Sachs] admitted having used to download music and videos. When Anderson clicked on that icon to open that program, he was able to see files were being downloaded and uploaded at that time. He took pictures of the screens showing lists of the filenames being uploaded and downloaded.

After seeing the names of the files being uploaded and downloaded on LimeWire, many . . . suggesting they might contain child pornography, Anderson told [Sachs] files were being uploaded and downloaded on his computer. [Sachs] responded, `Yes, sir.’ Anderson asked [Sachs] if he knew he had child pornography on the computer. [Sachs] responded that he was aware there would be child pornography on his computer but stated that he did not realize he was sharing such material. . . . [Sachs] indicated the last time he had downloaded child pornography was the previous night and he had used particular search terms to find such files.

State v. Sachs, supra. 

Sachs and Anderson went to the Boone County Sheriff’s Office, where Sachs decided not to talk to the St. Louis County officers.  State v. Sachs, supra. Anderson brought Sachs’ computer with them and got a warrant to search it.  State v. Sachs, supra.  The “hard drive . . . was examined using forensic equipment and programs.”  State v. Sachs, supra.  Officers found “numerous video files containing child pornography” plus evidence that LimeWire had been used to “download such files”, make them “available for upload to others” and that such files “had indeed been uploaded to others using LimeWire.”  State v. Sachs, supra.  That evidence was used against Sachs at his jury trial on the charges noted above; he was convicted, sentenced to two concurrent terms of five years in prison and appealed.  State v. Sachs, supra. 

On appeal, Sachs argued that the trial judge denied his motion to suppress the evidence obtained from his computer because “the search of his computer by Anderson before a warrant was obtained violated his constitutional right to be free from unreasonable, warrantless search.”  State v. Sachs, supra.  As Wikipedia explains, and as I’ve noted in earlier posts, the 4th Amendment creates a right to be free from “unreasonable” searches and seizures; to be “reasonable,” a search or seizure must be conducted pursuant to a valid search warrant or pursuant to an exception to the warrant requirement.  Wikipedia outlines the exceptions, if you’re interested.  

The Court of Appeals began its analysis of Sachs’s argument by “by stating the obvious. When Anderson began clicking on icons on [Sachs’] computer screen to view different programs that were not openly visible on the computer screen, he was conducting a search.”  State v. Sachs, supra.  Since clicking on the icons constiuted a search, it violated the 4th Amendment unless the search was conducted pursuant to a warrant or an exception.

The prosecution’s first argument was that the exigent circumstances exception “justified the detective's actions in accessing the active programs because information in the computer's RAM (random access memory) would disappear when the officer unplugged the computer to seize it.”  State v. Sachs, supra.  As Wikipedia notes, this exception lets officers act without a warrant in which “people are in imminent danger, evidence faces imminent destruction, or a suspect will escape.”  The state relied on the second option, but the Court of Appeals was not persuaded:

[T]his case simply does not establish any pressing need for the officer to unplug the computer prior to obtaining a warrant. Three officers were present . . . and had fully secured the scene. The State failed to prove . . . exigent circumstances that would preclude an officer from remaining with the computer while a warrant was obtained. 

The State's argument . . . is based entirely upon a presumption of inconvenience for the officers and [Sachs’] roommates. Such circumstances are not exigent and most certainly do not establish `a need that will not brook the delay incident to obtaining a warrant.’ [State v. Warren, 304 S.W.3d 794 (2010).] . . . [I]f Anderson truly believed that valuable evidence might be lost through the unplugging of the computer, he should have waited until a warrant was obtained and then conducted his search of the files active on the computer.

State v. Sachs, supra. 

The court also rejected the prosecution’s argument that exigent circumstances existed because Sachs’ was “actively” uploading and downloading “files of some type”.  State v. Sachs, supra.  The Court of Appeals’ response was that the prosecution’s argument that “the transfer of files of an unknown nature might be completed by the time a warrant was obtained is akin to saying that an officer couldn't wait for a wiretap warrant because the suspect was on the phone and might finish his conversation before a warrant could be obtained.”  State v. Sachs, supra. 

The prosecution then argued that `regardless of whether Anderson's actions in opening the active files on [Sachs’] computer violated the 4th Amendment, the evidence was properly admitted at trial based upon the inevitable discovery doctrine.”  State v. Sachs, supra.  The court began its analysis of this issue by outlining the applicable law:

`[T]he inevitable discovery rule . . . provides that evidence obtained through unlawful means may be admissible if it can be shown the same evidence would have been inevitably discovered in a lawful manner.’ State v. Grayson, 336 S.W.3d 138 (Missouri Supreme Court 2011). `To show that the evidence would have inevitably been discovered, the state must prove by a preponderance of the evidence: (1) that certain standard, proper and predictable procedures of the local police department would have been utilized and (2) those procedures inevitably would have led to discovery of the challenged evidence through the state's pursuit of a substantial, alternative line of investigation at the time of the constitutional violation.’ [State v. Oliver, 293 S.W.3d 437 (Missouri Supreme Court 2009).]

State v. Sachs, supra.

In applying this standard, the court found, first, that “access to the active files on the computer to view and take pictures of the active programs was” not inevitable because Anderson testified “to his intent to turn off, unplug, and remove the computer from the premises prior to applying for a warrant” which meant that “as a result of [his] own actions, the ability to view and photograph the active programs would not have existed by the time a warrant could be obtained for a lawful search to have been conducted.”  State v. Sachs, supra.  It therefore held that the inevitable discovery doctrine did not justify “admission of the pictures of the active computer screens or Anderson's testimony related to his access of the active programs”.  State v. Sachs, supra.

It also found, however, that to “the extent [Sachs] challenges the seizure of the computer's hard drive and admission of the evidence recovered as result of a forensic examination of the hard drive after a search warrant was obtained, . . . that evidence would clearly have been inevitably discovered.”  State v. Sachs, supra.  The court noted that Anderson “had more than sufficient probable cause to obtain a search warrant in light of [Sachs’]previous admission that he had downloaded child pornography and some child pornography was likely still on his computer.” State v. Sachs, supra.

In making this finding, the Court of Appeals rejected Sachs’ argument that the evidence should be suppressed as “fruit of the poisonous tree” because Anderson “referenced” the “unlawfully obtained evidence” analyzed above in his application for the search warrant.  State v. Sachs, supra.  As Wikipedia notes,

[f]ruit of the poisonous tree is a legal metaphor in the United States used to describe evidence that is obtained illegally. The logic . . . is that if the source of the evidence (the `tree’) is tainted, then anything gained from it (the `fruit’) is tainted as well.

The court began its analysis of the fruit of the poisonous tree argument by noting that

`[t]he fact that illegally obtained evidence is included in the affidavit does not invalidate the warrant.’ [State v. Oliver, supra.] `The ultimate inquiry is not whether the affidavit contained allegations based upon illegally obtained evidence but whether, if setting aside all tainted allegations, the independent and lawful information stated in the affidavit suffices to show probable cause.’ [State v. Oliver, supra.]

State v. Sachs, supra. 

It found that in this case, when the unlawfully obtained evidence was “disregarded,” the remaining information in the affidavit established probable cause. State v. Sachs, supra. The Court of Appeals held, therefore, that the “evidence recovered from the hard drive would have inevitably been discovered regardless of Anderson's improper search of the active files on the computer, and the trial court did not err in admitting that evidence at trial.”  State v. Sachs, supra. 

For this reason and others, it affirmed Sachs’ conviction and sentences.  State v. Sachs, supra. 

1 comment:

Anonymous said...

What a moron. Dude should have just kept his mouth shut and told the cops to take a hike. He'd be a free man now.