Posted by Orin Kerr:
The Ninth Circuit's Erroneous Analysis of Computer Searches in *United States
v. Payton*:
http://volokh.com/archives/archive_2009_08_16-2009_08_22.shtml#1249913851
The Ninth Circuit recently issued a remarkable decision on the search
and seizure of computers in [1]United States v. Payton. I suspect this
case may go en banc, as the issue is pretty important, so it may not
be the last we've heard about it. Still, I wanted to flag the many
errors in this opinion for readers in case the case stays on the
books. You can read the appellant's opening brief [2]here, the
government's brief [3]here, and the reply brief [4]here; you can
listen to the oral argument [5]here. (I would have blogged about it
earlier, but I was on my blogging hiatus when it came down on July
21.)
The facts of the case are simple. The police had reason to believe
that Payton was selling drugs from his home, and they obtained a
warrant to search his home for drugs, sales ledgers relating to drugs,
and financial records for the person who lived in the home. The
affidavit of probable cause specifically requested permission to
search any computer located in the house. The affidavit explained that
based on the officer's experience, financial records were likely to be
found on a computer, and so it requested permission to search any
computers on site and seize any machines if evidence was found on
them.
During the search, an officer saw a computer in the bedroom that was
"on" but had its screensaver up. The officer moved the mouse, which
removed the screen saver. He then clicked open a file, and saw that it
contained child pornography. Further investigation confirmed that
Payton had other images of child pornography on his computer, leading
to child pornography charges. No drugs or records about drugs were
discovered.
In a decision by Judge Canby, joined by Judge Wardlaw and District
Judge Mills, the Ninth Circuit suppressed the child pornography
discovered in the computer. According to Judge Canby, the high storage
capacity of computers made it constitutionally unreasonable to search
a computer in those circumstances. Although the affidavit requested
permission to search computers discovered when the warrant was
executed, the affidavit was not incorporated: The warrant itself did
not explicitly authorize the search of computers.
Further, there was no specific evidence found in the home near the
computers that suggested that the evidence such as financial records
were stored in the computer. The officers did not find any other
evidence within the scope of the warrant elsewhere in the home, and
that made it unlikely that there would be evidence described in the
warrant inside the computer. The court concluded: "In the absence of
any circumstances supporting a reasonable belief that items specified
in the warrant would be found on the computer, the search did not meet
the Fourth Amendment standard of reasonableness."
Judge Canby also commented on the policy consequences of a contrary
rule:
Our confidence in our conclusion is buttressed by contemplating the
effect of a contrary decision. In order to uphold the search in
this case, we would have to rule that, whenever a computer is found
in a search for other items, if any of those items were capable of
being stored in a computer, a search of the computer would be
permissible. Such a ruling would eliminate any incentive for
officers to seek explicit judicial authorization for searches of
computers. But the nature of computers makes such searches so
intrusive that affidavits seeking warrants for the search of
computers often include a limiting search protocol, and judges
issuing warrants may place conditions on the manner and extent of
such searches, to protect privacy and other important
constitutional interests. We believe that it is important to
preserve the option of imposing such conditions when they are
deemed warranted by judicial officers authorizing the search of
computers. If unwarranted searches of computers are automatically
authorized by upholding the search in Payton�s case, that option
will be lost.
It's hard to know where to begin with the number of problems with
this opinion. I think I'll start with the big-picture conceptual
issues; then turn to Supreme Court precedent; and then go to Ninth
Circuit precedent.
1) To begin with the most basic conceptual error, the Fourth
Amendment simply does not require warrants to list the items to be
searched. As the text of the Fourth Amendment makes clear, warrants
must "particularly describ[e] the place to be searched and the persons
or things to be seized" (emphasis added). The Fourth Amendment
requires a description of the things to be seized, not a description
of containers that are searched during the hunt for the things to be
seized. I don't think I have ever seen a warrant that specifically
listed the items to be searched: There isn't even a place for that on
the standard warrant form.
The text of [6]Rule 41, the rule that governs search warrants, makes
this point plain: It requires warrants to list the property that the
agents want to "search for and seize." Note search "for," not search.
(This was a state warrant, to be clear, so Rule 41 isn't directly
applicable; I point it out only to emphasize that there is no
requirement that warrants list the items to be searched.) When the
officer moved the computer mouse and saw the image, he didn't seize a
computer. He didn't even seize the image. Rather, he searched the
computer without seizing anything. It was unneceesary to get prior
authorization to seize a computer because no computers were actually
seized.
2) Now I'll move on to Supreme Court precedent. There is no specific
Supreme Court precedent on how the Fourth Amendment applies to the
search of computers. But it's worth noting that the Supreme Court has
been clear that a warrant to search a place for specific evidence
permits the search of anything in that place where the described
evidence could be located. Here's Justice Stevens making the point
pretty forcefully in [7]United States v. Ross, 456 U.S. 798 (1982):
A lawful search of fixed premises generally extends to the entire
area in which the object of the search may be found, and is not
limited by the possibility that separate acts of entry or opening
may be required to complete the search. Thus, a warrant that
authorizes an officer to search a home for illegal weapons also
provides authority to open closets, chests, drawers, and containers
in which the weapon might be found. A warrant to open a footlocker
to search for marihuana would also authorize the opening of
packages found inside. A warrant to search a vehicle would support
a search of every part of the vehicle that might contain the object
of the search. When a legitimate search is under way, and when its
purpose and its limits have been precisely defined, nice
distinctions between closets, drawers, and containers, in the case
of a home, or between glove compartments, upholstered seats,
trunks, and wrapped packages, in the case of a vehicle, must give
way to the interest in the prompt and efficient completion of the
task at hand.
It seems to me that Judge Canby's decision in Payton tries to create
just such a "nice distinction" for computers. But I think it's hard to
square with the Supreme Court's view in Ross.
[8]
To read the rest of this post, click here.
Further, in response to the policy argument the panel offers, the
Supreme Court has also indicated that warrants should not try to
regulate the way that warrants are executed. The most recent statement
of this was [9]United States v. Grubbs, 547 U.S. 90 (2006), when the
Supreme Court overturned the Ninth Circuit's attempted limits on how
agents could execute anticipatory warrants. The Court explained,
quoting past cases, that "Nothing in the language of the Constitution
or in this Court's decisions interpreting that language suggests that,
in addition to the requirements set forth in the text, search warrants
also must include a specification of the precise manner in which they
are to be executed." This is a general principle, not a specific rule,
but it significantly cuts against the permissibility of the kind of
limitation that the Payton panel wants to permit.
3) Finally, the Payton opinion purports to root its approach in a
recent Ninth Circuit decision, [10]United States v. Giberson, 527 F.3d
882 (9th Cir. 2008). This doesn't work, however, because the legal
Giberson was very different. The question in Giberson was whether the
police could seize computers onsite and take them away for later
search pursuant to a second warrant when the initial warrant was for
physical documents. The warrant didn't ask for permission to seize
computers, but the agents did seize them, figuring that the computers
might contain those documents in physical form. They then obtained a
second warrant to search the computers. Thus the question in Giberson
was whether the seizure was permissible when the first warrant did not
explicitly authorize it: The Giberson court concluded that, in the
context of that case, it was.
The Payton court reasons that if Giberson was fact-specific, then
there is a general reasonableness test applicable here: Accordingly,
there must be facts according to which the search and seizure of a
computer with a warrant was unreasonable. It then announces that this
is such a case. But whether the Fourth Amendment allows a seizure of
an item not named in the warrant is very different from whether the
warrant allows a search for evidence described in the warrant that
happens to be on a computer. As I explained above, the Fourth
Amendment requires a description of the items to be seized, and limits
the permitted seizure to those items, but the Fourth Amendment does
not require a description of the items to be searched. Rather, so long
as the police have a valid warrant, they can search anywhere in the
place to be searched that could store the items to be seized.
I should add that I am quite sympathetic to the concern motivating
the panel: As the oral argument makes clear, the judges were concerned
with the core problem of computer search and seizure of how to limit
computer searches. I'm concerned about that, too, and have [11]written
an article on how best to approach the problem. But the Payton court's
efforts to address the problem just doesn't work: In addition to its
many practical problems, which I'll leave out for now, it's pretty
clearly inconsistent with the text of the Fourth Amendment and Supreme
Court precedent. The panel instead should have dealt with this problem
as a plain view issue, and analyzed whether the opening of the files
was justified as within the scope of the warrant based either on the
subjective approach of [12]United States v. Carey (10th Cir. 19990,
the objective approach used outside the computer setting, or using
some other approach to plain view.
References
Visible links
1. http://www.ca9.uscourts.gov/datastore/opinions/2009/07/21/07-10567.pdf
2. file://localhost/files/Payton1.pdf
3. file://localhost/files/Payton2.pdf
4. file://localhost/files/Payton3.pdf
5. http://www.ca9.uscourts.gov/media/view_subpage.php?pk_id=0000002122
6. http://www.law.cornell.edu/rules/frcrmp/Rule41.htm
7. http://www.law.cornell.edu/supct/html/historics/USSC_CR_0456_0798_ZS.html
8. file://localhost/var/www/powerblogs/volokh/posts/1249913851.html
9.
http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=000&invol=04-1414
10. http://www.ca9.uscourts.gov/datastore/opinions/2008/05/29/0710100.pdf
11. http://www.harvardlawreview.org/issues/119/Dec05/Kerr.pdf
12. http://ca10.washburnlaw.edu/cases/1999/04/98-3077.htm
Hidden links:
13. file://localhost/var/www/powerblogs/volokh/posts/1249913851.html
_______________________________________________
Volokh mailing list
[email protected]
http://lists.powerblogs.com/cgi-bin/mailman/listinfo/volokh