This post examines a recent opinion from the District Court of Appeal of Florida – Fourth District: State
v. K.C., 2016 WL 7118843 (2016). The
court begins by explaining that the
State appeals an order granting K.C.'s
motion to suppress. The State argued it did not need to obtain a warrant before
searching an abandoned cell phone.
State v. K.C., supra.
Next, the Court of Appeal explains how, and why, the
prosecution arose:
A Lauderhill police officer initiated a
traffic stop of a vehicle that was speeding and driving without its headlights
on at night. The vehicle pulled into a shopping plaza and then made an abrupt
stop. Two unidentified individuals got out of the vehicle, briefly looked at
the officer, and then fled.
During his investigation, the officer
determined that the vehicle's tag did not match the vehicle. The actual tag was
in the trunk, and the vehicle had been reported stolen in Sunrise. Inside the
vehicle, the officer saw `a cell phone or two’ plainly visible `[i]n the front passenger
and compartment area.’ On the cell phone's lock screen was a picture of an
individual that looked `similar to the person who ran from the vehicle.’ The
cell phone had a passcode, but the officer did not attempt to unlock it or
otherwise get into the phone. He turned the cell phone over to the Sunrise
Police Department in connection with that department's stolen vehicle
investigation.
State v. K.C., supra.
The opinion goes on to explain that
[s]everal months later, a detective
with the Sunrise Police Department asked a forensic detective to determine
ownership of the phone. He did not obtain a search warrant because he believed
that the phone was abandoned. The forensic detective was able to unlock the
phone, and he obtained information indicating that the cell phone belonged to
K.C.
State v. K.C., supra.
The opinion continues, explaining that
K.C. was charged with burglary of a
conveyance. He moved to suppress the contents of the cell phone, from which the
police had obtained his name, on the ground that the phone was searched without
a warrant. After the presentation of the foregoing facts, the prosecutor argued
that the phone was abandoned, and the owner had no expectation of privacy in
the phone once abandoned. Noting that he was not challenging the seizure of the
phone, defense counsel contended that the search was unlawful. `[I]t was inappropriate
. . . not to get a warrant’ to search a `piece of property that's passcode
protected . . . with immense storage capacity and a lot of information that the
police . . . can access [including] possibly your banking, your social media,
your email, your contacts, your pictures.’
Defense counsel further emphasized that
there was no evidence that K.C. himself left the cell phone in the stolen car.
Counsel suggested that someone else could have had K.C.'s phone `for whatever
reason, maybe he borrowed it.’ Even though the cell phone was left behind,
defense counsel asserted that K.C. would have retained an expectation of
privacy by virtue of passcode-protecting the phone. Finally, defense counsel
argued that dropping the cell phone by itself was not voluntary abandonment;
K.C. never disclaimed ownership of the phone. After hearing argument, the trial
court granted the motion to suppress based upon defense counsel's arguments.
The State appeals pursuant to Florida Rule of Appellate Procedure 9.140(c)(1)(B).
State v. K.C., supra.
The court then takes up the issue of the motion to suppress
and the Fourth Amendment, explaining that
`[a] motion to suppress evidence
generally involves a mixed question of fact and law. The trial court's factual
determinations will not be disturbed if they are supported by competent
substantial evidence, while the constitutional issues are reviewed de novo.’ Strawder
v. State, 185 So.3d 543, 545 (Fla. 3d DCA 2016). `A reviewing court is
bound by the trial court's findings of fact—even if only implicit—made after a
suppression hearing, unless they are clearly erroneous.’ State v.
Setzler, 667 So.2d 343, 346 (Fla. 1st DCA 1995). `The initial burden on a
motion to suppress an illegal search is on the defendant to make an initial
showing that the search was invalid.’ Miles v. State, 953 So.2d
778, 779 (Fla. 4th DCA 2007). However, `[a] warrantless search constitutes a
prima facie showing which shifts to the [S]tate the burden of showing the
search's legality.’ Lewis v. State, 979 So.2d 1197, 1200 (Fla. 4th
DCA 2008).
State v. K.C., supra.
The court began its analysis of the issue in the case by explaining
that
[a]lthough in this case, the trial
court itself made no explicit findings of fact, it agreed with the defense arguments,
and the facts were undisputed. Thus, the trial court either found that the cell
phone was not abandoned or made the legal conclusion that police could not
search the cell phone without a warrant because the abandonment exception is
inapplicable to password-protected cell phones. We address the latter
contention, as it is controlling.
State v. K.C., supra.
Next, the Court of Appeal explained that
[c]oncluding that a warrantless search
of a cell phone cannot be justified as a search incident to arrest, the Supreme
Court explained in Riley v. California, 134 S.Ct. 2473 (2014), how
a cell phone is different than other objects which might be subject to a
search:
`Cell phones differ in both a
quantitative and a qualitative sense from other objects that might be kept on
an arrestee's person. The term `cell phone’ is itself misleading shorthand;
many of these devices are in fact minicomputers that also happen to have the
capacity to be used as a telephone. . . .
One of the most notable distinguishing
features of modern cell phones is their immense storage capacity. Before cell
phones, a search of a person was limited by physical realities and tended as a
general matter to constitute only a narrow intrusion on privacy. . . . But the possible intrusion on privacy is not
physically limited in the same way when it comes to cell phones. . . .
The storage capacity of cell phones has
several interrelated consequences for privacy. First, a cell phone collects in
one place many distinct types of information—an address, a note, a
prescription, a bank statement, a video—that reveal much more in combination
than any isolated record. Second, a cell phone's capacity allows even just one
type of information to convey far more than previously possible. The sum of an
individual's private life can be reconstructed through a thousand photographs
labeled with dates, locations, and descriptions; the same cannot be said of a
photograph or two of loved ones tucked into a wallet. Third, the data on a
phone can date back to the purchase of the phone, or even earlier. . . .
Finally, there is an element of
pervasiveness that characterizes cell phones but not physical records. Prior to
the digital age, people did not typically carry a cache of sensitive personal
information with them as they went about their day. Now it is the person who is
not carrying a cell phone, with all that it contains, who is the exception. . .
.’
Riley v. California,
supra.
The Court of Appeal went on to explain that the Riley Court’s opinion explained that in
1926, Learned Hand observed . . . .
that it is `a totally different thing to search a man's pockets and use against
him what they contain, from ransacking his house for everything which may
incriminate him.’ United States v. Kirschenblatt, 16 F.2d 202, 203
(U.S. Court of Appeals for the 2d Circuit 1926). If his pockets contain a cell phone, however, that is no longer
true. Indeed, a cell phone search would typically expose to the government
far more than the most exhaustive search of a house: A phone
not only contains in digital form many sensitive records previously found in
the home; it also contains a broad array of private information never found in
a home in any form—unless the phone is.
To further complicate the scope of the
privacy interests at stake, the data a user views on many modern cell phones
may not in fact be stored on the device itself. Treating a cell phone as a
container whose contents may be searched incident to an arrest is a bit
strained as an initial matter. See New York v. Belton,
453 U.S. 454, 460, n. 4 (1981) (describing a `container’ as `any object capable
of holding another object’). But the analogy crumbles entirely when a cell
phone is used to access data located elsewhere, at the tap of a screen. That is
what cell phones, with increasing frequency, are designed to do by taking
advantage of `cloud computing.’ . . .
Modern cell phones are not just another
technological convenience. With all they contain and all they may reveal, they
hold for many Americans `the privacies of life,’ Boyd [v.
U.S.], supra, [116 U.S. 616] at 630, 6 S.Ct. 524 [29 L.Ed. 746
(1886)]. The fact that technology now allows an individual to carry such
information in his hand does not make the information any less worthy of the
protection for which the Founders fought. Our answer to the question of what
police must do before searching a cell phone seized incident to an arrest is
accordingly simple—get a warrant.
Riley
v. California, supra.
The opinion then notes that “the State”, i.e., the
prosecution,
claims that it could search the cell
phone without a warrant under the abandonment exception:
`Although warrantless searches and
seizures are generally prohibited by the Fourth Amendment to the United States
Constitution and article I, section 12, of the Florida Constitution,
police may conduct a search without a warrant if consent is given or if the
individual has abandoned his or her interest in the property in question.’
Caraballo v. State, 39 So.3d
1234, 1245 (Fla. 2010) (quoting Peterka v. State, 890 So.2d
219, 243 (Fla. 2004)). Our supreme court has recognized that `[t]he test for
abandonment is whether a defendant voluntarily discarded, left behind, or
otherwise relinquished his interest in the property in question so that he
could no longer retain a reasonable expectation of privacy with regard to it at
the time of the search.’ Id. (alteration in original)
(quoting Branch v. State, 952 So.2d 470, 476 n.4 (Fla. 2006)). . .
. In other words, `”[n]o search occurs when police retrieve property
voluntarily abandoned by a suspect in an area where the latter has no
reasonable expectation of privacy.”’ State v. Lampley, 817 So.2d
989, 991 (Fla. 4th DCA 2002) (quoting State v. Milligan, 411
So.2d 946, 947 (Fla. 4th DCA 1982)).
State v. K.C., supra.
The court went on to explain that
[w]hile we acknowledge that the
physical cell phone in this case was left in the stolen vehicle by the
individual, and it was not claimed by anyone at the police station, its
contents were still protected by a password, clearly indicating an intention to
protect the privacy of all of the digital material on the cell phone or able to
be accessed by it. Indeed, the password protection that most cell phone users
place on their devices is designed specifically to prevent unauthorized access
to the vast store of personal information which a cell phone can hold when the
phone is out of the owner's possession.
In light of Riley, the
United States Supreme Court treats cell phones differently, for the purposes of
privacy protection, than other physical objects. Although Riley conceded
that some `case-specific’ exceptions may apply to justify a warrantless search
of a cell phone, the example given was a search based upon exigent
circumstances. Riley, 134 S.Ct. at 2494. `Such exigencies could
include the need to prevent the imminent destruction of evidence in individual
cases, to pursue a fleeing suspect, and to assist persons who are seriously
injured or are threatened with imminent injury.’ Id. The
abandonment exception does not compel a similar conclusion that a warrantless
search is authorized. There is no danger to individuals, property, or the need
to immediately capture a criminal suspect where the cell phone is out of the
custody of the suspect for substantial amounts of time. And there is an abundant
amount of time for the police to obtain a warrant, which could then limit, if
necessary, the scope of the search of the phone.
State v. K.C., supra.
The Court of Appeal also noted that
[w]here a cell phone is `abandoned,’
yet its contents are protected by a password, obtaining a warrant is even less
problematic. In this case, how difficult and inefficient would it have been for
the officer to obtain a search warrant, when the cell phone in question was in
police possession for months?
As the Supreme Court held that a
categorical rule permitting a warrantless search incident to arrest of a cell
phone contravenes the Fourth Amendment protection against unreasonable searches
and seizures, we hold that a categorical rule permitting warrantless searches
of abandoned cell phones, the contents of which are password protected, is
likewise unconstitutional.
State v. K.C., supra.
In so doing, the court noted that,
[w]here a cell phone is `abandoned,’
yet its contents are protected by a password, obtaining a warrant is even less
problematic. In this case, how difficult and inefficient would it have been for
the officer to obtain a search warrant, when the cell phone in question was in
police possession for months?
State v. K.C., supra.
The court ended its opinion with these comments:
Because both the United States Supreme
Court and the Florida Supreme Court have recognized the qualitative and
quantitative difference between cell phones (and their capacity to store
private information) and that of other physical objects and the right of
privacy in that information, we conclude that the abandonment exception does
not apply to cell phones whose contents are protected by a password. Paraphrasing
Chief Justice Roberts, `[o]ur answer to the question of what police must do
before searching [an abandoned, password protected] cell phone . . . is accordingly
simple—get a warrant.’ Riley v.
California, supra.
State v. K.C., supra.
The Court of Appeal therefore affirmed the trial court
judge’s order granting K.C.’s motion to suppress. State v. K.C., supra.
No comments:
Post a Comment