Lead Opinion
delivered the opinion of the court:
After a bench trial, defendant, Robert S. Prinzing, was convicted of possessing child pornography (720 ILCS 5/11 — 20.1(a)(6) (West 2004)) and sentenced to 30 months’ probation. On appeal, he argues that the circuit court erred in denying his motion to suppress evidence, which maintained that the police illegally obtained his consent to search, through the use of trickery, deceit, or subterfuge. Defendant alternatively argues that, even if his consent was valid, the evidence should have been suppressed because the police exceeded the scope of his consent. We agree that the police exceeded the scope of the consent, and we reverse and remand.
I. BACKGROUND
On February 18, 2005, defendant was indicted for nine counts of possession of child pornography. The indictment alleged that on or about May 25, 2004, defendant knowingly possessed pornographic computer images of children whom he knew or reasonably should have known to be under the age of 18.
On February 4, 2005, defendant moved to quash the search and to suppress evidence that was obtained. In his motion, he stated that on October 29, 2003, Detective Keith Smith of the Kane County sheriff’s department received information from a federal agent, Ronald Wolfick, regarding Kane County residents who had possibly purchased child pornography over the Internet. On November 18, 2003, Detective Smith was informed that defendant was one of those residents. On February 4, 2004, Detective Smith spoke to defendant’s credit card company and was informed that there had been a disputed charge for his account number and that the account was closed and a new card was issued. He then obtained defendant’s new credit card
Defendant’s motion further alleged that on May 26, 2004, Detective Smith asked defendant to pick up his wife’s computer from the sheriffs office and conducted another interview with defendant, which was audiotaped. After the interview, Detective Smith turned over the computer to defendant. Defendant argued that his consent to the search was involuntary because of the officers’ trickery, deceit, or subterfuge. He argued further that the officers illegally obtained oral and written statements from defendant and illegally seized defendant’s computers, digital cameras, and compact discs. Defendant argued that, because the search of the computer violated defendant’s fourth amendment rights, the physical evidence and the statements subsequently obtained should have been suppressed.
On March 3, 2005, the trial court held an evidentiary hearing on defendant’s motion to suppress. Detective Smith testified as follows. He was employed with the Kane County sheriffs department and assigned to computer crimes and forensics. On October 29, 2003, he spoke with Ronald Wolfick, a special agent with Immigration and Customs Enforcement. Wolfick provided Detective Smith with information regarding online credit card purchases of child pornography and provided the credit card number used, which belonged to defendant. Detective Smith obtained a subpoena and contacted the bank that issued the credit card. The bank told Detective Smith that a fraudulent charge had been reported around the time that the card was used to purchase child pornography. The bank relayed that a new account number had been issued. On May 25, 2004, Detective Smith, along with Detective Grimes, went to defendant’s residence at approximately 5 p.m. in an unmarked car. Detective Smith identified himself and stated that he was investigating fraud involving defendant’s credit card. Detective Smith inquired “as to his card usage, the geographical area [in which] he might have used it, also if it was ever out of his control and through the course of the conversation trying to determine if he had lost control of that card where someone else could have acquired his credit card numbers.” Defendant retrieved his credit card and gave it to Detective Smith. Detective Smith recognized the number as the one that had been used to purchase child pornography. Defendant told Detective Smith that he owned the credit card and maintained exclusive control over the card. Defendant stated that he used the card in the local area, when he went on trips, and occasionally for Internet purchases. Detective Smith asked defendant whether there had been any fraud reported on his credit card. Defendant stated that there had been an incident of fraud, his money
Detective Smith told defendant that if he used the card on the Internet, there was opportunity for others to steal his information. Detective Smith asked defendant if he still possessed the computer that he used to make Internet purchases. If there was any evidence of his system being compromised by unsafe Internet Web sites or a virus, it would likely be on the computer used to make Internet purchases. Defendant denied noticing any suspicious activity on his credit card. Defendant worked for Comcast and was very knowledgeable about computers, impressing Detective Smith. Defendant denied having any suspicion that the security on his computer had been compromised. Detective Smith testified that a virus could infect a computer when a person received a spam e-mail or visited a particular Web site embedded with the virus. He had an investigatory tool that allowed him to check for such viruses.
Detective Smith asked defendant if he could search his computer by using a special program, with the intent of trying to determine how his credit card information might have been stolen. Defendant consented. Defendant was present in the room when Detective Smith began the program, but he left the room several times. According to Detective Smith, he initially used a noninvasive tool to perform a “preview,” which prevents any changes from happening to the computer when the system is turned off and on. The “preview” allows detectives to view the hard drive but prevents them from making any changes to any of its files. Normally, after the “preview” program, Detective Smith would use a program called “Image scan.” The image scan looks for images related to Web pages to get a history of pages that the user has visited. The program brings up thumbnail images from Web pages. Depending upon what is found, he then would use a tool that would look for viruses or any keystroke loggers, which capture keystrokes and send the information to a remote location. Detective Smith began the search of defendant’s computer by using the image scan program. He was looking for thumbnails with the Visa logo, not for child pornography. Detective Smith testified that he did not inform defendant that he believed that his credit card information had been used to access child pornography Web sites, because “at this point [he] didn’t feel that [defendant] still had been — was the offender. [Detective Smith] was curious as to how his information could have been compromised.” He was concerned that defendant’s credit card may have been compromised not once, but twice. Detective Smith explained that “when you visit a web site, if you go to make a purchase, you will see a Visa logo. That will be captured. Whatever the merchandise is being offered on that particular web page, it will have graphics that will show that.” A Visa credit card number will not be captured. Detective Smith would have to click on the image to get to the vendor’s Web site.
Detective Smith found several images that he suspected were child pornography. He found the images within 10 to 15 minutes after he began the scan. He denied that he was specifically looking for child pornography. Rather, he was looking for information related to defendant’s credit card. He considered his investigation up to this point to be related to credit card fraud because there was evidence of only a few attempts to access the pornographic Web sites, whereas other investigations involved numerous attempts. He stopped the search and asked “for consent, asked [defendant] to grant another interview regarding the images that [he] had seen.”
“I explained to him that based on what he had told me that he had physical control of his credit card all the time and he had no reported compromises of his Internet service, was he familiar — I had some concern over the images and was he familiar with two particular web sites which I named for him.”
Defendant believed that one of the named sites was one that he had previously subscribed to. The disputed charge on his credit card involved one of the sites. Defendant stated that he was relieved that this was “out” so that he could get it behind him. He never asked to end the conversation, and Detective Smith asked him to provide a written statement summarizing his credit card usage. Defendant agreed and provided a statement.
Detective Smith then told defendant that based on what he saw, he “had no choice but to take [defendant’s] computers.” Defendant was concerned about how long the computers would be gone, because one of the computers was his wife’s work-related laptop. Detective Smith asked for and received oral and written consent to take the computers. Defendant assisted Detective Smith in gathering all the computers and media storage devices that were to be taken into evidence. Defendant asked Detective Smith whether he was going to be arrested, and Detective Smith stated that he did not know what the results would be of their computer analysis. He told defendant that the matter was still under investigation but that he would give him notice and an opportunity to turn himself in if he were to be arrested. The detectives then left defendant’s home.
The next day, May 26, 2004, Detective Smith called defendant and advised that the police were finished with his wife’s computer and that Detective Smith could drop it off to him. Defendant stated that he could pick it up on his way home. When defendant arrived around 5 p.m., Detective Smith asked if he would consent to another interview and defendant agreed. Defendant agreed to have the interview audio-taped.
On cross-examination, Detective Smith admitted that he was specifically assigned to review cases that involved Internet child pornography. He admitted that the information that he received from Wolfick involved child pornography purchased on the Internet and was obtained through a federal investigation known as Operation Falcon. He admitted that Wolfick never mentioned credit card fraud. He admitted that, when he testified before the grand jury to obtain subpoenas for defendant’s credit card records, he was investigating the possibility that defendant purchased child pornography. He admitted that he spoke with defendant’s credit card company and was told that there was a disputed charge of $565 on the card but that that account had been closed in June 2003. The bank told him that a new card had been issued, and he received both credit card numbers from Wolfick. The dates of the child pornography purchases were between May and June of either 2002 or 2003; Detective Smith could not recall the year in question.
Detective Smith admitted that he was investigating defendant between February 20, 2004, and May 25, 2004, for possession of child pornography and had obtained on that ground grand jury subpoenas for defendant’s Internet service, credit card, and e-mail address. Although he had no information that suggested that someone other than defendant used his card to visit child pornography sites, Detective Smith maintained that he was not sure that defendant was the actual person visiting the sites.
Kathleen Ann Donovan, defendant’s wife, testified as follows. She confirmed that Detective Smith and Detective Grimes arrived at her front door claiming that they were investigating potential fraud. The detectives asked about any fraudulent activity on their credit cards. She recalled having a dispute regarding some charges to their account but neither she nor her husband filed any police reports connected with that dispute. The detectives did not ask about any particular Web sites connected with any online purchases until after they inspected the computer. The detectives asked to look at the computer so that they could find evidence of any fraudulent credit card transactions. Defendant consented and later the detectives stated that they found child pornography images on the computer. They then began collecting all the computers in the home, three of which belonged to Donovan. She did not believe that she could stop the detectives from confiscating her computers. Detective Smith then asked defendant to make a written statement about the definition of pornography and had him sign a consent form that listed the computers that were being removed from the home.
On May 26, 2004, Detective Smith was supposed to meet Donovan at the train station in Geneva to return her computer to her. When she arrived at the station, he was not there. Defendant called her to inform her that the detective could not meet her there. Defendant stated that he would go pick up the computer from the police station.
Defendant testified next. Around 5 p.m. on May 25, 2004, two detectives arrived at defendant’s home. They told him that they were investigating a fraud case, which he thought was unusual considering that he did not have any complaints regarding any type of fraud. The detectives questioned him for approximately 10 or 15 minutes regarding his credit cards and credit card numbers. They asked if he had a particular credit card but did not inform him how they had acquired his credit card information. He produced all of the credit cards in his wallet. He told Detective Smith that he had a disputed charge at one time but that it had been resolved and he had been issued a new card. He thought that perhaps the credit card number that the detectives had was his old card number. His disputed charge took place sometime in June 2003. He had another disputed charge in August 2003, but a new card was not issued then. The detectives asked about his card usage and whether he was the sole user. They then asked to view his computer to check for viruses that could have stolen his credit card information. Defendant stated that “Detective Smith asked to view [the] computer to look for viruses, you know, signs that [a] hacker had been in [defendant’s] computer, Trojan horses, worms, anything that might possibly capture key strokes that [he] was typing in to get [his] credit card information.” He initially told the detectives that he did not feel it was necessary, because he had several firewalls in place and felt
Detective Smith then produced a USB port cable and a couple of disks that he retrieved from his briefcase. He inserted a disk into defendant’s computer, rebooted it, and then began looking at images that were on the computer. Defendant stated that it appeared that the program was creating files of pictures, because Detective Smith went to “a directory and [was] opening up different files, and every time he opened one up, it was populating with pictures from [the] computer.” Defendant never saw any images with credit card logos; he saw only images that he had downloaded from the Internet or from his digital camera. Defendant was employed by Comcast, and he regularly checked systems for viruses. The programs he used to check for viruses never brought up images but only executable files. Viruses are not embedded in images but are executable programs. He thought it was odd that Detective Smith was looking only at pictures but defendant did not say anything. After about 15 to 20 minutes, Detective Smith stated that he was done looking at the computer and that he found an image that he felt was child pornography. Detective Smith then asked defendant about two Web sites and defendant admitted that he had visited them. Detective Smith then told defendant that he had to confíscate all the computers in the house and search all media that might contain pictures or other files. Detective Smith did not ask for permission to search the home for additional computers and media storage devices, such as defendant’s digital camera. Defendant turned over these items because he did not feel that he had a choice.
On May 25, 2004, Detective Smith was scheduled to meet Donovan at the train station at 2 p.m. to return her work laptop computer to her. However, he called defendant at 1:30 p.m. and stated that he could not make it and could not stop by their home for several days. Instead, defendant offered to pick the computer up after work. Detective Smith agreed and, when defendant arrived at the police station around 5:15 p.m., Detective Smith asked if he would agree to be interviewed. Defendant agreed and provided a taped statement.
On May 19, 2005, the trial court denied defendant’s motion to suppress. The trial court determined that Detective Smith was “steadfast” in his position that he went to defendant’s residence to investigate credit card fraud and that defendant consented to the search of his computer. After discovering the child pornography, Detective Smith stopped the search and obtained defendant’s voluntary written statement and consent to seize the computers in the home. The next day, defendant agreed to go to the police station and agreed to be interviewed on tape. The trial court did not find that Detective Smith engaged in trickery, deceit, or subterfuge.
On July 14, 2005, defendant filed a motion to reconsider the denial of his motion to suppress. He argued that the trial court failed to consider all the testimony and failed to consider that Detective Smith’s testimony was impeached by his grand jury testimony, and thus, the trial court erred in finding that defendant’s consent to the computer search was valid. On February 24, 2006, the trial court denied defendant’s motion for reconsideration. The trial court found that Detective Smith was not impeached because during his grand jury testimony he was only asked
On August 31, 2006, defendant filed a motion for reconsideration based on newly disclosed evidence. Defendant argued that he did not have the transcripts from the grand jury subpoena hearing when he filed his motion to suppress and earlier motion for reconsideration. According to defendant, the grand jury testimony directly impeached Detective Smith’s testimony at the hearing on defendant’s motion to suppress. The sole witness at the grand jury hearing was Detective Smith, who testified that the subpoenas being sought were for the limited purpose of investigating child pornography cases. Detective Smith further testified that he was investigating five individuals implicated in a federal investigation and was “trying to determine if these people, in fact, had knowledge of that credit card and their Internet service provider accounts having been used.” He was seeking information from the credit card companies to determine the accuracy of the information received about the suspected purchases. He answered “yes” when asked if the credit card information was being obtained solely for the purpose of investigating child pornography cases against the individuals.
The trial court denied this motion on October 18, 2006. In its ruling, the trial court stated that it believed that Detective Smith’s investigation of defendant initially related to child pornography, morphed into a credit card fraud investigation when he discovered that there was a disputed charge on defendant’s card, and then, after he discovered child pornography on defendant’s computer, morphed back to a child pornography investigation.
The State nol-prossed counts III and VIII, and the matter proceeded to a bench trial on the remaining seven counts. The trial court found defendant not guilty on count one and guilty on the remaining six counts. Defendant was sentenced to 30 months’ probation on July 13, 2007, and this timely appeal followed.
II. ANALYSIS
When reviewing a trial court’s ruling on a motion to suppress evidence, we apply a two-part standard of review adopted by the Supreme Court in Ornelas v. United States,
Courts may consider many factors when evaluating the totality of the circumstances. Knowledge of the right to refuse consent is one factor to be considered, but the State does not need to establish such knowledge to prove an effective consent. Schneckloth,
This leaves us to first determine whether the trial court’s factual determination that Detective Smith did not engage in trickery, deceit, or subterfuge when he asked to search defendant’s computer for fraudulent credit card activity is against the manifest weight of the evidence. Defendant likens his case to Daugherty. In Daugherty, police officers went to the defendant’s home, identified themselves, and said that they wanted to discuss the theft that she reported a few days earlier. Daugherty,
“Where, as here, the law enforcement officer without a warrant uses his official position of authority and falsely claims that he has legitimate police business to conduct in order to gain consent to enter the premises when, in fact, his real reason is to search inside for evidence of a crime, we find that this deception under the circumstances is so unfair as to be coercive and renders the consent invalid. *** This police conduct offends the fourth amendment and is fundamentally unfair when compared with the need for effective police investigation.” Daugherty,161 Ill. App. 3d at 400 .
While Daugherty appears to be the only Illinois case invalidating consent on the ground that it was obtained through trickery, defendant also likens his case to those that invalidated consent on the ground that the police had misrepresented the defendants’ rights. See Bumper v. North Carolina,
We find this case distinguishable from Daugherty and the other cases cited by defendant. It was undisputed that Detective Smith was informed by defendant’s credit card company that there was a disputed charge that had been resolved by crediting back the charge and a new card number having been issued. It was also undisputed that the disputed charge in June 2003 was around the time that the child pornography Web site charges had been incurred. While Detective Smith did not mention the potential for child pornography purchases, he was not required to provide defendant with every piece of information that he possessed while investigating the matter. In Daugherty, the theft case had been resolved and the police employed purely deceptive tactics to obtain consent whereas, in this case, the police had not resolved whether the disputed credit card charge was related to the child
Having determined that defendant’s consent was voluntary, we now examine whether the police exceeded the scope of the consent. When determining whether a search is reasonable under the fourth amendment, we must determine first whether the officer’s action was justified at its inception and second whether it was reasonably related in scope to the circumstances that justified the intrusion in the first place. People v. Lampitok,
In this case, principles of law and technology collide. The court in People v. Berry,
In United States v. Brooks,
We find this case distinguishable from Berry, Lemmons, and Brooks because those cases dealt with general consents to search. Here, Detective Smith, by his own words, limited the scope of the intended computer search. Detective Smith specifically requested to search defendant’s computer for viruses or key-logging programs to find out if defendant’s credit card number had been stolen. The exchange between Detective Smith and defendant involved only an investigation of credit card fraud and the potential that someone had stolen defendant’s credit card number by way of a computer virus. By Detective Smith’s own description of the scanning programs that he normally used, the image scan disk searched images and Web site pages on the computer. According to Detective Smith’s testimony, if an image came up with a Visa logo, Detective Smith could click on it and he would be brought to the Web page of the vendor. He did not testify that the vendor Web page would indicate whether defendant’s credit card number was compromised. In fact, according to defendant, who worked for Comcast, no image would lead Detective Smith to discover a virus that could steal defendant’s credit card number, as viruses and key-logging programs are executable files and not embedded in any image. Defendant consented to a search only for viruses, not images. Thus, we find that
Our analysis is similar to the analysis in United States v. Richardson,
The State mentions that defendant did not object to the search when he saw Detective Smith bringing up images and that his failure to do so expanded the scope of the consent. The State failed to cite to any authority on this issue. Failure to cite to any authority results in forfeiture of the argument. 210 Ill. 2d R. 341(h); People v. Emerson,
Having determined that Detective Smith exceeded the scope of defendant’s consent, we review de novo the trial court’s ultimate legal conclusion as to whether it should have granted defendant’s motion to suppress, and we accordingly conclude that suppression was warranted. Further, the computer images were obtained through an illegal search, and defendant’s ensuing statements were acquired within 24 hours of the search. The police did not present any new evidence to defendant in order to obtain his statements. As such, the evidence seized from defendant’s home and his oral and written statements must be suppressed as there was no intervening event that broke the connection between the illegal search and the collection of evidence from the computers and his statements. See People v. Foskey,
III. CONCLUSION
Based on the foregoing reasons, we reverse the judgment of the circuit court of
Reversed and remanded.
SCHOSTOK, J., concurs.
Notes
Detective Grimes’ first name is not contained in the record.
Dissenting Opinion
dissenting:
Under the facts of this case, I would hold that any police deception had no bearing on the validity of defendant’s consent, and I would hold that the search actually conducted fell within the scope of defendant’s consent. I would therefore affirm defendant’s conviction.
I begin by discussing the effect of the alleged police deception on the validity of defendant’s consent. Illinois law provides unclear guidance on the point. The law as recited by the majority says at once that “[cjonsent is not voluntary where it is the result of official coercion, intimidation, or deception” (Graf,
Most authorities that would hold a consent procured by police deception to be invalid, including the Illinois cases cited by the majority, rely on the fourth and fourteenth amendment requirement that a consent be voluntary in order to be effective. Before the Supreme Court’s 1973 decision in Sehneckloth, which articulated the standards to be applied in determining the voluntariness of a consent to search, courts employed more elusive, and more subjective, measures of voluntariness. For example, in Alexander v. United States,
The Fifth Circuit’s holding stood as a stern repudiation of consent induced by police deception of any kind. However, its reasoning was not unassailable, and its decision provided little practical guidance. On the former point, the analogy between consent to search on one hand and contract on the other has been rejected (see M. Friedman, Another Stab at Schneckloth:
The Supreme Court resolved this ambiguity by providing a clearer definition of “voluntariness” in its decision in Schneckloth. There, the Supreme Court turned to the “judicial exposition of the meaning of ‘voluntariness’ ” in the context of confessions to define the test for a suspect’s consent. Schneckloth,
In the time since Schneckloth, lower courts have applied the voluntariness test to police deception cases with inconsistent results. It is widely acknowledged that police deception could work to coerce an involuntary consent in the way Schneckloth forbids, by interfering with the suspect’s ability to make a free choice to grant or deny consent. For example, in Bumper, a case that predates Schneckloth but is nonetheless instructive, the Supreme Court held invalid a consent procured by a police officer falsely telling a suspect that he possessed a search warrant, because the consent was coerced by the officer’s announcing “in effect that the [suspect] ha[d] no right to resist the search.” Bumper,
Some cases, however, have expanded the rule against these types of deception into a blanket prohibition of all deception leading to consent. These courts have held, without qualification, that “ ‘consent obtained through deception cannot be said to have been given freely and voluntarily.’ ” State
I disagree with the per se rule that can be drawn from these cases. See Peters,
It is also inconsistent with the realities of police work, which often involves undercover investigations of the type that would not be allowed under a per se rule against deception leading to consent. The Supreme Court has endorsed such undercover police work in the face of a challenge that it constituted deception invalidating consent. In Lewis v. United States,
I include one important side note. The Supreme Court in Lewis went on to say that, “when *** the home is converted into a commercial [business] center to which outsiders are invited for purposes of transacting unlawful business,” a government agent, “in the same manner as a private person, may accept an invitation to do business and may enter upon the premises for the very purposes contemplated by the occupant.” Lewis,
Other cases do not support a rule that police deception per se renders a consent to search involuntary but instead include deception among the factors to be included in the voluntariness assessment. E.g., Minniti,
With the above understanding of voluntariness, I see nothing to indicate that any police deception in this case interfered with the voluntariness of defendant’s consent. Before addressing this issue, I must clarify the facts informing it. The parties,
From this, and from Smith’s and defendant’s testimony that Smith made no mention to defendant of the child pornography investigation, it becomes manifest that Smith withheld a major, and likely driving, purpose of his request to search. However, there is little to indicate that Smith’s concealing his primary purpose did anything to alter the voluntariness of defendant’s consent to allow the search of his computer.
The next question is whether the police exceeded the scope of defendant’s consent by viewing the images on his computer. Like the standards for voluntariness of consent, the standards for defining the scope of consent have developed over time. At one time, a plurality of the United States Supreme Court held that police conducting a search pursuant to a warrant (or an exception to the warrant requirement) could seize items found in plain view during the search but not identified in the
The holding in Horton brought cohesion to fourth amendment jurisprudence, which measures the scope of a consent to search not in terms of the subjective intentions, understandings, or expectations of the parties involved but, rather, by an objective standard that asks what the “typical reasonable person” would have “understood by the exchange between the officer and the suspect.” Florida v. Jimeno,
The majority nonetheless invokes a rule that would bind police to the stated purpose of their search and forbid consensual searches for undisclosed purposes. The majority bases its rule on a misreading of our supreme court’s statement that “the parameters of a search are usually defined by the purpose of the search” (James,
“The scope of a warrantless search of an automobile thus is not defined by the nature of the container in which the contraband is secreted. Rather, it is defined by the object of the search and the places in which there is probable cause to believe that it may be found. Just as probable cause to believe that a stolen lawnmower may be found in a garage will not support a warrant to search an upstairs bedroom, probable cause to believe that undocumented aliens are being transported in a van will not justify a warrantless search of a suitcase. Probable cause to believe thata container placed in the trunk of a taxi contains contraband or evidence does not justify a search of the entire cab.” Ross, 456 U.S. at 824 ,72 L. Ed. 2d at 593 ,102 S. Ct. at 2172 .
In Jimeno, the Supreme Court applied this concept in a consent-to-search case:
“The scope of a search is generally defined by its expressed object. United States v. Ross,456 U.S. 798 [,72 L. Ed. 2d 572 ,102 S. Ct. 2157 ] (1982). In this case, the terms of the search’s authorization were simple. Respondent granted [law enforcement] permission to search his car, and did not place any explicit limitation on the scope of the search. [The officer] had informed [respondent] that he believed [respondent] was carrying narcotics, and that he would be looking for narcotics in the car. We think that it was objectively reasonable for the police to conclude that the general consent to search respondents’ car included consent to search containers within that car which might bear drugs.” Jimeno,500 U.S. at 251 ,114 L. Ed. 2d at 303 ,111 S. Ct. at 1804 .
The principle to be drawn from these cases is not that an officer may have no purpose for a consent search ulterior to his stated purpose, but instead that a description of the purpose of a search can serve as an indicator of the scope of the contemplated search and thus can help define the scope of the consent. The restriction on the search comes not from the stated purpose of the search, but from what a reasonable person would have understood the extent of the consent to be — i.e., what areas a reasonable person would have understood police had been granted authority to search. Courts say that the scope of a search generally is defined by its purpose because the stated purpose of a proposed search will often be the only explanation of the scope of the proposed search: the scope of a consent to a “search for drugs” without further explanation will be understood in those terms. Thus, police who describe a proposed automobile search by telling the suspect that they wish to search for liquor will have limited the scope of their search to places where liquor could be found, but any other contraband found in the course of that search may still lawfully be seized. People v. Andeliz,
Even though the court in Richardson overlooked this distinction and misread the law in the same way the majority now misreads it, the facts of the case provide a clear illustration of the point. In Richardson, law enforcement agents investigating child pornography that was charged to the defendant’s credit card implied to the defendant that they suspected he was the victim of identity theft, and on that basis the defendant granted them consent to make duplicates of his hard drives and then look at the duplicates. Richardson,
Before applying the above principles to determine whether the search conducted in this case exceeded the scope of the consent conferred, I must again clarify some pertinent facts. As I note above, the permissible scope of a search is governed not necessarily by its stated purpose, but instead by what a reasonable person would have understood from the exchange precipitating the consent search. It therefore becomes very important to determine precisely how Smith and defendant described the requested search before defendant assented. The testimony is ambiguous on this point. It is true, as the majority and the parties note, that Smith told defendant that his purpose in searching the computer was to look for malware. However, the testimony does not include any description of how Smith described to defendant the process by which he would search the computer for malware. The majority seems to assume from this gap in the testimony that the only description given was that Smith would perform a “virus search,” and the majority therefore repeats or implies several times that the scope of the consent was limited accordingly. See
Although the testimony does not directly state what Smith and defendant discussed prior to defendant’s consent, it does provide clues. When asked to describe how he would search defendant’s computer for malware, Smith described using an “image scan” program that boots the computer in a read-only mode and then calls up all of the images on the computer. The majority and the parties incorrectly imply that Smith testified that he examined the images themselves for signs of malware, but in his testimony Smith actually described differently the connection between the image scan and the search for malware. Smith said that he used the program to search for viruses because the program revealed the origin of each of the images, and, for those images originating from Web sites, Smith could ask defendant if he recalled visiting the sites. According to Smith, “[i]f someone [was] accessing his computer remotely unbeknownst to him, he [could] tell [Smith] then and there” that he had not visited the sites. Smith said that he focused his search on images portraying credit card logos, because such images often appear on Web pages that collect credit card numbers for purchases.
The efficacy of this “image viewing” technique as a virus search, especially when compared to the type of actual virus search Smith testified he forwent in order to do the image search, is questionable — a point with which the majority appears to agree. See
“Q. And when you asked him to view his — when you asked about his computer, was that your intent to try and use those programs?
A. Yes, sir.
Q. And did you, in fact, inform the defendant of that?
A. Yes sir.”
In the absence of testimony that directly relates how Smith described the program to defendant before defendant agreed to the search, Smith’s description of the image scan program as a tool for detecting malware, convincing or not, gives us insight into the conversation referenced in his testimony.
Defendant’s actions after the image search began provide added insight into what the two men discussed before defendant granted consent. Smith testified that defendant was in the room when Smith started the image scan program, watched as Smith conducted a review of the images on the computer, and continued to talk to Smith as Smith ran the program, yet never asked Smith to stop viewing the pictures. In his own testimony, defendant confirmed that he was with Smith when Smith began looking at images on the computer, and he testified that he raised no objection even though he actually commented (before Smith found the illegal pornographic images) that he was embarrassed of the other (legal pornographic) images Smith had uncovered on the computer. While it is true, as the majority notes, that a defendant’s silence cannot be used to transform the original scope of the consent (
From the above, I infer that Smith discussed the image scan program with defendant before defendant granted consent, and, even if I were to conclude that Smith misled defendant as to the purpose of using the program, I would conclude that Smith’s use of the program fell within the scope of the consent.
Based on the above discussion, I would hold that the search of defendant’s computer for images did not exceed the scope of defendant’s voluntary consent, and I would affirm defendant’s conviction.
Many authorities, including the majority, imply that courts must weigh the competing considerations identified in Schneckloth to determine whether a consent was voluntary (see
Even after Schneckloth, there is some federal authority invoking federal courts’ supervisory power to strike, in the interest of fairness, a consent obtained through police deception. See Securities & Exchange Comm’n,
There is of course a possibility that defendant would have refused consent if he had known that the officers were actually looking for illegal images, but, as the above discussion demonstrates, that is not the test for voluntariness. In many of the cases discussed above, the defendant unquestionably would not have granted consent had police not deceived him, but the courts nonetheless deemed the consent voluntary. See e.g., Lewis,
During oral argument in the current case, I proposed to defense counsel a hypothetical question based on White, but I received no direct answer.
The majority does not explain how its statement that the image scan program cannot have been used to detect a virus (
