Commonwealth v. Denis Dorelas
Supreme Judicial Court of Massachusetts
January 14, 2016
Suffolk. April 7, 2015. - January 14, 2016.
Present: Gants, C.J., Spina, Cordy, Botsford, Duffly, Lenk, & Hines, JJ.
Constitutional Law, Search and seizure, Probable cause. Search and Seizure, Warrant, Probable cause. Probable Cause. Cellular Telephone.
A Superior Court judge properly denied the criminal defendant’s pretrial motion to suppress photographs that the police had obtained from a search, conducted pursuant to a warrant, of the defendant’s “smart” cellular telephone, where the search of the device’s photograph files was reasonable, in that there was probable cause that evidence of communications relating to and linking the defendant to the crimes under investigation would be found in the electronic files on the device, and such communications could be conveyed or stored in photographic form; and where the photographs in question were properly seized as evidence linking the defendant to the crimes under investigation. [500-505] Lenk, J., dissenting, with whom Duffly and Hines, JJ., joined.
Indictments found and returned in the Superior Court Department on September 27, 2011.
A pretrial motion to suppress evidence was heard by Patrick F. Brady, J.
An application for leave to prosecute an interlocutory appeal was allowed by Botsford, J., in the Supreme Judicial Court for the county of Suffolk, and the case was reported by her to the Appeals Court. The Supreme Judicial Court granted an application for direct appellate review.
Nancy A. Dolberg, Committee for Public Counsel Services, for the defendant.
John P. Zanini, Assistant District Attorney, for the Commonwealth.
Robert E. McDonnell, John Frank Weaver, Arcangelo S. Cella, Matthew R. Segal, Jessie J. Rossman, & Mason Kortz, for American Civil Liberties Union of Massachusetts, amicus curiae, submitted a brief.
CORDY, J. In this case we consider whether, where there was probable cause for the issuance of a warrant to search an Apple
The warrant authorized a search of the defendant’s iPhone for evidence of communications that would link him and another suspect to a shooting that occurred in the Hyde Park section of Boston. The search tool used to extract data from the iPhone was programmed to extract not only contact lists and text messages (texts), but also photographs. Among the photographs extracted and examined by the police were photographs depicting the defendant holding a gun and dressed in the same color jacket described by witnesses to the shooting.
We conclude that where there was probable cause that evidence of communications relating to and linking the defendant to the crimes under investigation would be found in the electronic files on the iPhone, and because such communications can be conveyed or stored in photographic form, a search of the photograph files was reasonable. Finally, we conclude that the photographs in question were properly seized as evidence linking the defendant to the crimes under investigation.
Background. On July 3, 2011, at approximately 7 P.M., Detective Richard Walker and other Boston police officers responded to reports of a shooting at 74 Pierce Street in Hyde Park. On arrival, the responding officers found Michael Lerouge with gunshot wounds to his back. The police found a black Glock, model 23, .40 caliber firearm in the middle of the roadway between 73 and 74 Pierce Street. Witnesses told the police that Lerouge and another person had shot at one another and that Lerouge had discarded the firearm under a parked motor vehicle, after which it slid further into the road. The police were also informed that the other shooter, described as wearing a green-colored shirt or jacket with writing on it, had run down Pierce Street toward Walter Street, dropping a firearm in the process. Witnesses stated that this man stopped, retrieved the dropped firearm, and then continued to run in the direction of 86 Pierce Street. The defendant was subsequently found on the left side of 86 Pierce Street, wearing a green jacket with emblems and suffering from gunshot wounds to his left leg.
The defendant’s brother, Bricknell Dorelas, also spoke with the police after the incident. He stated that earlier in the evening he had received a telephone call from the defendant, in which the defendant stated that he “was receiving threatening [telephone] calls and threatening text messages on his [telephone].” Bricknell did not know the identity of the person who was threatening the defendant. The police also spoke with a cousin of the defendant, Ohuinel Normil, who said the defendant “had been getting a lot of telephone threats because he owes money to people.” Normil did not know the identity of these people.
The owner of 86 Pierce Street told the police that he rented the rear apartment on the second floor of the building to the defendant, and that the defendant was the apartment’s sole occupant. Thereafter, the police applied for, received, and executed a search warrant for the defendant’s apartment. Pursuant to that warrant, the police seized a gun and an iPhone.2
Based on the information above, Walker believed that the defendant’s iPhone contained information linking both the defendant and Lerouge to the crimes of assault and battery by means of a dangerous weapon (firearm) and assault with intent to murder that were under investigation. Accordingly, he applied for a warrant to search the iPhone. In his affidavit, which was attached to his application for the warrant, Walker set out the substance of the investigative interviews and concluded by stating: “Based on the above facts . . . I have probable cause to believe [the defendant’s] cell phone contains valuable information that will link the victim/suspect ([the defendant]) and sus-
“Subscriber’s name and telephone number, contact list, address book, calendar, date book entries, group list, speed dial list, phone configuration information and settings, incoming and outgoing draft sent, deleted text messages, saved, opened, unopened draft sent and deleted electronic mail messages, mobile instant message chat logs and contact information mobile Internet browser and saved and deleted photographs on an Apple iPhone, silver and black, green soft rubber case. Additionally, information from the networks and carriers such as subscribers information, call history information, call history containing use times and numbers dialed, called, received and missed.”3
Among other items, the search resulted in the discovery and seizure of photographs of the defendant wearing a green jacket and holding a gun.4 The date the photographs were taken, stored, or received is not apparent in the record on the motion to suppress, and the defendant does not claim that the photographs were taken, stored, or received at times remote from the shooting.
Procedural history. In September, 2011, the defendant was charged by a Suffolk County grand jury with possession of a firearm without a license, in violation of
Discussion. On appeal, the defendant argues that the motion to suppress photographs was wrongly denied, as there was not probable cause to search his iPhone’s photograph file for evidence linking him to Lerouge or the shooting.8
When considering the sufficiency of a search warrant application, our review “begins and ends with the four corners of the
The Fourth Amendment to the United States Constitution and art. 14 of the Massachusetts Declaration of Rights “both require a magistrate to determine that probable cause exists before issuing a search warrant” (quotation and citation omitted). Cavitt, 460 Mass. at 626. “[P]robable cause requires a substantial basis . . . for concluding that the items sought are related to the criminal activity under investigation, and that they reasonably may be expected to be located in the place to be searched at the time the search warrant issues” (quotations and citations omitted). Commonwealth v. Kaupp, 453 Mass. 102, 110 (2009). See McDermott, 448 Mass. at 768 (probable cause to search residence where “reasonably likely that the items specified in the affidavit could be found there” [quotation and citations omitted]).10
In the physical world, police need not particularize a warrant application to search a property beyond providing a specific address, in part because it would be unrealistic to expect them to be equipped, beforehand, to identify which specific room, closet, drawer, or container within a home will contain the objects of their search. Rather, “[a] lawful search of fixed premises generally extends to the entire area in which the object of the search may be found” (emphasis added). See United States v. Ross, 456 U.S. 798, 820 (1982).
Nevertheless, much like a home, such devices can still appropriately be searched when there is probable cause to believe they contain particularized evidence. See McDermott, 448 Mass. at 770-772. However, given the properties that render an iPhone distinct from the closed containers regularly seen in the physical world, a search of its many files must be done with special care and satisfy a more narrow and demanding standard. See Hawkins v. State, 290 Ga. 785, 786-787 (2012) (cellular telephone is “roughly analogous” to container, but large volume of information contained in cellular telephone “has substantial import as to the scope of the permitted search,” which must be done with “great care and caution”). “Officers must be clear as to what it is they are seeking on the [iPhone] and conduct the search in a way that avoids searching files of types not identified in the warrant.” United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001), cert. denied, 535 U.S. 1069 (2002). “[A] computer search ‘may be as extensive as reasonably required to locate the items described in the warrant’ based on probable cause (emphasis added).” United States v. Grimmett, 439 F.3d 1263, 1270 (10th Cir. 2006), quoting United States v. Wuagneux, 683 F.2d 1343, 1352 (11th Cir. 1982),
In the instant case, the police presented evidence in the warrant affidavit that included the statements of witnesses to the effect that the defendant had been receiving threatening communications on his iPhone with respect to money he owed to “people,” and indeed had been using his iPhone while arguing with an individual immediately prior to the shooting. This was admittedly sufficient to establish probable cause to believe that the defendant’s iPhone likely contained evidence of multiple contentious communications between himself and other persons in the days leading up to the shooting, that is, evidence of communications both received as well as initiated and sent by the defendant that would link him and others to that shooting. The warrant, in turn, included authorization to search for such evidence not only in the iPhone’s call history and text message files, but also in its photograph files.
The defendant contends, however, that the police had probable cause only to search his telephone call and text files, and not his photograph file. We disagree. Communications can come in many forms including photographic, which the defendant freely admits. So long as such evidence may reasonably be found in the file containing the defendant’s photographs, that file may be searched.12,13 We agree with the motion judge that the evidence sought, for which there was probable cause, might reasonably have been found in the photograph file. Therefore, a search for such evidence in that file was neither outside the scope of the warrant nor unreasonable.
While it may be possible for a forensic examiner to retrieve some photographic evidence through searches of files other than the photograph file, that does not make such a retrieval method constitutionally required where such photographic evidence would also reasonably be found in the iPhone’s photograph file. In addition, the communications at issue may have occurred over an extended period of time leading up to the shooting, and where texts and their attachments may be overwritten by new data, the saved photographic attachment may only be found in the iPhone’s photograph file. Accordingly, in determining the nexus between the items sought and the place to be searched, it was reasonable here to infer that the targeted evidence might not exist exclusively in the text and call log folders. See Commonwealth v. O’Day, 440 Mass. 296, 302 (2003) (magistrate may make probable cause determination in part based on “normal inferences as to where a criminal would be likely to hide [evidence of the crime]” [citation omitted]). The affidavit in question contained enough information from which the magistrate and the forensic examiners could conclude that the evidence sought might reasonably be located in the photograph file. See McDermott, 448 Mass. at 767.
The dissent postulates that even if the warrant did authorize the search and seizure of photographs, such authorization extended, at most, to photographs depicting threats. Post at 509. However,
The motion to suppress was properly denied.17
So ordered.
LENK, J. (dissenting, with whom Duffly and Hines, JJ., join). The architects of art. 14 of the Massachusetts Declaration of Rights and the Fourth Amendment to the United States Constitution had in mind only searches of physical places and seizures of physical objects. Transposing these protections to digital contexts is an ongoing and challenging task, as the matter before us only underscores. I disagree with the court’s resolution of the issues presented here. In my view, the search of the photograph files on the defendant’s Apple iPhone “smart” cellular telephone was not supported by probable cause, and the warrant authorizing that search was not sufficiently particular. Furthermore, even had there been probable cause to support a search of the photograph files, the photographs seized by the police appear to have been outside the permissible scope of the warrant. I write separately for these reasons, and also to express my concern about the future direction of our search and seizure law in a digital context.
In an increasingly digital world, we continue to lean heavily on analogies between digital media and physical spaces and objects,
1. Probable cause. Probable cause requires “a ‘substantial basis’ . . . for concluding that ‘the items sought are related to the criminal activity under investigation, and that they reasonably may be expected to be located in the place to be searched’” (citation omitted). Commonwealth v. Kaupp, 453 Mass. 102, 110 (2009). The digital media at issue in this case,1 however, do not fit neatly within this framework. What was the “place” to be searched — the defendant’s iPhone as a whole? Or only certain parts of it? And what were the “items” to be seized — categories of files? Or were they certain files, perhaps specific photographs of evidentiary value? See Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 551-557 (2005) (Kerr, Digital World) (discussing meaning of digital “search”). See generally Kerr, Executing Warrants for Digital Evidence: The Case for Use Restrictions on Nonresponsive Data, Tex. Tech L. Rev. (forthcoming) (on pages 23-28 of manuscript, discussing meaning of digital “seizure”).
As the court acknowledges, the warrant at issue here does not provide easy answers to these questions. Ante at note 3. The prop-
Given this lack of clarity, the court correctly determines that the warrant for the iPhone describes the place to be searched as the physical device itself, and the items to be seized as the categories of files that it lists. See ante at note 3. The court incorrectly holds, however, that there was probable cause to search the entire set of photograph files on the defendant’s iPhone. In my view, there was not a substantial basis for concluding that the entire set of the defendant’s photograph files, rather than just the subset of photograph files attached to the defendant’s text and multimedia messages, was related to the criminal activity under investigation.3
An affidavit in support of a search warrant must be read “in an ordinary, commonsense manner, without hypertechnical analysis.” See Commonwealth v. Cruz, 430 Mass. 838, 840 (2000), and cases cited. This principle applies even where a search ventures into the vast store of private information available on a device like an iPhone. The probable cause analysis is limited to “the facts recited in the affidavit and any reasonable inferences therefrom.” Kaupp, supra at 107, citing Commonwealth v. Allen, 406 Mass. 575, 578 (1990).
Read in an ordinary, commonsense manner, and without resort-
What the affidavit did not provide was reason to believe that the iPhone’s entire set of photograph files, as opposed to only those photograph files attached to calls or text messages, would present evidence related to the shooting. In the abstract, I do not disagree with the court’s statement that “[c]ommunications can come in many forms including photographic.” Ante at 503. Nor, apparently, does the defendant. A photograph depicting a severed horse’s head, for instance, might well be used to communicate a threat (in the mode of “The Godfather” novel and motion picture). But the hypothetical viability of communication by photographic suggestion, even had it been mentioned in the affidavit, would not have supported a reasonable, commonsensical inference that a search of the defendant’s entire set of photograph files was needed to produce the subset of photographs that might at some point have been communicated.
The court reasons that, if a photograph file attached to a text message had been deleted and overwritten by new data, access to the entire set of photograph files on the iPhone might be necessary for a forensic investigator to find another copy of that specific file on the device. Ante at 504. As the court notes, however, there is no argument that the photographs at issue here were “received, taken, or stored long before the events leading up
In sum, the information presented to the magistrate did not create even a “[s]trong reason to suspect” that the entire set of photograph files on the defendant’s iPhone were related to the criminal activity being investigated, much less a “substantial basis” for such a belief (citations omitted). See Kaupp, supra at 110-111, and cases cited. The search of those files was not supported by probable cause, and consequently it was unconstitutional.5
While there was surely probable cause to believe that there was evidence of the communications described in the affidavit somewhere within the defendant’s iPhone, the essence of the United States Supreme Court’s decision in Riley, supra, was that such devices cannot be treated like ordinary containers. This is because “a cell phone search would typically expose to the government far more than the most exhaustive search of a house.” Riley, supra at 2491. In one commentator’s words, “limiting a search to a particular computer is something like . . . limiting a search to the entire city.” Kerr, Digital Evidence and the New Criminal Procedure, 105 Colum. L. Rev. 279, 303 (2005).
We must not be taken in by the shape and size of a device that permits access to massive stores of information of different kinds. Where possible — recognizing that it not always is — it may be best to treat such a device more like a city than like a packing
2. Particularity. Article 14 and the Fourth Amendment also require that a warrant identify with particularity the place to be searched and the items to be seized. The requisite particularity, however, was not present in this case.6
Read commonsensically, the affidavit and warrant both envisioned a general search of the entire iPhone, rather than a targeted search for certain types of communications. Based on the facts it presents, the affidavit draws the general conclusion that the defendant’s iPhone “contains valuable information that will link the [defendant] and [another person] to the crime.” The affidavit proceeds to explain that, accordingly, permission is being sought to search the iPhone for a wide variety of categories of files. Several of these, such as the defendant’s “[s]peed dial list,” “[p]hone configuration information and settings,” and “[m]obile Internet browser,” were most unlikely to contain any evidence of criminal activity under investigation. The warrant, in turn, authorized the seizure of most of the categories of files on the defendant’s iPhone, including all “saved and deleted photographs.”7
Allowing the police to search a broad variety of categories of files, many of which were at most tangentially related to the communications described in the affidavit, was an “end run” around
Creating particularized limitations beforehand for a search of a device capable of storing hundreds of thousands of files is difficult. But it is not impossible. As the court acknowledges, current search technology already allows forensic examiners to pinpoint their searches. Ante at 504. Accordingly, the warrant could have limited the search only to the iPhone’s call records and text message files — the categories of files most likely to provide evidence of the “threatening phone calls and threatening text messages” that preceded the shooting.8 The warrant also could have limited the search of any image files temporally to include only images stored on the device in the days or weeks leading up to the shooting. Compare United States v. Winn, 79 F. Supp. 3d 904, 921 (S.D. Ill. 2015) (“Most importantly, the warrant should have specified the relevant time frame”). Restrictions of this sort would prevent forensic investigators from exercising greater discretion than art. 14 and the Fourth Amendment allow. As the United States Supreme Court noted in Riley, supra at 2495, the fact that technology now enables an individual to store huge sums of information in his or her pocket “does not make the information any less worthy of the protection for which the Founders fought.”
3. Scope of the search. Finally, the photographs that the defendant seeks to suppress do not seem to have been within the
The court accordingly devises the hypothesis that the contested photographs “could well have been sent as a threatening communication to the person or persons who had apparently been threatening [the defendant].” Ante at 505. This hypothesis is implausible. The court’s theory is not rooted in an evaluation of the photographs, given that they are not part of the record before us. The Commonwealth, having examined the photographs, has not suggested that they constituted, singly or together, a “threatening communication” made by the defendant to anyone. Nor does the available information support such an interpretation.
The affidavit described three interviews concerning the communications for which, on the court’s view, the warrant authorized a search. According to the first interview, the defendant “received a [telephone] call and started arguing with the caller on the [telephone],” and “left the apartment still arguing with the caller” shortly before the shooting took place. According to the second interview, the defendant “was receiving threatening [telephone] calls and threatening text messages on his [telephone].” According to the third interview, the defendant had “been getting a lot of telephone threats because he owe[d] money to people.”
These interviews do not support the view that the photographs in question were included in the communications described. The first interview clearly described a telephone call rather than an exchange of picture messages. While the second and third interviews did not rule out the possibility that the threats described were communicated in photographs, both interviews specified that the threats were received, not sent. Nothing in the affidavit suggests that the defendant was using photographs of himself to threaten others. Moreover, even if the two photographs of the defendant holding a gun were intended as a threat, it strains credulity to assert that photographs of the defendant wearing a green jacket had a similar purpose. In sum, I question whether the
A corresponding flaw occurring in a physical search could have been cured by the “plain view” doctrine, according to which, “if officers, in the course of conducting a lawful search, discover evidence in plain view, such evidence may be seized.” See McDermott, supra at 777, citing United States v. Gray, 78 F. Supp. 2d 524, 528 (E.D. Va. 1999). Yet, recognizing that “the application of that doctrine to digital file searches may, at times, need to be limited,” ante at note 16, and sources cited, the court resists wholesale importation of the plain view doctrine into the current context.
There is good reason for the court’s caution on this score. Although the search at issue in this case was, according to the court, limited to “evidence of communications that would link the defendant and another person to the shooting,” ante at note 3, the plain view doctrine would render that constraint meaningless, given that “there is no conceivable way” to detect whether a picture is relevant evidence without first looking at it. See ante at 505.
It is an open question whether application of the plain view doctrine to searches of digital media would undermine the constitutional prohibition on general searches.9 This court applied the plain view doctrine to a search of computer files in McDermott, supra at 777. More recently, however, the court expressed concern that a search of digital files could be “joined with the plain view doctrine to enable the Commonwealth to use against defendants inculpatory evidence . . . even though such evidence may not actually fit within the scope of the search warrants obtained.” Preventive Med. Assocs. v. Commonwealth, 465 Mass. 810, 831-832 (2013). This prospect is worrisome because searches of digital information tend to require law enforcement to delve into, and
In Preventive Med. Assocs., supra at 832, this court elected to “leave for another day the question whether use of the plain view doctrine as a justification for admission of evidence should be precluded or at least narrowed in the context of searches for electronic records.” While not today, the day when the court will be called upon to determine more precisely when and how the plain view exception applies to digital searches is likely close at hand.
